• Title/Summary/Keyword: time-sensitive networking

Search Result 26, Processing Time 0.043 seconds

A Secure Cloud Computing System by Using Encryption and Access Control Model

  • Mahmood, Ghassan Sabeeh;Huang, Dong Jun;Jaleel, Baidaa Abdulrahman
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.538-549
    • /
    • 2019
  • Cloud computing is the concept of providing information technology services on the Internet, such as software, hardware, networking, and storage. These services can be accessed anywhere at any time on a pay-per-use basis. However, storing data on servers is a challenging aspect of cloud computing. This paper utilizes cryptography and access control to ensure the confidentiality, integrity, and proper control of access to sensitive data. We propose a model that can protect data in cloud computing. Our model is designed by using an enhanced RSA encryption algorithm and a combination of role-based access control model with extensible access control markup language (XACML) to facilitate security and allow data access. This paper proposes a model that uses cryptography concepts to store data in cloud computing and allows data access through the access control model with minimum time and cost for encryption and decryption.

Evolution of Industrial IoT Network Technology: Past, Present, and Future Trends (산업용 IoT 네트워크 기술의 진화: 과거, 현재, 미래 동향)

  • T.J. Park;E.H. Kim;J.S. Cha;K.S. Lee
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.3
    • /
    • pp.20-28
    • /
    • 2023
  • Wireless communication technology has mainly been used to fulfill the demands of industrial sites at which performance is not a critical concern. However, ongoing discussions and efforts are now focused on securing core wireless communication technologies to enable the transformation or expansion of wired industrial IoT (Internet of Things) network technology into a flexible and dynamic smart manufacturing system. This paper provides an overview of current wireless industrial IoT network technology and the recent wireless time-sensitive networking technology. It outlines the challenging level of reliability required for wireless communication technology to coexist with or replace its wired counterpart in future smart manufacturing systems. Additionally, we introduce ultra-reliable time deterministic network as the core technology of wireless industrial communications and focus on its reliability and delay characteristics.

SIP6 supporting the Differentiated Call Processing Scheme (차별화된 호 처리 기법을 지원하는 SIP6)

  • 김진철;최병욱;장천현;김기천;한선영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.621-630
    • /
    • 2003
  • In this paper, we implemented SIP protocol that supports IPv6 and differentiated call processing scheme for NGN(Next Regeneration Network). In NGN, SIP processes call signaling among various application services. A softswitch and SIP server must give priority to sensitive services such as Fax, network management and home networking that require a fast call setup time. Also, the support of IPv6 is needed under consideration of All-IP. We proposed differentiated call processing scheme. The differentiated call processing scheme supports differentiated call processing as priority of service class on call processing in SW server We defined three service classes and use the Flow Label field of the IPv6 header for setting service class. Through the performance analysis, we proved that it improves throughput for call message with the high priority. The result of performance analysis demonstrates that differentiated call processing scheme gives better performance for the service requiring a fast session establishment in NGN.

An Anomalous Event Detection System based on Information Theory (엔트로피 기반의 이상징후 탐지 시스템)

  • Han, Chan-Kyu;Choi, Hyoung-Kee
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.173-183
    • /
    • 2009
  • We present a real-time monitoring system for detecting anomalous network events using the entropy. The entropy accounts for the effects of disorder in the system. When an abnormal factor arises to agitate the current system the entropy must show an abrupt change. In this paper we deliberately model the Internet to measure the entropy. Packets flowing between these two networks may incur to sustain the current value. In the proposed system we keep track of the value of entropy in time to pinpoint the sudden changes in the value. The time-series data of entropy are transformed into the two-dimensional domains to help visually inspect the activities on the network. We examine the system using network traffic traces containing notorious worms and DoS attacks on the testbed. Furthermore, we compare our proposed system of time series forecasting method, such as EWMA, holt-winters, and PCA in terms of sensitive. The result suggests that our approach be able to detect anomalies with the fairly high accuracy. Our contributions are two folds: (1) highly sensitive detection of anomalies and (2) visualization of network activities to alert anomalies.

Research Trend in 5G-TSN for Industrial IoT (Industrial IoT를 위한 5G-TSN 기술 동향)

  • Kim, K.S.;Kang, Y.H.;Kim, C.K.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.5
    • /
    • pp.43-56
    • /
    • 2020
  • The 5G system standardization body has been developing standard functions to provide ultra-high speed, ultra-high reliability, ultra-low latency, and ultra-connected services. In 3GPP Rel-16, which was recently completed, this system has begun to develop ultra-high reliability and ultra-low latency communication functions to support the vertical industry. It is expected that the trend in the adoption of mobile communication by the vertical industry will continue with the introduction of 5G. In this paper, we present the industrial Internet-of-Things (IIoT) service scenarios and requirements for the adoption of 5G systems by the vertical industry and the related standardization trend at present. In particular, we introduce the 5G time-sensitive networking standard technology, a core technology for realizing 5G-based smart factories, for IIoT services.

QoS Policy Distribution System for Cisco Router (시스코 라우터 기반의 QoS 정책 분배 시스템)

  • 이상도;신명기;김형준;박기식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.647-649
    • /
    • 2003
  • 인터넷의 폭발적인 성장으로 인터넷을 사용하는 사용자 및 애플리케이션들이 급속하게 등장하였다. 그로 인하여, 스트리밍 서비스 또는 time-sensitive한 애플리케이션들의 QoS를 보장하기 위한 여러 가지 QoS 연구들이 진행중이다. 시스코를 중심으로 한 기업망에서의 Policy Networking 기반의 서비스들이 점점 더 발전되어가고 있다. 즉, 시스코 라우터에서는 이를 지원하기 위한 filtering, Coloring, Policy 등의 명령어를 지원하게 되었다. 그러므로, 이것들을 운영하는 관리자들은 Dos 정책을 자동으로 분배, 적용, 모니터링, 리포팅 기능을 제공하는 자동화된 네트웍 관리도구들에 대한 요구들이 증가하고 있다. 시중에 나와 있는 시스코 제품들은 가격이 너무 비싸고, 관리자들의 요구 사항과는 약간의 거리감이 있다. 따라서, 이 논문에서 시스코 라우터 기반의 자동화된 QoS 정책 분배 시스템의 설계 및 구현 결과를 소개하고자 한다.

  • PDF

Large Flows Detection, Marking, and Mitigation based on sFlow Standard in SDN

  • Afaq, Muhammad;Rehman, Shafqat;Song, Wang-Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.189-198
    • /
    • 2015
  • Despite the fact that traffic engineering techniques have been comprehensively utilized in the past to enhance the performance of communication networks, the distinctive characteristics of Software Defined Networking (SDN) demand new traffic engineering techniques for better traffic control and management. Considering the behavior of traffic, large flows normally carry out transfers of large blocks of data and are naturally packet latency insensitive. However, small flows are often latency-sensitive. Without intelligent traffic engineering, these small flows may be blocked in the same queue behind megabytes of file transfer traffic. So it is very important to identify large flows for different applications. In the scope of this paper, we present an approach to detect large flows in real-time without even a short delay. After the detection of large flows, the next problem is how to control these large flows effectively and prevent network jam. In order to address this issue, we propose an approach in which when the controller is enabled, the large flow is mitigated the moment it hits the predefined threshold value in the control application. This real-time detection, marking, and controlling of large flows will assure an optimize usage of an overall network.

A case study of digital intermediate space designed - The focus on the consumer community - (디지털 매개공간 유형에 관한 사례 연구 - 수용자 커뮤니티를 중심으로 -)

  • 서동진;임종훈
    • Korean Institute of Interior Design Journal
    • /
    • no.29
    • /
    • pp.281-288
    • /
    • 2001
  • It shows 21st century as a networking society that is moving up the concept of global town and being industrialized with regional and personal connections. Individual's original idea and variety of 21th century may be respected by such environmental change, and age (Literary, human axis, technology axis, nature axis, kaining farming axis are central keyword) of culture that cultural capacity of individual becomes important fetters that create added value is forecasted to become. The moaning for space that is unemployment enemy by change of conceptional environment about cultural life and agreeable quality of life by development of Information-Communication technology may be required newly. As it does interaction along with development of science technique and Information-Communication technology, the future environment of various that complex! Is predicted to form network environment (existence space, cyberspace) newly. Human central interest is risen in technology balance hereupon, and these characteristic escaped in physical system that do with functional special quality and require human central and sensitive interaction. First, if examine about phenomenon by Digitize and chance aspect that is risen in 21th century, Digitize is time that action occurs fusion Tuesday that is various and Blur phenomenon of city·space, and the period to collapse the border between several individual. Second, importance more than man-centered and sensitive aspect of functional physical system is risen by digital age with development of technology medium, and as the five digital senses showed up, it suggests a sensual of the times and therefore the interest and direction get set up for the sensual sides of consumers. Third, special quality is, medium enemy by that digital space connotes meaning disk floret, variability, transparency, space red of extensity etc.. to burn and is digitalised, can be risen by symbolic, original individualities and emotional communication's the importance is required sensitivity enemy who is sympathy horn by fusion anger of individual. Technology of new media may open direction of new communication through interface that did not enjoy so far is going to supply new means that can express own to human

  • PDF

Efficient K-Anonymization Implementation with Apache Spark

  • Kim, Tae-Su;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.17-24
    • /
    • 2018
  • Today, we are living in the era of data and information. With the advent of Internet of Things (IoT), the popularity of social networking sites, and the development of mobile devices, a large amount of data is being produced in diverse areas. The collection of such data generated in various area is called big data. As the importance of big data grows, there has been a growing need to share big data containing information regarding an individual entity. As big data contains sensitive information about individuals, directly releasing it for public use may violate existing privacy requirements. Thus, privacy-preserving data publishing (PPDP) has been actively studied to share big data containing personal information for public use, while preserving the privacy of the individual. K-anonymity, which is the most popular method in the area of PPDP, transforms each record in a table such that at least k records have the same values for the given quasi-identifier attributes, and thus each record is indistinguishable from other records in the same class. As the size of big data continuously getting larger, there is a growing demand for the method which can efficiently anonymize vast amount of dta. Thus, in this paper, we develop an efficient k-anonymity method by using Spark distributed framework. Experimental results show that, through the developed method, significant gains in processing time can be achieved.

MAC Protocol based on Resource Status-Sensing Scheme for Integrated Voice/Data Services (음성/데이타 통합 서비스를 위한 자원 상태 감지 기법 기반 MAC프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.141-155
    • /
    • 2002
  • A medium access control protocol is proposed for integrated voice and data services in the packet CDMA network with a small coverage. Uplink channels are composed of time slots and multiple spreading codes for each slot. This protocol gives higher access priority to the delay-sensitive voice traffic than to the data traffic. During a talkspurt, voice terminals reserve a spreading code to transmit multiple voice packets. On the other hand, whenever generating a data packet, data terminals transmit a packet based on the status information of spreading codes in the current slot, which is received from base station. In this protocol, voice packet does not come into collision with data packet. Therefore, this protocol can increase the maximum number of voice terminals.