• Title/Summary/Keyword: 네트워크 디자인

Search Result 432, Processing Time 0.038 seconds

A Study of Scheduling Method for Wireless Sensor Network using the Combinatorial Theory under IoT Environment (사물인터넷환경에서 조합론을 이용한 무선센서 네트워크 스케줄링 기법에 대한 연구)

  • Song, Teuk Seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.165-166
    • /
    • 2015
  • Recently, IoT is a hot issue in the IT research and industry area. Wireless Sensor plays a key roll in the in the IoT. Usually the device of the wireless sensor has tinyOS and small battery power. Hence there are a lot of previous research that want to extend the life time. In this paper, we will introduce the scheduling method based on the combinatorial theory.

  • PDF

A Study on Misused Key Detecting Mechanism for using Chain Based Wireless Sensor Networks (체인 기반 무선 센서 네트워크에서 오용키 탐지를 위한 방안 연구)

  • Park, Min-Woo;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.800-803
    • /
    • 2010
  • 센서 노드는 제한적인 에너지를 가지기 때문에 라우팅 기법 개발에 있어 에너지 효율은 중요한 디자인 요소이다. 체인 기반 클러스터 구조의 라우팅 기법은 각 센서 노드에서 수집되는 유사한 정보를 베이스 스테이션에 효율적으로 전하기 위한 라우팅 기법이다. 체인 기반 클러스터 구조의 라우팅 기법은 에너지 효율적으로 정보를 모을 수 있는 장점을 가지지만, 센서 노드의 키를 오용하여 메시지를 삽입, 수정하는 공격이 발생할 경우 매우 큰 피해를 입게 되는 단점이 있다. 따라서, 체인 기반 클러스터 구조의 라우팅 기법을 사용하는 무선 센서 네트워크에서는 키의 오용을 탐지하고 이를 막는 기술이 매우 중요하다. 본 논문에서는 체인 기반 무선 센서 네트워크 환경에서 센서 노드의 키의 오용을 막는 효율적인 방법에 대해 제시한다.

Fandom-Persona Design based on Social Network Analysis (소셜 네트워크 분석을 이용한 팬덤 페르소나 디자인)

  • Sul, Sanghun;Seong, Kihun
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.87-94
    • /
    • 2019
  • In this paper, the method of analyzing the unformatted data of consumers accumulated on social networks in the era of the Fourth Industrial Revolution by utilizing data from the service design and social psychology aspects was proposed. First, the fandom phenomenon, which shows subjective and collective behavior in a space on a social network rather than physical space, was defined from a data service perspective. The fandom model has been transformed into a collective level of customer Persona that has been analyzed at a personal level in traditional service design, and social network analysis that analyzes consumers' big data has been presented as an efficient way to pattern and visually analyze it. Consumer data collected through social leasing were pre-processed by column based on correlation, stability, missing, and ID-ness. Based on the above data, the company's brand strategy was divided into active and passive interventions and the effect of this strategic attitude on the growth direction of the consumer's fandom community was analyzed. To this end, the fandom model of consumers was proposed by dividing it into four strategies that the brand strategy had: stand-alone, decentralized, integrated and centralized, and the fandom shape of consumers was proposed as a growth model analysis technique that analyzes changes over time.

Implementation of Geosensor Interface using Object Oriented Design Pattern (객체지향 설계 유형에 의한 지오센서 인터페이스 구현)

  • Baek, Jeong-Ho;Lee, Hong-Ro
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.3
    • /
    • pp.193-206
    • /
    • 2006
  • This paper proposes The Efficient method that should design Geosensor model based on object oriented design pattern and implement the Geosensor network interface system using JBuilder. Such as geosensor technology will be to a new research paradigm of GIS which can manage a great quantity of field information by means of constructing the real time remote sensing network. The technology that integrates object oriented design pattern Geosensor interface network with GIS will be necessary elements that satisfy the function of GIS increasing day by day. Therefore, we would like to utilize GoF design pattern in order to change for the better object oriented Geosensor middleware. This paper shall contribute to implementing the optimal Geosensor interface that can develop reusable, modular and modifiable software by using the object oriented design pattern.

  • PDF

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

A Study of Two Rate Three Color Maker for Differentiated Service Network (차별화된 서비스 네트워크를 위한 two rate Three Color Maker에 관한 연구)

  • Nyamdagva, Nyamdagva;Ho, Kwang-Chun;Park, Chun-Kwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.23-30
    • /
    • 2009
  • This paper addresses the design of trTCM (Two Rate Three Color Marker) described in RFC2698. It has proposed for trTCM to be used in Differentiated Service network that provides AF PHB (Assured Forwarding Per Hop Behavior). trTCM is the marker with the metering function, and consists of the token updating function and the marking function. The token updating function uses the dual token bucket. The marking function compares the token values with the length of input packet and then marks the result into IP QoS field (ToS field). In this paper, we design trTCM function and then addresses the scheme to implement it using FPGA technology.

  • PDF