• Title/Summary/Keyword: 네트워크 신뢰도

Search Result 2,118, Processing Time 0.028 seconds

A Measurement Allocation for Reliable Data Gathering in Spatially Corrected Sensor Networks (공간상관 센서네트워크에서 신뢰성 있는 데이터 수집을 위한 측정의 분배)

  • Byun, Sang-Seon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.434-437
    • /
    • 2016
  • In this paper, we consider a measurement allocation problem for gathering reliable data from a spatially correlated sensor field. We allocate the probability of each sensor's being measured considering its marginal contribution in entire data gathering; higher measurement probability is given to a sensor that gives higher reilable data. First we establish a correlation model considering limit in each sensor's transmission power, noise in the process of measurement and transmission, and attenutations in wireless channel. Then we evaluate the reliability of gathered data by estimating distortion error in sink node. We model the measurement allocation problem in spatially correlated sensor field into a cooperative game, and quantifiy each sensor's marginal contribution using Shapley Value. Then, the probability of each sensor's being measured is given in proportion to the Shapley Value.

  • PDF

Static Filtering Probability Control Method Based on Reliability of Cluster in Sensor Networks (센서 네트워크에서 클러스터 신뢰도 기반 정적 여과 확률 조절 기법)

  • Hur, Suh-Mahn;Seo, Hee-Suk;Lee, Dong-Young;Kim, Tae-Kyung
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.161-171
    • /
    • 2010
  • Sensor Networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. Ye et al. proposed the Statistical En-route Filtering scheme to overcome this threat. In statistical en-route filtering scheme, all the intermediate nodes perform verification as event reports created by center of stimulus node are forwarded to the base station. This paper applies a probabilistic verification method to the Static Statistical En-route Filtering for energy efficiency. It is expected that the farther from the base station an event source is, the higher energy efficiency is achieved.

Design of error control method for Reliable Multicast Transport (신뢰성 있는 멀티캐스트 전송을 위한 에러 제어 방법 설계)

  • 정세환;박용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.382-384
    • /
    • 2003
  • 인터넷 멀티캐스트 서비스는 네트워크 자원의 효율적 사용이라는 장점과 15년 이상의 연구, 개발에도 불구하고 아직 보편화 되지 못하고 있다. 이는 멀티캐스트 서비스가 망에서 지원이 잘 되지 않고 있고. 멀티캐스트 망 관리의 어려움. Killer Application 부재 등 많은 문제점이 있고, 멀티캐스트 서비스의 신뢰성 보장이 되지 않고 있다는 것도 하나의 문제점 이라고 할 수 있다. 본 논문에서는 인터넷 멀티캐스트 서비스의 신뢰성 보장을 위한 방법으로 기존에 발표된 트리기반의 프로토콜인 RMTP (Reliable Multicast Transport Protocol)[1]. [2]의 단점을 보완하여 신뢰성 있는 멀티캐스트 전송을 위한 방법을 제안하고자 한다.

  • PDF

Proposal of Network Security Architecture for Next Generation Networks (차세대 네트워크(NGN)을 위한 네트워크 보안 구조 제안)

  • Oh, Seung-Hee;Nam, Taek-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1905-1908
    • /
    • 2003
  • 현재 네트워크는 유 무선이 통합되는 차세대 네트워크(NGN), 유비쿼터스 시대로 발전하고 있다. 현대인의 네트워크에 대한 의존도가 커질수록, 네트워크 취약점을 악용한 사이버상의 위협과 새로운 공격 유형이 급증하고 있다. 보다 안전하고 신뢰할 수 있는 네트워크 환경을 위해 다양한 보안 제품들이 등장하고 서로의 기능들을 통합하여 더 나은 보안 서비스를 제공하고자 노력하고 있으나, 기존의 대표적인 보안 제품들로는 그 한계가 있다. 따라서 네트워크 자체가 취약점과 공격을 받더라도 지속적으로 서비스를 제공할 수 있고, 빠른 보안 업데이트를 통해 네트워크 자체의 붕괴를 미연에 예방 가능한 새로운 네트워크 보안 구조가 요구된다. 본 논문에서는 차세대 네트워크 발전 방향에 적합한 네트워크 보안 구조를 제안하고, 제안하는 구조에서 네트워크 보안 시나리오를 제시하여 검증한다.

  • PDF

Validation of Sensing Data Based on Prediction and Frequency (예측 및 빈도 기반의 센싱데이터 신뢰도 판단 기법)

  • Lee, SunYoung;Kim, Ki-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1398-1405
    • /
    • 2016
  • As wireless sensor networks become eligible as well as useful in several controled systems where surrounding environments are likely to be monitored, their stabilization become important research challenge. Generally, stabilization is mostly dependent on reliability of sensing value. To achieve such reliability in wireless sensor networks, the most of previous research work have tendency to deploy the same type of multiple sensor units on one node. However, these mechanisms lead to deployment problem by increasing cost of sensor node. Moreover, it may decrease reliability in the operation due to complex design. In order to solve this problem, in this paper, we propose a new validation scheme which is based on prediction and frequency value. In the proposed scheme, we take into exceptional cases account, for example, outbreak of fire. Finally, we demonstrate that the proposed scheme can detect abnormal sensing value more than 13 percent as compared to previous work through diverse simulation scenarios.

New formula in domination theory and it's application for reliability analysis (Domination이론에서의 새로운 식과 이의 신뢰성계산에 대한 적용)

  • 이광원;이일재;강신재
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.1
    • /
    • pp.16-26
    • /
    • 1996
  • In a series of original papers, [1-17] efficient methods and algorithms have been presented, for the exact solution of many reliability problems represented by binary networks. A starting point of these methods was the concept of domination, firstly introduced in ,elation with reliability problems in [2]. It's application to directed networks resulted in the development of a topological formula for the classical problem of the two terminal reliability. This result was extended later to the all-terminal and the k-terminal reliability problems. All papers mentioned above use a path oriented representation for the network topology. In practical applications, however, it is common and often advantageous to work with cut sets. This article considers the Domination theory for reliability problem of a network. Some topological formula are derived and the power and the application of this formula are shown through the alternative proof of topological formula of A. Satyanarayana [2].

  • PDF

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

Visualized recommender system based on Freebase (Freebase 기반의 추천 시스템 시각화)

  • Hong, Myung-Duk;Ha, Inay;Jo, Geun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.23-37
    • /
    • 2013
  • In this paper, the proposed movie recommender system constructs trust network, which is similar to social network, using user's trust information that users explicitly present. Recommendation on items is performed by using relation degree between users and information of recommended item is provided by a visualization method. We discover the hidden relationships via the constructed trust network. To provide visualized recommendation information, we employ Freebase which is large knowledge base supporting information such as movie, music, and people in structured format. We provide three visualization methods as the followings: i) visualization based on movie posters with the number of movies that user required. ii) visualization on extra information such as director, actor and genre and so on when user selected a movie from recommendation list. iii) visualization based on movie posters that is recommended by neighbors who a user selects from trust network. The proposed system considers user's social relations and provides visualization which can reflect user's requirements. Using the visualization methods, user can reach right decision making on items. Furthermore, the proposed system reflects the user's opinion through recommendation visualization methods and can provide rich information to users through LOD(Linked Open Data) Cloud such as Freebase, LinkedMDB and Wikipedia and so on.

A Reliable Transmission and Buffer Management Techniques of Event-driven Data in Wireless Sensor Networks (센서 네트워크에서 Event-driven 데이터의 신뢰성 있는 전송 및 버퍼 관리 기법)

  • Kim, Dae-Young;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.867-874
    • /
    • 2010
  • Since high packet losses occur in multi-hop transmission of wireless sensor networks, reliable data transmission is required. Especially, in case of event-driven data, a loss recovery mechanism should be provided for lost packets. Because retransmission for lost packets is requested to a node that caches the packets, the caching node should maintains all of data for transmission in its buffer. However, nodes of wireless sensor networks have limited resources. Thus, both a loss recovery mechanism and a buffer management technique are provided for reliable data transmission in wireless sensor networks. In this paper, we propose a buffer management technique at a caching position determined by a loss recovery mechanism. The caching position of data is determined according to desirable reliability for the data. In addition, we validate the performance of the proposed method through computer simulations.

Tweet Acquisition System by Considering Location Information and Tendency of Twitter User (트위터 사용자의 위치정보와 성향을 고려한 트윗 수집 시스템)

  • Choi, Woosung;Yim, Junyeob;Hwang, Byung-Yeon
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.1-8
    • /
    • 2014
  • While SNS services such as Twitter or Facebook are rapidly growing, research for the SNS analysis has been concerned. Especially, twitter reacts to social issues in real-time so that it is used to get useful experimental data for researchers of social science or information retrieval. However, it is still lack of research on the methodology to collect data. Therefore, this paper suggests the tweet acquisition system by considering tendency of twitter user oriented location-based event and political social event. First the system acquires tweets including information of location and keyword about event and secure IDs for acquisition of political social event. Then we plan ID-analyzer to classify the tendency of users. In addition for measuring reliability of ID-analyzer, it acquires and analyzes the tweet by using high-ranked ID. In analyses result, top-ranked ID shows 88.8% reliability, 2nd-ranked ID shows 76.05% and ID-analyzer shows 77.5%, it shortens collection time by using minority ID.