• Title/Summary/Keyword: 데이터 전송 프로토콜

Search Result 1,489, Processing Time 0.026 seconds

Analysis of the S-MAC/T-MAC Protocol for Wireless Sensor Networks (무선 센서망의 에너지 효율적 MAC(S-MAC/T-MAC) 성능 분석)

  • Lee Woo-Chul;Lee Yoo-Tae;Kim Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.99-103
    • /
    • 2006
  • In this paper, we focus on the problem of designing an energy efficient MAC protocol for wireless sensor networks and analyze S(Sensor)-MAC and T(Time-out)-MAC. S-MAC is based on the concept of the 'listen/sleep mode cycle'. This applies message passing to reduce contention latency for sensor-network applications that require store-and-forward processing as data moves through the network. However unlike the S-MAC, where the duration of the cycle is fixed, T-MAC introduces an adaptive duty cycle in a novel way: by dynamical ending the active part of it. This reduces the amount of energy wasted on idle listening, in which nodes wait for potentially incoming messages while still maintaining a reasonable throughput. In this paper we discuss the design of these two Protocols. We analyze them from the aspect of latency, throughput, and power savings when using the OMNeT++ simulator in various environments.

  • PDF

Using Genetic Algorithms in Wireless Mesh Network Routing Protocol Design (유전 알고리즘을 이용한 무선 메쉬 네트워크에서의 라우팅 프로토콜 설계)

  • Yoon, Chang-Pyo;Ryou, Hwang-Bin
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.179-186
    • /
    • 2011
  • Wireless Mesh Network technology refers to the technology which establishes wireless network whose transmission speed is similar to that of the wire system, and provides more enhanced flexibility in the building of network, compared to the existing wired network. In addition, it has the feature of less mobility and less restriction from the energy effect. However, there follow many considerations such as system overhead in the case of setting or the selection of multi-path. Accordingly, the focus is on the design and optimization of network which can reflect this network feature and the technology to establish path. This paper suggests the methods on the programming of path in Wireless Mesh Network routing by applying the evaluation value of node service, making use of the loss rate of data, the hop count of bandwidth and link and the traffic status of node, considering the performance of link and load in the fitness evaluation function, in order to respond to the programming of multi-path effectively.

Study On Receiving and Processing Method about Utilization of Near Real-time Satellite Data (준실시간 활용을 위한 위성자료 수신, 가공 방안 연구)

  • Kim, Soon Yeon;Jung, Young Sim;An, Joo Young;Park, Sang Hoon;Won, Young Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.467-467
    • /
    • 2017
  • 토양수분 및 황사발생 연구에 있어 효율적인 광역 분석을 위하여 위성자료가 활용되고 있다. 활용 시나리오에 따라서는 준실시간 자료 수신, 처리가 필요하며 본 연구에서는 이에 대한 방안을 연구하기 위하여 유럽 EUMETSAT(European Organisation for the Exploitation of Meteorological Satellites)의 ASCAT(Advanced Scatterometer) Metop-A 자료에 대하여 파악하였다. 자료 수신 프로토콜에 있어서 FTP, HTTP 등 전통적 방법에 대한 현황과 함께 비교적 최근 기법인 OGC(Open Geospatial Consortium)  WMS(Web Map Service), WCS(Web Coverage Service) 방식의 지원 현황에 대하여 확인하였다. 제공되는 자료 Format부분은 EPS Native와 BUFR(Binary Universal Form for the Representation of meteorological data)을 살펴보되 데이터 프로바이더 측에서 대부분 채택되고 있는 NetCDF(network Common Data Form)를 중심으로 파악하였다. 수신된 자료의 처리 자동화를 위한 소프트웨어는 OSGeo(The Open Source Geospatial Foundation)의 GDAL(Geospatial Data Abstraction Library), 미국 NCAR(National Center for Atmospheric Research)의 NCL(NCAR Command Language)을 중심으로 확인하였다. 자료 가공기법은 격자(Raster) 자료에 대한 기본 메타정보 확인, 좌표참조체계 변환, 해상도 및 Format 변환을 중심으로 확인하였다. 한편 OGC WMS, WCS는 자료의 전송 프로토콜 기법이면서 동시에 서버 사이드에서의 자료 변환 기능을 구비하고 있다. 예를 들어 Http Request에서 영역(Extent), Format 형식, 좌표참조체계를 지정할 수 있다. OGC WMS에 대한 EUMETSAT 파일럿 서비스에서 반환 자료의 공간적 영역, 복수 시점 제공 현황, 반환 포맷 지원 상황은 실제 메서드를 사용하여 파악하였고, 향후 발전 방향을 전망하였다.

  • PDF

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.

Reliable Contention-Based Forwarding Approach (Contention-Based Forwarding의 신뢰성 향상 방안)

  • Sung, Yoon-Young;Jo, Sun-Mi;Lee, Mee-Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.695-705
    • /
    • 2012
  • Due to recent advances in wireless devices and the automotive industry, Vehicular Ad hoc Networks (VANETs) have emerged as a very promising technology for transferring data collected on the road by moving cars. The delivered data may contain emergency information which affects the safety of passengers and drivers as well as the traffic congestion, and the routing protocols have thus a significant impact on the performance of VANETs. In this paper, we study the impact of movement direction of the participating cars which forward data packets on the performance of data delivery and present a new approach which extends the contention-based forwarding (CBF). The proposed reliable CBF (R-CBF) increases the reliability of data deliver on the traffic lights installed roads and reduces the overall propagation delay without routing loops or interruption of data forwarding that may be caused by changes of relative positions of involving cars in routing. Simulation demonstrates that the R-CBF diminishes propagation delay by 38% in comparison to G-SRMB which forwards data to moving cars in the backward direction and eliminates unnecessary retransmissions.

A Distributed Conference Architecture with a New Load Control Method (새로운 부하 제어 방식을 사용한 분산형 컨퍼런스 구조)

  • Jang, Choon-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.67-73
    • /
    • 2012
  • A distributed conference architecture with a new load control method has been suggested in this paper. A new event package in this paper enables to control conference load. Some additional elements for exchanging SIP messages between server and participants, and for distributing the load, have been added to new conference information data format. Furthermore to lessen the load, all conference servers share the processing of conference information data which should be transferred periodically to all participants. The suggested load control event package makes each server can get current load status of the overall servers. When load increases in one server SIP client requests are distributed by selecting a server which has the lowest load value, or new server is created to share the load. The performance of the proposed system has been evaluated by experiments. They shows 21.6% increase in average delay time, and 29.2% increase in average SIP message processing time.

An Efficient Multiple Tree-Based Routing Scheme in Faulty Wireless Sensor Networks (결함이 발생하는 센서 네트워크 환경에서 다중 트리 기반 라우팅 프로토콜)

  • Park, Jun-Ho;Seong, Dong-Ook;Yeo, Myung-Ho;Kim, Hak-Sin;Yoo, Jae-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.75-79
    • /
    • 2010
  • Wireless sensor networks (WSN) are widely used in many applications. WSN acquires the data of surrounding environments with sensors attached to each node. It is important to design sensor networks that can communicate energy-efficiently as well as to get sensor readings with high accuracy. In this paper, we propose a novel routing scheme that assures high accuracy and significantly reduces data transmission costs in WSN with faults. First, we organize a number of network topologies randomly for routing sensor readings to the base station. Because every sensor node is connected each other with a single path, redundant transmissions are not incurred. It can reduce unnecessary transmissions and guarantee final sensor readings with high accuracy. To show the superiority of our scheme, we compare it with an existing multi-path routing scheme. In the result, our scheme has similar accuracy as the existing scheme and reduces unnecessary data transmissions by about 70% over the existing technique.

Outdoor Experiments on video streaming over a Raspberry Pi-based MANETs (Raspberry Pi 기반 MANETs 환경에서 야외 Video Streaming 실험)

  • Lee, Yeong-mi;Kim, Byeong-jeong;Song, Seong-Ho;Park, Seop Hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.147-151
    • /
    • 2014
  • With the advent of tiny and inexpensive computer systems like Raspberry Pi, it has become possible to construct an experimental environment of MANETs (Mobile Ad hoc Networks) at a relatively low cost. In this paper, we implement a node of MANETs with a Raspberry Pi equipped with two 802.11 wireless LAN cards and dynamic routing software running on it. In an outdoor MANETs environment with moving mobile nodes automatically rebuilding broken routes, we conducted a real-time video streaming experiment over the MANET. The video stream is transmitted from a node with a video camera installed on it to another node through the route established dynamically. Each node is equipped with a display device, with which the current status of the node can be checked out. We also implemented software that automatically collects data stored in each node and analyzes the performance of the MANETs. Through this experiment, we could evaluate the performance of realistic video streaming service in a MANETs environment.

  • PDF