• Title/Summary/Keyword: 네트워크 신뢰도

Search Result 2,110, Processing Time 0.035 seconds

Reliable Hub Location Problems and Network Design (신뢰성에 기반한 허브 입지 모델과 네트워크 디자인)

  • Kim, Hyun
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.540-556
    • /
    • 2009
  • The hub and spoke network is a critical network-based infrastructure that is widely applied in current transportation and telecommunications systems, including Internets, air transportation networks and highway systems. This main idea of hub location models is to construct a network system which achieves the economy of scale of flows. The main purpose of this study is to introduce new hub location problems that take into account network reliability. Two standard models based on assignment schemes are proposed, and a minimum threshold model is provided as an extension in terms of hub network design. The reliability and interaction potentials of 15 nodes in the U.S. are used to examine model behaviors. According to the type of models and reliability, hubs, and minimum threshold levels, relationships among the flow economy of scale, network costs, and network resiliency are analyzed.

  • PDF

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Ra In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1055-1059
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts the acquisited sensing data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In his paper, we proposes a reliable congestion protocol, called HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.

A Design of Hop-by-Hop based Reliable Congestion Control Protocol for WSNs (무선 센서 네트워크를 위한 Hop-by-Hop 기반의 신뢰성 있는 혼잡제어 기법 설계)

  • Heo Kwan;Kim Hyun-Tae;Yang Hae-Kwon;Ra In-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.442-445
    • /
    • 2006
  • In Wireless Sensor Networks(WSNs), a sensor node broadcasts an acquisited data to neighboring other nodes and it makes serious data duplication problem that increases network traffic loads and data loss. This problem is concerned with the conflict condition for supporting both the reliability of data transfer and avoidance of network congestion. To solve the problem, a reliable congestion control protocol is necessary that considers critical factors affecting on data transfer reliability such as reliable data transmission, wireless loss, and congestion loss for supporting effective congestion control in WSNs. In this paper, we proposes a reliable congestion protocol, ratted HRCCP, based on hop-hop sequence number, and DSbACK by minimizing useless data transfers as an energy-saved congestion control method.

  • PDF

Evaluating the User Reputation through Social Network on UCC Video Services (UCC 비디오 서비스에서 소셜 네트워크를 통한 사용자 신뢰도 도출)

  • Cho, Hyun-Chul;Han, Yo-Sub;Kim, Lae-Hyun
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.273-277
    • /
    • 2009
  • Recently user-generated contents have been drastically increased. In this paper, we introduce the user reputation which can be used to evaluate quality of the content they created. First we have composed a social network that is based on user activity. And we have developed the algorithm to evaluate the users' reputation using this social network.

  • PDF

A Data Transport Method for the Reliability Assurance in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 신뢰성 증진을 위한 데이터 전송 방법)

  • Lee, Won-Jin;Kim, Seung-Cheon;Lee, Jae-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.37-38
    • /
    • 2007
  • 유비쿼터스 센서 네트워크의 이용분야가 늘어남에 따라, 전송 신뢰성확보의 필요성이 커져 이에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 기존의 통신 방법에 적용할 수 있는, 추가비용 없이 신뢰성을 확보할 수 있는 방법을 제안하고 있다. 이 방법은 센서 네트워크의 특성을 고려하여 에너지 소비를 최소화하였고, 각 노드간의 신뢰성을 확보함으로써 전체 라우팅 경로의 신뢰성을 확보하게 된다.

  • PDF

Reliable Data Transmission using Path-Reliability with Selective, Implicit Acknowledgement (경로별 신뢰도에 따른 선택적, 묵시적 응답을 사용하는 신뢰성있는 데이터 전송 방법)

  • Lee, Ga-Won;Han, Seung-Min;Kim, Kyu-Jin;Huh, Eui-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1300-1302
    • /
    • 2009
  • 인간 생활의 질적인 향상을 위해, 각종 시스템이 연구되고 있다. 특히 작고 설치가 용이한 센서를 중심으로 Ubiquitous 분야가 발달하고 있으며, 센서 네트워크에 대한 연구가 활발히 진행되고 있다. 특히 일반적인 생활에는 물론 의료, 노약자의 보호, 위험 감지 등의 중요한 분야에까지 센서 네트워크가 활용됨으로써 데이터 전송의 정확성과 신뢰성은 중요한 문제로 대두되었다. 이에 본 논문에서는, 센서의 특성과 무선 통신의 특징을 고려하여 에너지 효율성 및 데이터 전송의 신뢰성을 향상시키기 위한 방법을 제시하고자 한다. 특히 RSSI 신호와 채널 에러율을 함께 이용하여 각 노드 경로별 신뢰도를 계산하고, 이에 따라 선택적으로 Acknowledgement를 사용하며 오버히어링 문제를 역으로 이용하여, 묵시적 Acknowledgement로 사용함으로써 에러율이 높고 에너지가 한정되어있는 무선 센서 네트워크에서 계속적인 ACK/NACK 사용으로 인한 에너지 소비 및 트래픽 낭비를 줄이고자 한다.

An Indirect Reliability Detection Scheme Considering Connection Relationships and Interests in Social Networks (소셜 네트워크에서 관심분야와 연결 관계를 고려한 간접 신뢰도 검출 기법)

  • Seo, InDeok;Lim, Jongtae;Bok, Kyoungsoo;Lee, Byoungyup;Yoo, Jaesoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.41-42
    • /
    • 2017
  • 소셜 네트워크 환경에서 간접 신뢰도는 직접 연결이 존재하지 않는 사용자들의 신뢰도를 평가하는데 유용한 신뢰도 평가 기법이다. 본 논문에서는 사용자간 관심분야와 연결 관계를 고려한 새로운 간접 신뢰도 검출 기법을 제안한다. 제안하는 기법은 사용자의 행위를 분석하여 관심분야를 도출한다. 또한, 멀티 홉으로 연결된 사용자간 신뢰도가 거리에 따라 변동하는 문제를 해결하기 위해 사용자간 연결 관계를 고려하여 간접 신뢰도를 검출한다.

  • PDF

Security and Privacy Mechanism using TCG/TPM to various WSN (다양한 무선네트워크 하에서 TCG/TPM을 이용한 정보보호 및 프라이버시 매커니즘)

  • Lee, Ki-Man;Cho, Nae-Hyun;Kwon, Hwan-Woo;Seo, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.195-202
    • /
    • 2008
  • In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wareless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.

  • PDF

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.

Design and Implementation about Trust Evaluation Mechanism of Distributed Services In Mobile Ad-hoc Network (Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현)

  • Jang, Jong-Deok;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.29-34
    • /
    • 2009
  • The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

  • PDF