• Title/Summary/Keyword: protocol parameter

Search Result 161, Processing Time 0.028 seconds

A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations

  • Kang, Ju-Sung;Hong, Do-Won
    • Journal of Information Processing Systems
    • /
    • v.3 no.1
    • /
    • pp.21-25
    • /
    • 2007
  • We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equations: the linear systems of equations problem and the linear least-square problem. The protocols proposed in this paper achieve acceptable security in the sense of Du-Zhan's paradigm and t-wise collusion-resistance, and their communication complexity is O(tm), where t is a security parameter and m is the total number of participants. The complexity of our protocol is significantly better than the previous result O($m^2/{\mu}$) of [4], in which the oblivious transfer protocol is used as an important building block.

Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6

  • Kang, You Sung;Choi, Dooho;Park, Dong-Jo
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.170-172
    • /
    • 2013
  • With the rapid progress of RFID security technologies, the international standard group ISO/IEC JTC 1/SC 31 is developing a few security technologies for RFID systems. One of the initial proposals is ISO/IEC working draft (WD) 29167-6. Recently, Song and others stated that Protocol 1 of ISO/IEC WD 29167-6 is vulnerable to a malicious adversary. However, their analysis comes from a misunderstanding regarding a communication parameter called Handle. In this letter, we point out that an adversary cannot obtain any sensitive information from intervening in Protocol 1.

Performance Evaluation of Distributed Clustering Protocol under Distance Estimation Error

  • Nguyen, Quoc Kien;Jeon, Taehyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.11-15
    • /
    • 2018
  • The application of Wireless Sensor Networks requires a wise utilization of limited energy resources. Therefore, a wide range of routing protocols with a motivation to prolong the lifetime of a network has been proposed in recent years. Hierarchical clustering based protocols have become an object of a large number of studies that aim to efficiently utilize the limited energy of network components. In this paper, the effect of mismatch in parameter estimation is discussed to evaluate the robustness of a distanced based algorithm called distributed clustering protocol in homogeneous and heterogeneous environment. For quantitative analysis, performance simulations for this protocol are carried out in terms of the network lifetime which is the main criteria of efficiency for the energy limited system.

Prolong life-span of WSN using clustering method via swarm intelligence and dynamical threshold control scheme

  • Bao, Kaiyang;Ma, Xiaoyuan;Wei, Jianming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2504-2526
    • /
    • 2016
  • Wireless sensors are always deployed in brutal environments, but as we know, the nodes are powered only by non-replaceable batteries with limited energy. Sending, receiving and transporting information require the supply of energy. The essential problem of wireless sensor network (WSN) is to save energy consumption and prolong network lifetime. This paper presents a new communication protocol for WSN called Dynamical Threshold Control Algorithm with three-parameter Particle Swarm Optimization and Ant Colony Optimization based on residual energy (DPA). We first use the state of WSN to partition the region adaptively. Moreover, a three-parameter of particle swarm optimization (PSO) algorithm is proposed and a new fitness function is obtained. The optimal path among the CHs and Base Station (BS) is obtained by the ant colony optimization (ACO) algorithm based on residual energy. Dynamical threshold control algorithm (DTCA) is introduced when we re-select the CHs. Compared to the results obtained by using APSO, ANT and I-LEACH protocols, our DPA protocol tremendously prolongs the lifecycle of network. We observe 48.3%, 43.0%, and 24.9% more percentages of rounds respectively performed by DPA over APSO, ANT and I-LEACH.

The Communication Method at the Auto-Startup System using TCP/IP and VXI and Expert System(G2)

  • Kim, Jung-Soo;Joon Lyon
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.1 no.2
    • /
    • pp.141-146
    • /
    • 1999
  • This paper describes the communication method of an auto-startup system. The Auto-Startup system is designed to operate a nuclear power plant automatically during the startup operation . In general , the operations during startup in existing plant have only been manually controlled by the operator. The manual operation caused to the operator mistake. The Auto-Startup system consists of the Distributed Control System(DCS) and G2 (Expert System). Also, Functional Test Facility(FTF) provides the plant's real-data for an Auto-Startup system. So, it is necessary to develop the communication method between these systems. We developed two methods ; one is a network and the other is a hardwire line. To communicate between these systems (DCS-G2 and DCS-FTF) , we developed the communication program. In case of DCS-FTF, we used the TCP/IP and VXI. BUt, in case of DCS-G2 , we , what it called , developed the bridge program using the GSI(G2 Standard Interface). We test to check the function of the important parameter, in time, for analysis of the developed communication method. The results are a good performance when we check the communication time of important parameter. We conclude that Auto-startup system could save heat-up time about at least 5 hours and reduced the change of the reactor operation and trip.

  • PDF

A Study on Average Access Times by Priority Levels of FDDI MAC Protocol (FDDI MAC 프로토콜의 우선순위 등급에 따른 매체 이용 평균시간에 관한 연구)

  • 김경식;강준길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.4
    • /
    • pp.369-373
    • /
    • 1989
  • This paper investigates average access times on eight asynchronous priority levels of FDDI MAC protocol with parameters on offered loads, message sizes, and number of stations. In case of parameter with offered loads, higher priority levels exhibit similar variances and in case of parameter with message sizes and number of satations, higher priority levels exhibit almost invariables but as increase of message sizes, increase only a small amount of access time on the other hand, as number of stations increase, average access times decrease little by little. But in case of lowest priority level. average access times decrease little by little. But in case of lowest priority level, average access times exhibit relatively large variances about above three parameters.

  • PDF

EEC-FM: Energy Efficient Clustering based on Firefly and Midpoint Algorithms in Wireless Sensor Network

  • Daniel, Ravuri;Rao, Kuda Nageswara
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3683-3703
    • /
    • 2018
  • Wireless sensor networks (WSNs) consist of set of sensor nodes. These sensor nodes are deployed in unattended area which are able to sense, process and transmit data to the base station (BS). One of the primary issues of WSN is energy efficiency. In many existing clustering approaches, initial centroids of cluster heads (CHs) are chosen randomly and they form unbalanced clusters, results more energy consumption. In this paper, an energy efficient clustering protocol to prevent unbalanced clusters based on firefly and midpoint algorithms called EEC-FM has been proposed, where midpoint algorithm is used for initial centroid of CHs selection and firefly is used for cluster formation. Using residual energy and Euclidean distance as the parameters for appropriate cluster formation of the proposed approach produces balanced clusters to eventually balance the load of CHs and improve the network lifetime. Simulation result shows that the proposed method outperforms LEACH-B, BPK-means, Park's approach, Mk-means, and EECPK-means with respect to balancing of clusters, energy efficiency and network lifetime parameters. Simulation result also demonstrate that the proposed approach, EEC-FM protocol is 45% better than LEACH-B, 17.8% better than BPK-means protocol, 12.5% better than Park's approach, 9.1% better than Mk-means, and 5.8% better than EECPK-means protocol with respect to the parameter half energy consumption (HEC).

Performance management of communication networks for computer integrated manufacturing Part ll: Decision making (컴퓨터 통합 샌산을 위한 통신망의 성능관리)

  • Lee, Suk
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.11 no.4
    • /
    • pp.138-147
    • /
    • 1994
  • Performance management of computer networks is intended to improve a given network performance in order for more efficient information exchange between subsystems of an integrated large-scale system. Improtance of performance management is growing as many function of the large- scale system depend on the quality of communication services provided by the network. The role of performance management is to manipulate the adjustable protocol parameters on line so that the network can adapt itself to a dynamic environment. This can be divided into two subtasks : performance evaluation to find how changes in protocol parameters affect the network performance and decision making to detemine the magnitude and direction of parameter adjustment. This paper is the second part of the two papers focusing on conceptual design, development, and evaluation of performance management for token bus networks. This paper specifically deals with the task of decision making which utilizes the principles of stochastic optimization and learning automata. The developed algorithm can adjuxt four timer settings of a token bus protocol based on the result of performance evaluation. The overall performance management has been evaluated for its efficacy on a network testbed.

  • PDF

WLAN CR Coexistence Beacon Protocol for Cognitive Radio-Based WLAN Network (무선인지 기술을 이용한 차세대 WLAN 네트워크에서의 WLAN CR 공존 비콘 프로토콜)

  • Kim, Hyun-Ju;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.790-799
    • /
    • 2007
  • In this paper, we propose WLAN CR coexistence beacon protocol for thenext WLAN network. This method can provide WLAN with high-speed data rate in new WLAN architecture and network platform based on cognitive radio technology. WLAN CR devices that enter the CR network can know UHF channels by listening CR beacon including the coexistence parameter set and start using CR channel fast. During handover of WLAN device in UHF spectrums, WLAN device that lost their channel can change available channel by obtaining the current CR channel information from the CR beacon. In advance relaying coexistence parameter set to entire CR system, WLAN CR system can prepare own candidate channel set that is different with other CR system. In CR beacon and relay delay, we show the results that WLAN CR coexistence beacon protocol supports spectrum handover efficiently and decreases the probability of collision in candidate channel set.

On the Design of Delay based Admission Control in Hierarchical Networks

  • Shin, Seungjae;Kim, Namgi;Lee, Byoung-Dai;Choi, Yoon-Ho;Yoon, Hyunsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.997-1010
    • /
    • 2014
  • Today, as the hierarchical cellular system is getting more attention than before, some recent studies introduce delay based admission control (AC) scheme which delays the admission to the macro-embedded small cell for a relatively short time to prevent unnecessary handover caused by the short-term visitors of the small cell area. In such delay based ACs, when we use improper delay parameter, the system frequently makes incorrect handover decisions such as where unnecessary handover is allowed due to too short delaying, or where necessary handover is denied due to too long delaying. In order to avoid these undesirable situations as much as possible, we develop a new delay parameter decision method based on probabilistic cell residence time approximations. By the extensive numerical and analytical evaluations, we determine the proper delay parameter which prevents the incorrect handover decision as much as possible. We expect our delay parameter decision method can be useful system administration tips in hierarchical cellular system where delay based AC is adopted.