• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.028 seconds

A Study on the Safe Monitering & Control Network Platform Using Ubiquitous Sensor Network (유비쿼터스 센서네트워크(USN)를 이용한 안전감시.통제 네트워크 기반구축에 관한연구)

  • Cheon, Dong-Jin;Park, Young-Jik;Kim, Jeong-Sub;Lee, Seung-Ho;Kwark, Dong-Kurl;Jung, Do-Young
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.111-116
    • /
    • 2008
  • 지구온난화로 재난 재해가 날로 증가 되고 있으며, 그 규모도 대형화 되고 있는 추세이다. 재난 재해의 원인으로서는 자연적인 것도 있지만 인위적인 것이 큰 부분을 차지하고 있다. 이러한 재난 재해를 사전에 예방 및 통제를 목적으로 환경정보를 수집하여 위험상태를 판단하기위해 다양한 환경정보수집 무선통신기술에 대한 연구가 활발하게 진행되고 있다. 본 연구는 이러한 목적을 달성하기 위해 다양한 환경정보수집 및 시간 장소 설치 등에 많은 편리성 및 효율성을 갖으며, Ubiquitous Sensor Network(USN)기반요소가 되는 Sensor Network Node를 연구 개발하였고, 이를 이용하여 USN 환경감시 및 통제 네트워크를 구축하여 실험을 통하여 타당성을 입증하였다.

  • PDF

Integrated Logical Model Based on Sensor and Guidance Light Networks for Fire Evacuation (화재 대피 유도를 위한 센서 및 유도등 네트워크 기반의 통합 논리 모델)

  • Boo, Jun-Pil;Kim, Do-Hyeun;Park, Dong-Gook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.109-114
    • /
    • 2009
  • At the present time, buildings are designed higher and more complex than ever before. Therefore the potential disasters are happened such as fire, power outage, earthquake, flood, hurricanes. Their disasters require people inside buildings to be evacuated as soon as possible. This paper presents a new disaster evacuation guidance concept of inner buildings, whiche aims at integrated the constructing of a sensor network and a guidance light networks in order to provide a quick detection of disasters and accurate evacuation guidance based on indoor geo-information, and sends these instructions to people. In this paper, we present the integrated logical model based on sensor and guidance light networks for the fire disaster management in inner building using our concept. And we verify proposed logical model according to experiments with visualization and operations on map.

  • PDF

Optimization of multiplication-techniques for a Pairing for sensor network security protocol based on bilinear map (Bilinear map 기반 센서네트워크 보안프로토콜을 위한 Pairing용 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Lee, Dong-Geon;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06a
    • /
    • pp.166-170
    • /
    • 2010
  • 센서네트워크는 유비쿼터스 환경을 실현할 수 있는 기술로서, 최근 무인 경비 시스템이나 에너지 관리, 환경 모니터링, 홈 자동화, 헬스케어 응용 등과 같은 다양한 응용 분야에 활용되고 있다. 하지만 자신의 정보가 무선통신상에 쉽게 노출됨으로써 도청과 전송 메시지에 대한 위변조, 서비스 거부 공격을 받을 위험이 있다. 더욱이 센서네트워크의 자원 제약성(적은 메모리, 컴퓨팅 성능의 제약)과 키분배 관리의 어려움으로 인해 기존의 공개키, 대칭키 기반의 면안프로토콜을 대체할 수 있는 프로토콜이 필요하다. 그러므로 키분배 관리에 장 접을 가지는 Bilinear map 기반 프로토콜은 적합한 대안이다. 하지만 프로토콜에 사용되는 Pairing연산은 높은 컴퓨팅 성능이 요구된다. 따라서 제한된 성능을 가진 센서상의 구현을 위해서는 Computation Cost를 줄이고 연산 수행 속도를 가속화 할 필요성이 있다. 본 논문에서는 프로토콜 구현에 필요한 Pairing의 핵심 연산인 Multiplication을 대표적인 센서노드 프로세서인 MSP430상에서 최적화 구현함으로써 성능을 개선한다.

  • PDF

Fuzzy based Verification Node Decision Method for Dynamic Environment in Probabilistic Voting-based Filtering Scheme (확률적 투표기반 여과기법에서 가변적 환경을 위한 퍼지 기반 검증 노드 결정 기법)

  • Lee, Jae-Kwan;Nam, Su-Man;Cho, Tae-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.11-13
    • /
    • 2013
  • 무선 센서 네트워크는 개방된 환경에서 무작위로 배치되어 악의적인 공격자들에게 쉽게 노출된다. 센서 노드는 한정된 에너지 자원과 손쉽게 훼손된다는 단점을 통해 허위 보고서와 투표 삽입 공격이 발생한다. Li와 Wu는 두 공격을 대응하기 위해 확률적 투표기반 여과기법을 제안하였다. 확률적 투표기반 여과기법은 고정적인 검증 경로를 결정하기 때문에 특정 노드의 에너지 자원고갈 위험이 있다. 본 논문에서는 센서 네트워크에서 보고서 여과 확률 향상을 위하여 퍼지 시스템을 기반으로 다음 노드 선택을 약 6% 효율적인 경로 선택 방법을 제안한다. 제안 기법은 전달 경로 상의 노드 중 상태정보가 높은 노드를 검증 노드로 선택하고, 선택된 검증 노드는 허용 범위 경계 값을 기준으로 공격 유형을 판별하고 여과한다. 실험결과를 통해 제안기법은 기존기법과 비교하였을 때 에너지 효율이 향상되었다.

  • PDF

Implementation of Linkage System of Traffic Applied USN (USN을 활용한 교통제어기의 연동시스템 구현)

  • Jin, Hyun-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.247-252
    • /
    • 2014
  • Traffic network is composed of passing vehicls, delayed vehicles, traffic situation which is traffic incomes of traffic interfacing system. Traffic green time light is concluded by inside input factor, that is green light cycle, yellow light cycle, led light cycle, which light cycle is sensor inputs. That light cycle is converted to traffic phase composed of passing peoples and delayed vehicles, whose intervals is concluding of traffic network factors composed of consumptiom power factors, delayed time situation, occupying sensor nodes. This is very important sector,because of much poor traffic situation.

Modeling of Metabolic Syndrome Using Bayesian Network (베이지안 네트워크를 이용한 대사증후군 모델링)

  • Jin, Mi-Hyun;Kim, Hyun-Ji;Lee, Jea-Young
    • The Korean Journal of Applied Statistics
    • /
    • v.27 no.5
    • /
    • pp.705-715
    • /
    • 2014
  • Metabolic syndrome is a major factor for cardiovascular disease that can develop into a variety of complications such as stroke disease. This study utilizes a Bayesian network to model metabolic syndrome. In addition, we tried to find the best risk combinations to diagnose metabolic syndrome. We confirmed that the combinations are difference according to individual characteristics. The paper used data from 4,489 adults who responded to all health interview questions from the the $5^{th}$ Korea National Health and Nutrition Examination Survey conducted in 2010.

Pattern-based Design and Safety Analysis for Networked Supervisory Medical Systems (네트워크 통합형 의료기기를 위한 안전한 상호작용 패턴과 구조적 안전성 검사)

  • Kang, Woochul
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.10
    • /
    • pp.561-566
    • /
    • 2014
  • There are growing demands for improving the patient safety and the effectiveness of medical services through device connectivity and interoperability. However, integration through networking might greatly increase the complexity of the system if it is not properly designed, jeopardizing patient safety. In this paper, we codify safe medical device interaction patterns, and exploit them for the low complexity design and safety analysis of networked supervisory medical systems. We implement the proposed approach as a plug-in of Architecture Analysis and Description Language (AADL). Our implementation enables the modeling and safety analysis of medical devices and their interactions before actual development.

Study on Enhancing Security Architecture in Internet of Things Environment (사물인터넷 환경에서의 강화된 보안 아키텍처에 대한 연구)

  • Lee, Jong-won;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.300-302
    • /
    • 2017
  • The Internet of Things allows you to connect everything around you to your network and make it easy to reach anytime, anywhere. The Internet of Things uses various devices such as smart devices and wireless sensors connected to the network. When any small information about command or result is exposed to the outside during communication between each terminal, there is a serious risk. The Internet has a characteristic that it is much weaker than general network in terms of security because it has limited hardware performance. In this paper, I propose an enhanced security architecture of Internet of Things considering the limitation of hardware.

  • PDF

A Study of Security Issues of Cognitive Radio Network (인지 무선통신 네트워크의 보안 문제 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.662-665
    • /
    • 2011
  • The cognitive radio (CR) network has been studied in the form of open source by vast number of communities, and the potential expectation is very high since the CR is based on reprogrammable platform. However, this characteristics of open-source software take high risk as well. As the peer-to-peer software has been abused, so high is the chance that the CR network can be abused public wide. Consequently, the benefit from the study of next-generation wireless network can be at risk because of the negative impact of violation of communication law or abusing the CR. In this contribution, we analyze the issues and the problems of the CR and discuss an efficient measure against security attacks.

  • PDF

Anomaly Detection Scheme Using Data Mining Methods (데이터마이닝 기법을 이용한 비정상행위 탐지 방법 연구)

  • 박광진;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.99-106
    • /
    • 2003
  • Intrusions pose a serious security risk in a network environment. For detecting the intrusion effectively, many researches have developed data mining framework for constructing intrusion detection modules. Traditional anomaly detection techniques focus on detecting anomalies in new data after training on normal data. To detect anomalous behavior, Precise normal Pattern is necessary. This training data is typically expensive to produce. For this, the understanding of the characteristics of data on network is inevitable. In this paper, we propose to use clustering and association rules as the basis for guiding anomaly detection. For applying entropy to filter noisy data, we present a technique for detecting anomalies without training on normal data. We present dynamic transaction for generating more effectively detection patterns.