• Title/Summary/Keyword: 무선 네트워크 관리

Search Result 1,120, Processing Time 0.026 seconds

Intrusion Tolerance Scheme in Wireless Ad-Hoc Networks (무선 애드혹 네트워크 상에서의 침입 감내 방안)

  • 김경자;홍성옥;장태무
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.245-247
    • /
    • 2003
  • Ad Hoc망은 이동 호스트들로만 구성된 네트워크로서, 토폴로지의 작은 변화나 중앙 집중화 된 모니터링과 관리면에서의 기술 부족으로 인해 많은 취약점을 가지고 있다. 반면에 유선 네트워크에서 개발된 많은 침입 탐지 기술은 새로운 환경에서는 적절치가 않다. 따라서, 본 논문에서는 무선 Ad Hoc 네트워크상에서 이동 에이전트를 호스트 모니터링과 네트워크 모니터링의 기능을 분류하여 네트워크 망 내에서 연결된 개수에 따라 노드의 역할을 분담하여 침입을 감내 할 수 있는 방안을 제안하고자 한다.

  • PDF

태양 에너지 수집형 무선 센서 네트워크의 연구 이슈

  • No, Dong-Geon
    • Information and Communications Magazine
    • /
    • v.29 no.10
    • /
    • pp.74-82
    • /
    • 2012
  • 무선 센서 네트워크(WSN, Wireless Sensor Network)는 최근 주목 받고 있는 가상-물리 시스템 (CPS, Cyber-Physical System)의 입력을 담당하는 부분으로써 CPS를 구성하는 주요한 부분 중 하나이다. 본고에서는 기존의 배터리 기반 WSN의 짧은 수명 및 높은 유지관리 비용을 극복하기 위하여 최근 활발히 연구되고 있는 태양 에너지 기반 무선 센서 네트워크(SP-WSN, Solar-powered WSN)의 연구 동향과 이슈들을 살펴보고자 한다.

Virtualization of Wireless LAN based on OpenFlow (OpenFlow 기반 무선랜 가상화)

  • Lee, Hyung-Bong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.275-276
    • /
    • 2015
  • 네트워크 가상화를 위한 대표적인 개방적 아키텍처로 OpenFow를 들 수 있다. OpenfFow는 가상 네트워크(Software Defined Network) 개념을 실현하기 위한 랜 스위치 제어 프로토콜의 집합체로서 데이터 센터 등 주로 유선랜 환경을 목표로 설계되어 활용되고 있다. 이 논문에서는 OpenFlow를 무선랜의 AP(Access Point)에 적용하여 WiFi 디바이스들로 구성된 가상 무선 네트워크 관리 프레임을 구현한다. 구현된 관리 프레임은 WiFi 디바이스들의 토폴로지와 트래픽 상황을 중앙 관제 센터에서 모니터링할 수 있고, 플로우 경로를 설정함으로써 라우터를 경유하지 않고 AP 수준에서 스위칭(라우팅)이 가능하여 전체적인 트래픽 혼잡을 크게 줄일 수 있다.

  • PDF

A Data Driven Index for Convergence Sensor Networks (융합 센서 네트워크를 위한 데이터 기반 색인)

  • Park, Jeong-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.43-48
    • /
    • 2016
  • Wireless sensor networks (WSN) can be more reliable and easier to program and use with the help of sensor database management systems (SDMS). SDMS establish a user-friendly SQL-based interface to process declarative user-defined queries over sensor readings from WSN. Typical queries in SDMS are ad-hoc snapshot queries and long-running, continuous queries. In SDMSs queries are flooded to all nodes in the sensor net, and query results are sent back from nodes that have qualified results to a base station. For query flooding to all nodes, and result flooding to the base station, a lot of communication energy consuming is required. This paper suggests an efficient in-network index solution, named Distributed Information Gathering (DIG) to process range queries in a sensor net environment that can save energy by reducing query and result flooding.

A Routing Protocol supporting QoS in WiMAX based Wireless Mesh Networks (WiMAX 기반의 무선 메쉬 네트워크에서 QoS를 지원하는 라우팅 프로토콜)

  • Kim, Min;Kim, Hwa-Sung
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.1-11
    • /
    • 2009
  • In this paper, we propose a QoS routing protocol for WiMAX based wireless mesh networks. The proposed routing protocol is a proactive hop-by-hop QoS routing protocol. It can find an optimal route that satisfies QoS requirements using bandwidth and delay as QoS parameters. In this paper, we first present a network model for WIMAX based wireless mesh networks and explain why QoS routing protocol is the most appropriate for WiMAX based wireless mesh networks. Then, we propose a proactive hop-by-hop QoS routing protocol that meets QoS requirements of traffic flowing between mesh client and the gateway. The simulation results show that the proposed routing protocol outperforms QOLSR protocol in terms of end-to-end delay, packet delivery ratio and routing overhead.

A Study on the Implementation of Wireless Snesor Network for Managing of Briges (교량 유지관리를 위한 무선 센서 네트워크 시스템 연구)

  • Kim, Young-Baig
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.783-788
    • /
    • 2011
  • Most management systems that are currently in place to monitor the safety of bridges - working in conjunction with a wireless sensor network - are based on a wired infrastructure. Not only do these wired systems expensive to install, but they are expensive to replace or repair should a problem occur with the system while in operation. In an effort to address these problems, there have been many researches that attempted to use a wireless sensor network for the existing wired measurement system. However, they have been met with difficulty due to the problems of power and synchronization in actually bringing the management system to the bridges as a commercial system. This paper proposes a bridge management system based on WSN (Wireless Sensor Network) which uses wireless LAN technology. The system was tested using a testbed and when the obtained data were compared to the data collected using the existing wired counterpart it was found that they were almost the same.

Threat Classification Schemes for Effective Management based on W-TMS(Wireless-Threat Management System) (W-TMS(Wireless-Threat Management System)에서의 효율적 관리를 위한 위협 분류기법)

  • Seo, Jong-Won;Jo, Je-Gyeong;Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.93-100
    • /
    • 2007
  • Internet had spread in all fields with the fast speed during the last 10 years. Lately, wireless network is also spreading rapidly. Also, number of times that succeed attack attempt and invasion for wireless network is increasing rapidly TMS system was developed to overcome these threat on wireless network. Existing TMS system supplies active confrontation mechanism on these threats. However, existent TMS has limitation that new form of attack do not filtered efficiently. Therefor this paper proposes a new method that it automatically compute the threat from the imput packets with vector space model and detect anomaly detection of wireless network. Proposed mechanism in this research analyzes similarity degree between packets, and detect something wrong symptom of wireless network and then classify these threats automatically.

Research on the Identification of Network Access Type of End-Hosts for Effective Network Management (효율적인 네트워크 자원 관리를 위한 호스트의 접속 유형 판별에 관한 연구)

  • Hur, Min;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.965-974
    • /
    • 2012
  • As the use of smart devices has become popular, the number of smart devices connected to network has increased and the amount of traffic from them has grown rapidly. The management of mobile traffic and IP address for smart devices in an enterprise network is crucial problem for efficient operation of network. The information about connection type of a terminal host to the network will be very useful for stable and efficient management of an enterprise network. Also, this information might be used to identify NAT device. In this paper, we propose a methodology to identify the connection type of a terminal host using RTT (Round-Trip-Time) value extracted from captured packets. We prove the feasibility of our proposed method in a target campus network.

Mobile Contents Adaptation Network using Active Network Mechanisms (액티브 네트워크 메커니즘을 이용한 이동 컨텐츠 적응형 네트워크)

  • 김기조;이준호;임경식;오승희;남택용;손승원
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.384-392
    • /
    • 2004
  • Mobile contents service providers have some difficulties to timely and proper service deployment due to rapid development cycle of diverse portable devices with different capabilities. A way to resolve the problem is to introduce a mobile contents service paltform that can adapt original mobile contents to diverse devices dynamically and automatically. In this paper, we propose a mobile contents service platform based on active network mechanisms, called Mobile Content Adaptation Network(MobiCAN). The MobiCAN node provides effective service deployment, execution, and maintenance features and accommodates service layering and service customization capabilities for easy deployment. The basic functional units of the MobiCAN node are micro services with well-defined service interfaces and service layering features. For reliable services among the MobiCAN nodes, we design new distributed and robust Overlay Management Protocols(OMPs). As an example of practical MobiCAN applications, we finally describe Dynamic Contents Customization Proxy(DCCP) service.

On the Study of Key Management in Mobile Ad Hoc Networks (이동 임시무선망에서의 키 관리 기법에 관한 연구)

  • Kim Si-Gwan;Shin Yoon-Shik;Lim Eun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.4
    • /
    • pp.90-98
    • /
    • 2004
  • This paper covers the issue of securing ad hoc networks. Such networks exhibit a number of characteristics that make such a task challenging. One of the major challenges is that ad hoc networks typically lack a fixed infrastructure both in form of physical infrastructure such as routers, servers, and stable communication links and in the form of an organizational or administrative infrastructure. Another difficulty lies in the highly dynamic nature of ad hoc networks since new nodes can join and leave the network at any time. The major problem in providing security services in such infrastructure less networks is how to manage the cryptographic keys that are needed. In order to design practical and efficient key management systems it is necessary to understand the characteristics of ad hoc networks and why traditional key management systems cannot be used. These issues are covered and we also present a new efficient key management solutions. Finally we show that the proposed method is more efficient than the previous works through simulations.

  • PDF