• Title/Summary/Keyword: 네트워크 신뢰도

Search Result 2,118, Processing Time 0.033 seconds

BU-Chord Mechanism for Reliable P2P File Sharing over MANET (모바일 에드 혹 네트워크 상의 신뢰성 있는 P2P 파일 공유를 위한 BU-Chord 메커니즘)

  • Jeong Hong-Jong;Song Jeom-Ki;Kim Dong-Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4B
    • /
    • pp.333-343
    • /
    • 2006
  • MANET and P2P applications have a common nature that they don't have any fixed infrastructures that might maintain network topologies. With such common characteristics, a P2P application can be a killer application over MANET. Due to absence of reliable node which serves indexing services in MANET, fully distributed P2P applications are more suitable for MANET. By using DHT like Chord, we can save network bandwidth and avoid a point of failure of a directory server. However, since MANET allows nodes to depart from network freely, P2P file sharing applications using Chord lookup protocol should address how to recover the keys stored at the departed node. In this paper, we propose BU-Chord in order to detect and recover the departure of nodes by creating and storing backup file information in distributed manner. Our BU-Chord shows off better performance than existing Chord especially in case of high departure rate of nodes.

A Study about UCC Communication Structure for improving Social Trust (소셜 신뢰 제고를 위한 UCC 의사소통구조에 관한 연구)

  • Kang, Jang-Mook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.209-216
    • /
    • 2012
  • The purpose of this study is to find the UCC (User Created Contents) communication structure in the perspective of smart-phone technologies or SNS (Social Network Service). In developing the research model, we have focused on selecting the success factors appropriate for the UCC through reviewing past researches and on developing more accurate success measures. The model consists of relation each service (Facebook linked in Flickr and so on), relation of trust, transfer to Social Capital and so on . The result shows thar process of trust based in UCC is the most important determinants of structure and organization network. And collaboration relationship is the most important of SNS used in SSO and Open-API technologies. The practice characteristic of UCC has direct and indirect effect on SNS of improving social trust.

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

Reliability-Based Adaptive Consensus Algorithm for Synchronization in a Distributed Network (분산 네트워크에서 단말 간 동기화를 위한 신뢰도 기반의 적응적 컨센서스 알고리즘)

  • Seo, Sangah;Yun, Sangseok;Ha, Jeongseok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.545-553
    • /
    • 2017
  • This paper investigates a synchronization algorithm for a distributed network which does not have a centralized infrastructure. In order to operate a distributed network, synchronization across distributed terminals should be acquired in advance, and hence, a plenty of distributed synchronization algorithms have been studied extensively in the past. However, most of the previous studies focus on the synchronization only in fault-free networks. Thus, if there are some malfunctioning terminals in the network, the synchronization can not be guaranteed with conventional distributed synchronization methods. In this paper, we propose a reliability-based adaptive consensus algorithm which can effectively acquire the synchronization across distributed terminals and confirm performance of the proposed algorithm by conducting numerical simulations.

Improving Reliability and Security in IEEE 802.15.4 Wireless Sensor Networks (IEEE 802.15.4 센서 네트워크에서의 신뢰성 및 보안성 향상 기법)

  • Shon, Tae-Shik;Park, Yong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.407-416
    • /
    • 2009
  • Recently, various application services in wireless sensor networks are more considered than before, and thus reliable and secure communication of sensor network is turning out as one of essential issues. This paper studies such communication in IEEE 802.15.4 based sensor network. We present IMHRS (IEEE 802.15.4 MAC-based Hybrid hop-by-hop Reliability Scheme) employing EHHR (Enhanced Hop-by-Hop Reliability), which uses Hop-cache and Hop-ack and ALC (Adaptive Link Control), which considers link status and packet type. Also, by selecting security suite depending on network and application type, energy efficiency is considered based on HAS (Hybrid Adaptive Security) Framework. The presented schemes are evaluated by simulations and experiments. Besides, the prototype system is developed and tested to show the potential efficiency.

A Correction Security Framework for Reliable Internet Services (신뢰성 있는 인터넷 서비스 제공을 위한 교정 보안 프레임워크)

  • Lee, Seung-Min;Nam, Taek-Yong;Sohn, Sung-Won;Han, Chi-Moon
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.779-786
    • /
    • 2003
  • We propose a correction security framework as next generation security technology to provide secure and reliable Internet services. The framework guarantees durability of the services in spite of external attack, intrusion, vulnerability for fault tolerance, and network management technology that covers the set of techniques aimed at providing rapid service recovery. The improvement technology includes system itself improvement and synamic improvement preventing faults from being re-activated, in cooperation with other systems such as vulnerability anaysis system, NMS, ESM. It is expected that our framework will be applied to global networks as well as system alone, and be able to guarantee the network survivability and reliable Internet services.

Privilege Management Technique for Unreliable Network Environments based on Tree Structure (신뢰도가 낮은 네트워크 환경을 위한 트리 구조 기반의 권한 관리 기법)

  • Yang, Soo-Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.83-91
    • /
    • 2008
  • IISO/IEC 9594-8 defines the public key framework and attribute certificate framework. Attribute certificate framework deals with privilege management infrastructure(PMI). In PMI, for privilege management using attribute certificates, role assignment certificates and role specification certificates are used to assign and specify privileges independently. Role specification certificates includes privilege specifications and the details far privilege management of network environments. Privilege management of unreliable network environment tries to enhance the reliability and efficiency of privilege information transmission forwarding over unreliable routes in the presence of potentially faulty nodes and edges. Each node forms a role specification tree based on role specification relationship data collected from the network. In this paper privilege management cost with the role specification certificates tree structure is evaluated trying to reduce the overhead incurred by role creation and modification of privileges. The multicasting of packets are used for scalability. We establish management cost model taking into account the packet loss and node reliability which continuously join and leave for network. We present quantitative results which demonstrate the effectiveness of the proposed privilege management scheme.

A Reliable Data Transfer Mechanism Using Directed Diffusion in Wireless Sensor Networks (무선 센서 네트워크에서 Directed Diffusion을 이용한 신뢰성 있는 데이터 전달 기법)

  • Choi Jae-Won;Lee Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.77-83
    • /
    • 2006
  • In this paper, we have pesented a reliable data transfer mechanism using Directed Diffusion in WSNs (fireless Sensor Networks). This mechanism involves selecting a route with higher reachability and transferring data along the route chosen, which is based on the end-to-end reliability calculated by the dissemination procedure of Interest packets, while each node of a sensor network maintains the only information on its neighborhood. We performed various experiments changing the link error rates and the number of nodes and discovered that this proposed mechanism improves event-to-sink data transfer reliability in WSNs. We also found that this mechanism spreads traffic load over and reduces energy consumption, which in turn prolongs network lifetime.

Source to teminal reliability evaluation by network decomposition (분할에 의한 네트워크의 국간신뢰도 계산)

  • 서희종;최종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.2
    • /
    • pp.375-382
    • /
    • 1996
  • In this paper, aneffective method for computing source to terminal reliability of network by decomposition is described. A graph is modeled after a network, and decomposed into two subgraphs. A logic product term of one subgraph is computed, and a graph of the other subgraphs is made according to the event representing the logic product term, and it's logic product term is compted. By multiplying the logic product term of one subgraph by that of the other subgraphs, a method for computing the source to terminal reliability is proposed. the time complexity for computing all the logic product terms of one subgraph is the product of copies of the number of edges in the subgraph of 2, and that of the other subgraph is the number of edges multiplied by the number of logic product terms. This method requires less computation time than that not by decomposition.

  • PDF

Retransmission Number and ACK Path Setting Scheme for Efficient Data Transmission In Wireless Sensor Network (무선센서네트워크에서 에너지 효율적인 데이터 전송을 위한 재전송 횟수와 ACK 전송 경로 설정 기법)

  • Hwang, Boram;Shon, Minhan;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.671-672
    • /
    • 2011
  • 비 신뢰적이고 비 대칭적인 무선 링크를 갖는 무선센서네트워크에서 데이터전송이 성공했음에도 ACK 메시지 전송 실패로 발생하는 불필요한 데이터 재전송을 피해 에너지 효율을 높이는 전송기법들이 제안되었다. 이러한 전송기법의 하나인 Probability-based Data Forwarding(PDF)기법에서 기대 전송 횟수 임계치를 설정해 임계값만큼 데이터를 재전송 하였다면 더 이상 재전송하지 않음으로 불필요한 에너지 낭비를 줄인다. 하지만 PDF 는 데이터 전송 횟수만을 고려함으로, 여전히 ACK 메시지의 신뢰성 있는 전송을 보장하지 못한다. 따라서 본 논문은 에너지 효율적인 PDF 기법에 비 대칭적 무선 노드의 특성을 고려하여 ACK 메시지 전송 시 사용되는 역방향 링크의 신뢰성이 낮다면 높은 신뢰성의 역방향 링크를 갖는 노드들을 선택하여 멀티 홉으로 송신 노드에게 ACK 메시지를 전송하는 기법을 적용한다. 이를 통해 불필요한 데이터 전송을 줄여 에너지의 낭비를 줄이고 무선센서네트워크의 수명을 연장한다.