• Title/Summary/Keyword: 노드지수

Search Result 101, Processing Time 0.029 seconds

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

A new cluster validity index based on connectivity in self-organizing map (자기조직화지도에서 연결강도에 기반한 새로운 군집타당성지수)

  • Kim, Sangmin;Kim, Jaejik
    • The Korean Journal of Applied Statistics
    • /
    • v.33 no.5
    • /
    • pp.591-601
    • /
    • 2020
  • The self-organizing map (SOM) is a unsupervised learning method projecting high-dimensional data into low-dimensional nodes. It can visualize data in 2 or 3 dimensional space using the nodes and it is available to explore characteristics of data through the nodes. To understand the structure of data, cluster analysis is often used for nodes obtained from SOM. In cluster analysis, the optimal number of clusters is one of important issues. To help to determine it, various cluster validity indexes have been developed and they can be applied to clustering outcomes for nodes from SOM. However, while SOM has an advantage in that it reflects the topological properties of original data in the low-dimensional space, these indexes do not consider it. Thus, we propose a new cluster validity index for SOM based on connectivity between nodes which considers topological properties of data. The performance of the proposed index is evaluated through simulations and it is compared with various existing cluster validity indexes.

Analysis of Lower Somatotype on Adult Women and Appearance Analysis of Flare Skirts by using the Image Processing (성인 여성의 하반신 체형분석과 염상처리를 이용한 플레어 스커트의 외관분석)

  • Lee, Soo-Jung;Hong, Jeong-Min
    • Fashion & Textile Research Journal
    • /
    • v.1 no.3
    • /
    • pp.252-258
    • /
    • 1999
  • The aims of this study is to classify the lower somatotype of adult women and appearance analysis on the shape of flare skirts by using the image processing. Also We have made skirts in order to analyze the various types of appearance of flare skirts by using the image processing. The subjects for our wear test lower somatotype, who were controlled in their waist, abdomen and hip shapes. The flare skirts used for wear test were 112 types(combinated 14 fabric type and 8 lower somatotype). The effect of lower somatotype on the shape of flare skirts was determined by the horizontally hem line section shape and the silhouette of flare skirts with image processing. The data were analyzed by using analysis of variance and Turkey, Duncan multiple range test. The results obtained are summarized as follows: It is shown that the fabric weight elongation differs in fabrics properties, in direction of textures. The shape horizontal section of flare skirt hem line has differed with the number of nodes, wave-height of nodes and breadth of silhouette by fabrics properties and lower somatotype. It is noticed that the breadth of flare skirts by the silhouette has high correlation with the drape ability of fabrics and lower somatotype. Results for our flare skirts show changes in amplitude and mean with fabrics, somatotype. Therefore we can say that gray-level histograms are correlated with changes in appearance, differences in drape spacing and related fabric properties and their somatotype.

  • PDF

Measuring the Connectivity of Nodes in Road Networks (도로 네트워크의 노드 연계성 산정에 관한 연구)

  • Park, Jun-Sik;Gang, Seong-Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.4
    • /
    • pp.129-139
    • /
    • 2010
  • This study proposes a model for measuring the connectivity of nodes in road networks. The connectivity index between two nodes is characterized by the number of routes, degree of circuitousness, design speed, and route capacity between the nodes. The connectivity index of a node is then defined as the weighted average of the connectivity indexes between the node and other nodes under consideration. The weighting factor between two nodes is determined by the travel demand and distance between them. The application of the model to a toy network shows that it reasonably well quantifies the level of connectivity of nodes in the network. If flow of rail networks can be measured in the same scale as that of road networks and the capacity of rail links can be estimated, the model proposed in this paper could be applied to intermodal transportation networks as well.

Beacon Node Based Localization Algorithm Using Received Signal Strength(RSS) and Path Loss Calibration for Wireless Sensor Networks (무선 센서 네트워크에서 수신신호세기와 전력손실지수 추정을 활용하는 비콘 노드 기반의 위치 추정 기법)

  • Kang, Hyung-Seo;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.15-21
    • /
    • 2011
  • In the range-based localization, the localization accuracy will be high dependent on the accuracy of distance measurement between two nodes. The received signal strength(RSS) is one of the simplest methods of distance measurement, and can be easily implemented in a ranging-based method. However, a RSS-based localization scheme has few problems. One problem is that the signal in the communication channel is affected by many factors such as fading, shadowing, obstacle, and etc, which makes the error of distance measurement occur and the localization accuracy of sensor node be low. The other problem is that the sensor node estimates its location for itself in most cases of the RSS-based localization schemes, which makes the sensor network life time be reduced due to the battery limit of sensor nodes. Since beacon nodes usually have more resources than sensor nodes in terms of computation ability and battery, the beacon node based localization scheme can expand the life time of the sensor network. In this paper, therefore we propose a beacon node based localization algorithm using received signal strength(RSS) and path loss calibration in order to overcome the aforementioned problems. Through simulations, we prove the efficiency of the proposed scheme.

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

Power-Laws Exponents of the Domestic AS-level Internet Topology based on the Valley-free BGP Routing Policy (BGP 밸리-프리 라우팅 정책에 기반한 국내 AS 레벨 인터넷 토폴로지의 파워-로 지수)

  • Kang, Koo-Hong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • Faloustsos et al.[1,2] showed successfully that the power-laws describe the heavy-tailed distributions of the AS level Internet topology properties such as node degree. This result allows us to represent the characteristics of AS-level Internet topology using some power-law exponents with elegant and simple. In this paper, we obtained the power-law exponents of the domestic AS-level Internet topology properties - the node degree, the number of pairs within hops, and eigenvalues of the graph - based on the valley-free BGP routing policy. We used the real data sets from UCLA IRL laboratory, and showed that these power-laws fit the real data pretty well resulting in correlation coefficient of 90.7%, 96.5%, and 97%, respectively. In particular, rounding the effective diameter to three, approximately 91% of the pairs of nodes are within this distance; that is, we might conclude our topology is pretty well organized.

Phased Clustering Scheme of Two-Levels in Wireless Sensor Networks (무선 센서 네트워크에서 2-레벨에 따른 단계적 클러스터링 기법)

  • Lee, Seong-Lyong;Park, JiSu;Shon, Jin Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.166-169
    • /
    • 2014
  • 무선 센서 네트워크는 제한된 에너지를 가진 센서 노드들로 구성되며, 센서 노드의 에너지를 효율적으로 활용하기 위해 클러스터링 알고리즘을 사용한다. 균형 있는 클러스터 구성을 위해서는 클러스터 헤드의 선정이 중요하다. 기존의 연구는 확률, 노드의 잔여 에너지, 이웃 노드의 수, 이웃 노드와의 거리 등의 정보를 활용하여 클러스터 헤드를 선정하였다. 그러나 확률은 클러스터 헤드의 밀집으로 인한 에너지 소비의 불균형이 있을 수 있으며, 이웃 노드와의 정보 비교는 필요한 정보 수집을 위해 많은 에너지가 필요하다. 이러한 문제점을 개선하기 위해 본 논문은 센서 노드를 베이스 스테이션과의 거리에 따라 2-레벨로 나누고 각 상위 레벨에 속한 동일한 하위 레벨을 순차적으로 변경해가며 클러스터를 구성하는 기법을 제안한다.

Manufacturing Process Modeling Using Basic Nodes and Flowchart (베이직 노드와 플로우 차트를 활용한 프로세스 모델링)

  • Kim, Kyeong-Sik;Im, Byung-Muk;Chi, Su-Young;Yoo, Kwan-Hee;Ahn, Da-Mi;Choi, Eun-Seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.415-416
    • /
    • 2015
  • 기존에 활용되고 있는 Flowchart와 프로세스를 설명하는데 활용되는 노드 모형을 선정하여 8종의 기본 노드를 구성하고, 이를 기반으로 생산 공정의 프로세스 모델링 방법론을 제시한다. 이는 사용자의 활용성과 모델링 툴의 경량화에 기여한다.

  • PDF

D-LEACH: A Routing Technique Considering Transmission Direction of Sensor Nodes in WSNs (WSN에서 센서 노드의 데이터 전송방향을 고려한 라우팅 기법)

  • Noh, Kyeong Mi;Park, Ji Su;Shon, Jin Gon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.132-135
    • /
    • 2017
  • 무선 센서 네트워크에서 센서 노드는 한정된 에너지를 가진다. 이에 센서 노드의 전송 에너지의 효율을 높여 네트워크의 수명을 연장하는 것이 중요하다. 무선 센서 네트워크에서 LEACH는 클러스터 헤드가 난수를 이용한 확률값으로 선출하여 주변 노드들과 함께 클러스터를 구성한다. 그러나 노드들이 베이스 스테이션과 클러스터 헤드 사이에 존재할 경우 클러스터 헤드로 데이터를 전송하게 되므로, 베이스 스테이션의 역방향으로 전송하게 된다. 이는 역방향 전송을 받은 클러스터 헤드가 다시 베이스 스테이션에 데이터를 전송하게 되어 불필요한 에너지를 소비한다. 본 논문에서는 LEACH의 불필요한 전송 에너지의 소비를 줄이기 위하여 D-LEACH를 제안한다. D-LEACH는 센서 노드와 베이스 스테이션 그리고 클러스터 헤드 사이의 거리를 계산하여 직접 전송하거나 멀티 홉 전송으로 데이터의 전송방향을 베이스 스테이션이 위치한 방향으로만 전송하게 함으로 전송 에너지 효율을 높인다.