• Title/Summary/Keyword: 분산 식별자

Search Result 50, Processing Time 0.025 seconds

A Hierarchical Cluster Tree Based Address Assignment Method for Large and Scalable Wireless Sensor Networks (대규모 무선 센서 네트워크를 위한 계층적 클러스터 트리 기반 분산 주소 할당 기법)

  • Park, Jong-Jun;Jeong, Hoon;Hwang, So-Young;Joo, Seong-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1514-1523
    • /
    • 2009
  • It is well known that the current wireless sensor networks addressing methods do not work efficiently in networks more than a few hundred nodes. A standard protocol in ZigBee-Standard feature in ZigBee 2007 gives balanced tree based address assignment method with distributed manner. However, it was limited to cover less than hundreds of sensor nodes due to the wasteful use of available address space, because composed sensor networks usually make an unbalanced tree topology in the real deployment. In this paper, we proposed the hierarchical cluster tree based address assignment method to support large and scalable networks. This method provides unique address for each node with distributed manner and supports hierarchical cluster tree on-demand. Simulation results show that the proposed method reduces orphan nodes due to the address exhaustion and supports larger network with limited address space compared with the ZigBee distributed address assignment method defined in ZigBee-Standard feature in ZigBee 2007.

A Study on Creating a Secure Private Signature Key in ID-based Group Signature (ID기반 그룹서명에서의 안전한 개인 서명키 생성기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1275-1278
    • /
    • 2010
  • 1984년 A.Shamir에 의해 처음 소개된 ID 기반 공개키 암호시스템은 ID나 메일, 주소, 소속 등 유일하게 특정할 수 있는 것을 사용자의 공개키로 사용함으로써 송신자의 공개키에 대한 정당성 확인 과정을 필요 없게 하는 방식으로 전자서명에 적용되어 다양한 방식으로 제안되었다. 하지만 ID 기반 그룹 서명에서는 그룹 관리자만이 사용자의 서명키를 생성하기 때문에 그룹 내 사용자로 위장이 가능한 문제점을 가지고 있다. 본 논문에서는 ID기반 서명에서의 문제점인 키 위탁 문제를 해결할 수 있고, 그룹 관리자만이 부담하고 있는 그룹 구성원들의 개인 서명키 생성 및 사용자 식별 연산을 소그룹 관리자를 이용하여 연산량을 분산시킬 수 있는 그룹 서명 방식을 제안한다.

Study of the Haar Wavelet Feature Detector for Image Retrieval (이미지 검색을 위한 Haar 웨이블릿 특징 검출자에 대한 연구)

  • Peng, Shao-Hu;Kim, Hyun-Soo;Muzzammil, Khairul;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.160-170
    • /
    • 2010
  • This paper proposes a Haar Wavelet Feature Detector (HWFD) based on the Haar wavelet transform and average box filter. By decomposing the original image using the Haar wavelet transform, the proposed detector obtains the variance information of the image, making it possible to extract more distinctive features from the original image. For detection of interest points that represent the regions whose variance is the highest among their neighbor regions, we apply the average box filter to evaluate the local variance information and use the integral image technique for fast computation. Due to utilization of the Haar wavelet transform and the average box filter, the proposed detector is robust to illumination change, scale change, and rotation of the image. Experimental results show that even though the proposed method detects fewer interest points, it achieves higher repeatability, higher efficiency and higher matching accuracy compared with the DoG detector and Harris corner detector.

Task Execution Scenario based Restricted Delegation in Grid (그리드 환경에서의 작업 시나리오에 기반한 제약적 권한 위임)

  • Kim, Seung-Hyun;Kim, Jong;Hong Sung-Je;Kim, Sang-Wan
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.322-325
    • /
    • 2002
  • 제약적인 권한 위임은 분산 환경에서 작업을 처리하기 위해서 필요한 권한을 부여하는 중요한 과정이다. 하지만 기존 그리드 환경의 아키텍처에서는 작업에 따른 적절한 권한을 부여하지 못하고, 부여한 권한의 오용을 막을 수 없는 등의 문제들이 있다. 본 연구에서는 그리드 환경에서 작업 시나리오에 기반한 제약적 권한 위임을 제안한다. 제안한 기법은 인증서에 작업 시나리오를 유지하여 관리하고, 유일한 식별자로 작업을 구분하는 것으로 기존의 문제점을 해결한다.

  • PDF

A Study of Tier 2 Nameserver Distribution for Reducing ENUM DNS Resolution Time (ENUM DNS 탐색시간 단축을 위한 계층 2 네임서버 분산 방안 연구)

  • Park, Jong-Il;Yoon, Mi-Youn;Shin, Yong-Tae;Choe, Jong-Won;Shin, Sung-Woo;Na, Jung-Jung;Kim, Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.379-381
    • /
    • 2003
  • ENUM은 전세계적으로 유일성이 보장된 ITU­T의 E.164 전화번호를 PSTN과 IP 네트워크를 연결하기 위한 식별자로써 사용하기 위해 정의된 새로운 인터넷 프로토콜이다. ENUM은 일종의 디렉토리 서비스로써 그 기반을 DNS에 두고 있지만, 캐싱의 비효율성과 이중 탐색으로 인한 지연이 발생한다는 단점을 가지고 있다. 본 논문은 CDN 환경과 애니캐스트를 응용하여, ENUM 서비스의 효율적인 제공을 위해 ENUM DNS의 탐색시간을 단축할 수 있는 방안을 제시하고자 한다.

  • PDF

Design and application of effective data extraction technique from Web databases (웹 기반 데이터베이스로부터의 유용한 데이터 추출 기법의 설계 및 응용)

  • Hwang, Doo-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.6 no.4
    • /
    • pp.309-314
    • /
    • 2005
  • This paper analyzes techniques that extract objective information from distributed web databases for bioinformatics based on relationship among information. Moreover, we discuss the design and implementation of a method for knowledge enhancement in respect of protein information. Web data extractor can be constructed by using a manual, semi-automatic, or automatic way. Data extractor generally makes use of identifiers in order to search and extract targeting information from a specified web page. This paper presents a design and implementation for the protein databases of an organism by utilizing web data extraction techniques.

  • PDF

Distributed Multi-Sensor based Laboratory Safety Management System (분산 다중 센서 기반 실험실 안전 관리 시스템)

  • Hwang, Doyeun;Kim, Hwangryong;Kim, Eunseong;Jung, Daejin;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.585-586
    • /
    • 2019
  • Recently, the systems for managing the labs provide services that can be managed in real time by using various sensors based on IoT. The system collects sensor data and transmits it to the server, identifies the dangerous situation, and sends operation commands to the devices. These systems have a centralized structure that slows data processing when managing multiple laboratories. To solve this problem, this paper proposes a system that manages laboratories in distributed processing environment to identify and manage risk situations. The sensor module is used to control the laboratory and to automatically identify and respond to the dangerous situation.

  • PDF

A Study on the Development of Reference Linking System Based on Digital Object Identifier for Korean Journal Articles (국내 학술지 논문의 DOI 기반 연계시스템 구축에 관한 연구)

  • 한혜영;정동열
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.4
    • /
    • pp.207-227
    • /
    • 2000
  • Recenily, major internalional STM(Science, Trchnical, and Mcdivine) Publichers have been developing prototype systems that can provide the refeence linking of jouinal articles within the scholarly literature on a cross-publisher basis using the URN(Universal Resouree Name). In Korea, it is hard to find the efforts to link the scattered digitalized documents to an individual user through a unified web. In this study, a linking model for an inergrated gatewny fro, bibliographic information to full tcxt has been desugned and 'Electronic Research Resourced Linking system (E3R/LS)' has been developed as a prototype for centralized static reference linking system. There are three major components for constructing refrernce linking systems. The firsl componcnt the Digital Object Identifiet(DO1). is introduced as the public identifier inrended to be applied wherever thr item needs to be identified. For denl~iymg Korean journal articles, llie extended SICI(Serlal Ilem and Conlribut~on Idealifier) has becn newly dehed in 1111s study and is used as a suiiia on DOI. The reierence datubasc conlams the second com~onenl, metadiltil, linkcd to implemenied by all information providers. The CnRI resolution system is used for resolving a DOI into a URL as the third component.

  • PDF

A Study on Countermeasure for CCN Interest Flooding Attack (콘텐츠 중심 네트워킹 환경에서의 Interest Packet Flooding 대응 연구)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.954-961
    • /
    • 2013
  • To enhance the efficiency of network, content-centric networking (CCN), one of future Internet architectures, allows network nodes to temporally cache transmitted contents and then to directly respond to request messages which are relevant to previously cached contents. Also, since CCN uses a hierarchical content-name, not a host identity like source/destination IP address, for request/response packet routing and CCN request message does not include requester's information for privacy protection, contents-providers/ network nodes can not identify practical requesters sending request messages. So to send back relevant contents, network nodes in CCN records both a request message and its incoming interfaces on Pending Interest Table (PIT). Then the devices refer PIT to return back a response message. If PIT is exhausted, the device can not normally handle request/response messages anymore. Hence, it is needed to detect/react attack to exhaust PIT. Hence, in this paper, we propose improved detection/reaction schemes against attacks to exhaust PIT. In practice, for fine-grained control, this proposal is applied to each incoming interface. Also, we propose the message framework to control attack traffic and evaluate the performance of our proposal.

The Shortest Authentication Path for Performance Improvement of MHT Contents Authentication Method in Distributed Network Environment (분산 네트워크 환경에서의 MHT 콘텐츠 인증 기술 성능 개선을 위한 최소 인증 경로에 관한 연구)

  • Kim, DaeYoub
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.9
    • /
    • pp.235-242
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P, CDN, and CCN. These technologies take a common approach that content request packets is responded by distributed network nodes or hosts, not by a single content distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.