• Title/Summary/Keyword: 메시지 통신

Search Result 2,214, Processing Time 0.022 seconds

Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources (휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅)

  • Yang, Gi-Won;Lim, Hwa-Jung;Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.12-23
    • /
    • 2009
  • Sensor networks deployed in battlefields to support military operations or deployed in natural habitats to monitor the rare wildlifes must take account of protection of the location of valuable assets(i.e., soldiers or wildlifes) from an adversary or malicious tracing as well as the security of messages in transit. In this paper we propose a routing protocol GSLP(GPSR-based Source-Location Privacy) that is capable of enhancing the location privacy of an active source node(i.e., message-originating node) in the presence of multiple dormant sources(i.e., nodes lying nearby an asset whose location needs to be secured). Extended is a simple, yet scalable, routing scheme GPSR(greedy perimeter stateless routing) to select randomly a next-hop node with a certain probability for randomizing paths and to perform perimeter routing for detouring dormant sources so that the privacy strength of the active source, defined as safety period, keeps enhanced. The simulation results obtained by increasing the number of dormant sources up to 1.0% of the total number of nodes show that GSLP yields increased and nearly invariant safety periods, while those of PR-SP(Phantom Routing, Single Path), a notable existing protocol for source-location privacy, rapidly drop off as the number of dormant sources increases. It turns out that delivery latencies of GSLP are roughly less than two-fold of the shortest path length between the active source and the destination.

AFLRS: An AODV-based Fast Local Repair Scheme in Ad Hoc Networks (AFLRS: 애드 혹 네트워크에서 AODV에 기반한 빠른 경로 복구 기법)

  • 서현곤;김기형;서재홍
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.81-90
    • /
    • 2004
  • A Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes dynamically self-organizing in arbitrary and temporary network topologies without the use of any existing network infrastructure. The AODV (Ad Hoc On-Demand Distance Vector) Protocol is one of the typical reactive routing protocols, in that mobile nodes initiate routing activities only in the presence of data packets in need of a route. In this paper, we focus upon the local repair mechanism of AODV. When a link is broken, the upstream node of the broken link repairs the route to the destination by initiating a local route discovery process. The process involves the flooding of AODV control messages in every node within a radius of the length from the initiating node to the destination. In this paper, we propose an efficient local repair scheme for AODV called AFLRS (AODV-based Fast Local Repair Scheme). AFLRS utilizes the existing routing information in the intermediate nodes which have been on the active route to the destination before a link break occurs. AFLRS can reduce the flooding range of AODV control messages and the route recovery time because it can repair route through the intermediate nodes. For the performance evaluation of the proposed AFLRS, we have simulated the local repair mechanisms by using NS2 and AODV-UU. The performance results show that AFLRS can achieve faster route recovery than the local repair mechanism of AODV.

Mutual-Backup Architecture of SIP-Servers in Wireless Backbone based Networks (무선 백본 기반 통신망을 위한 상호 보완 SIP 서버 배치 구조)

  • Kim, Ki-Hun;Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.32-39
    • /
    • 2015
  • The voice communications with wireless backbone based networks are evolving into a packet switching VoIP systems. In those networks, a call processing scheme is required for management of subscribers and connection between them. A VoIP service scheme for those systems requires reliable subscriber management and connection establishment schemes, but the conventional call processing schemes based on the centralized server has lack of reliability. Thus, the mutual-backup architecture of SIP-servers is required to ensure efficient subscriber management and reliable VoIP call processing capability, and the synchronization and call processing schemes should be changed as the architecture is changed. In this paper, a mutual-backup architecture of SIP-servers is proposed for wireless backbone based networks. A message format for synchronization and information exchange between SIP servers is also proposed in the paper. This paper also proposes a FSM scheme for the fast call processing in unreliable networks to detect multiple servers at a time. The performance analysis results show that the mutual backup server architecture increases the call processing success rates than conventional centralized server architecture. Also, the FSM scheme provides the smaller call processing times than conventional SIP, and the time is not increased although the number of SIP servers in the networks is increased.

VLSI Design of Interface between MAC and PHY Layers for Adaptive Burst Profiling in BWA System (BWA 시스템에서 적응형 버스트 프로파일링을 위한 MAC과 PHY 계층 간 인터페이스의 VLSI 설계)

  • Song Moon Kyou;Kong Min Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.39-47
    • /
    • 2005
  • The range of hardware implementation increases in communication systems as high-speed processing is required for high data rate. In the broadband wireless access (BWA) system based on IEEE standard 802.16 the functions of higher part in the MAC layer to Provide data needed for generating MAC PDU are implemented in software, and the tasks from formatting MAC PDUs by using those data to transmitting the messages in a modem are implemented in hardware. In this paper, the interface hardware for efficient message exchange between MAC and PHY layers in the BWA system is designed. The hardware performs the following functions including those of the transmission convergence(TC) sublayer; (1) formatting TC PDU(Protocol data unit) from/to MAC PDU, (2) Reed-solomon(RS) encoding/decoding, and (3) resolving DL MAP and UL MAP, so that it controls transmission slot and uplink and downlink traffic according to the modulation scheme of burst profile. Also, it provides various control signal for PHY modem. In addition, the truncated binary exponential backoff (TBEB) algorithm is implemented in a subscriber station to avoid collision on contention-based transmission of messages. The VLSI architecture performing all these functions is implemented and verified in VHDL.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

A Scalable Resource-Lookup Protocol for Internet File System Considering the Computing Power of a Peer (피어의 컴퓨팅 능력을 고려한 인터넷 파일 시스템을 위한 확장성 있는 자원 탐색 프로토콜 설계)

  • Jung Il-dong;You Young-ho;Lee Jong-hwan;Kim Kyongsok
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.89-99
    • /
    • 2005
  • Advances of Internet and rC accelerate distribution and sharing of information, which make P2P(Peer-to-Peer) computing paradigm appear P2P computing Paradigm is the computing paradigm that shares computing resources and services between users directly. A fundamental problem that confronts Peer-to-Peer applications is the efficient location of the node that stoles a desired item. P2P systems treat the majority of their components as equivalent. This purist philosophy is useful from an academic standpoint, since it simplifies algorithmic analysis. In reality, however, some peers are more equal than others. We propose the P2P protocol considering differences of capabilities of computers, which is ignored in previous researches. And we examine the possibility and applications of the protocol. Simulating the Magic Square, we estimate the performances of the protocol with the number of hop and network round time. Finally, we analyze the performance of the protocol with the numerical formula. We call our p2p protocol the Magic Square. Although the numbers that magic square contains have no meaning, the sum of the numbers in magic square is same in each row, column, and main diagonal. The design goals of our p2p protocol are similar query response time and query path length between request peer and response peer, although the network information stored in each peer is not important.

Traffic Load & Lifetime Deviation based Power-aware Routing Protocol for MANET (MANET에서 트래픽 부하와 노드 수명 편차에 기반한 power-aware 라우팅 프로토콜)

  • Kim, Dong-Hyun;Ha, Rhan
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.395-406
    • /
    • 2006
  • In ad hoc networks, the limited battery capacity of nodes affects a lifetime of network Recently, a large variety of power-aware routing protocols have been proposed to improve an energy efficiency of ad hoc networks. Existing power-aware routing protocols basically consider the residual battery capacity and transmission power of nodes in route discovery process. This paper proposes a new power-aware routing protocol, TDPR(Traffic load & lifetime Deviation based Power-aware Routing protocol), that does not only consider residual battery capacity and transmission power, but also the traffic load of nodes and deviation among the lifetimes of nodes. It helps to extend the entire lifetime of network and to achieve load balancing. Simulations using ns-2[14] show the performance of the proposed routing protocol in terms of the load balancing of the entire network, the consumed energy capacity of nodes, and an path's reliability TDPR has maximum 72% dead nodes less than AODV[4], and maximum 58% dead nodes less than PSR[9]. And TDPR consumes residual energy capacity maximum 29% less than AODV, maximum 15% less than PSR. Error messages are sent maximum 38% less than PSR, and maximum 41% less than AODV.

The Use and Degree of Discomfort of Informatization Device Among the Elderly According to the Disabilities (장애여부에 따른 노인의 정보화기기 사용 및 불편함)

  • Kim, Hee-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.8
    • /
    • pp.327-335
    • /
    • 2021
  • The purpose of this study is to find out the use and inconvenience of informatization devices according to the disability of the elderly. A total 10,097 data from the elderly survey were used to analyze the differences in the possession and use of information devices, usage capabilities, and injustice according to disability. Descriptive analysis was conducted to find out general characteristics and disability-related characteristics. chi-square tests were conducted to find out the difference in informatization and communication device usage ability and information device usage inconvenience according to disability. The p-value was set at 0.001. As a result of the study, the elderly with disabilities in Korea had lower smartphones and tablet PCs than the non-disabled elderly. In terms of daily inconvenience, the elderly with disabilities often responded that they had no experience or did not know about the inconvenience of online reservations for trains/high-speed buses/intercity buses, ordering kiosks at restaurants, using ATMs, or reducing bank stores. Taken together, the ability of the elderly with disabilities in Korea to possess and use informatization devices is very low and they feel more inconvenience than the non-disabled elderly. It is necessary to improve the ability to possess and use informatization devices for the elderly with disabilities in the rapidly progressing aging of the disabled and the informatization of our society.

Design and Implementation of Interface System for Swarm USVs Simulation Based on Hybrid Mission Planning (하이브리드형 임무계획을 고려한 군집 무인수상정 시뮬레이션 시스템의 연동 인터페이스 설계 및 구현)

  • Park, Hee-Mun;Joo, Hak-Jong;Seo, Kyung-Min;Choi, Young Kyu
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.1-10
    • /
    • 2022
  • Defense fields widely operate unmanned systems to lower vulnerability and enhance combat effectiveness. In the navy, swarm unmanned surface vehicles(USVs) form a cluster within communication range, share situational awareness information among the USVs, and cooperate with them to conduct military missions. This paper proposes an interface system, i.e., Interface Adapter System(IAS), to achieve inter-USV and intra-USV interoperability. We focus on the mission planning subsystem(MPS) for interoperability, which is the core subsystem of the USV to decide courses of action such as automatic path generation and weapon assignments. The central role of the proposed system is to exchange interface data between MPSs and other subsystems in real-time. To this end, we analyzed the operational requirements of the MPS and identified interface messages. Then we developed the IAS using the distributed real-time middleware. As experiments, we conducted several integration tests at swarm USVs simulation environment and measured delay time and loss ratio of interface messages. We expect that the proposed IAS successfully provides bridge roles between the mission planning system and other subsystems.

A Development of Analysis System for Vessel Traffic Display and Statistics based on Maritime-BigData (해상-빅데이터 기반 선박 항적 표시 및 해상교통량 통계 분석 시스템의 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Shin, Il-Sik;Song, Sang-Kee;Nam, Gyeung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1195-1202
    • /
    • 2016
  • Recently, a lot of studies that applying the big data technology to various fields, are progressing actively. In the maritime domain, the big data is the meaningful information which makes and gathers by the navigation and communication equipment from the many ships on the ocean. Also, importance of the maritime safety is emphasized, because maritime accidents are rising with increasing of maritime traffic. To support prevention of maritime accidents, in this paper, we developed a vessel traffic display and statistic system based on AIS messages from the many vessels of maritime. Also, to verify the developed system, we conducted tests for vessel track display function and vessel traffic statistic function based on two test scenarios. Therefore, we verified the effectiveness of the developed system for vessel tracks display, abnormal navigation patterns, checking failure of AIS equipments and maritime traffic statistic analyses.