• Title/Summary/Keyword: 정보교환 기법

Search Result 689, Processing Time 0.026 seconds

A Cluster Based Energy Efficient Tree Routing Protocol in Wireless Sensor Networks (광역 WSN 을 위한 클러스팅 트리 라우팅 프로토콜)

  • Nurhayati, Nurhayati;Choi, Sung-Hee;Lee, Kyung-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.576-579
    • /
    • 2011
  • Wireless sensor network are widely all over different fields. Because of its distinguished characteristics, we must take account of the factor of energy consumed when designing routing protocol. Wireless sensor networks consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In BCDCP, all sensors sends data from the CH (Cluster Head) and then to the BS (Base Station). BCDCP works well in a smallscale network however is not preferred in a large scale network since it uses much energy for long distance wireless communication. TBRP can be used for large scale network, but it weakness lies on the fact that the nodedry out of energy easily since it uses multi-hops transmission data to the Base Station. Here, we proposed a routing protocol. A Cluster Based Energy Efficient Tree Routing Protocol (CETRP) in Wireless Sensor Networks (WSNs) to prolong network life time through the balanced energy consumption. CETRP selects Cluster Head of cluster tree shape and uses maximum two hops data transmission to the Cluster Head in every level. We show CETRP outperforms BCDCP and TBRP with several experiments.

Interaction Contortion a Distributed Multiagent System (분산 멀티에이전트 시스템의 상호협력 제어)

  • Baek, Sun-Cheol;Choe, Jung-Min;Im, Yeong-Hwan;Jang, Myeong-Uk;Park, Sang-Gyu;Lee, Gwang-Ro
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1803-1811
    • /
    • 1996
  • In a distributed multiagent framework, the capabilities of each agent are known to other agents. Namely, each agent in a multiagent society is aware of what agents are available in the whole society, which is able to solve a query, and how to contact them. This characteristic leads to the simplicity in controling both local and remote interactions among agents by using a fixed form for communication packes. This paper presents methods for controlling interactions among agents in this distributed multiagent frame-work. Agent interactions are described within the platform of MASCOT that is a tightly coupled multiagent system developed for the role of a computer secretary. A frame-like form of a commumication packet is defined, and protocols for message exchanges are presented. Also, ascenarios given to demonstrate how the communication mechanism controls agent intercations in MASCOT.

  • PDF

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

An Adaptive Vehicle Platoon Formation Mechanism for Road Capacity Improvement (도로 용량 증대를 위한 적응적 차량 플라툰 형성 기법)

  • Su, Dongliang;Ahn, Sanghyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.327-330
    • /
    • 2016
  • In the road environment with lots of vehicles, we can increase the number of vehicles on the road (i.e., road capacity) and enhance the comfortability of drivers if vehicles are organized into platoons. In the traditional vehicle platooning mechanisms, a pre-determined set of vehicles are allowed to form a platoon and, among them, a specific vehicle is designated as the platoon leader. In this type of platoon mechanisms, platoon is limited in improving the road capacity because the vehicles allowed to involve into platooning are restricted. Therefore, in this paper, we propose an adaptive platoon formation mechanism that allows any vehicle to be a platoon leader from which a platoon is formed. In the proposed mechanism, a platoon leader is elected based on the relative velocity and location information of neighboring vehicles obtained through the periodic exchange of beacon messages among vehicles. Through the NS-3 based simulations, we show the performance of our proposed mechanism in terms of road capacity improvement.

Secure MAP Discovery Schemes in Hierarchical MIPv6 (계층적 Mobile IPv6에서의 안전한 MAP 검색 기법)

  • Choi, Jong-Hyoun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.41-47
    • /
    • 2007
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anther Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.

인터넷 기반의 분산된 병렬 처리를 지원하기 위한 분산 처리 지원 도구의 보안 기능과 운영 방안

  • Lee, Sang-Yun;Ahn, Cheol-Woong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.640-642
    • /
    • 2005
  • 분산된 컴퓨팅 환경은 프로세서의 개수를 적응적으로 활용하는 병렬 처리 환경으로 활용할 수 있다. 병렬 처리예 의한 수행 시간 단축 효과에 가장 많은 영향을 주는 것은 활용되는 프로세서의 개수와 병렬 처리 요소 상호 간의 통신 오버헤드이다. 분산된 컴퓨팅 환경으로 구성한 병렬 처리는 통신 오버헤드에 의한 단점과 프로세서의 개수를 자유롭게 활용할 수 있다는 장점이 상반되는 특성을 가지며 레이트레이싱에 의한 렌더링과 같이 계산량이 많고 병렬 처리 요소 상호 간의 통신량이 적은 응용 분야에 효과적이다. 분산된 컴퓨팅 환경을 병렬 처리에 활용하기 위하여 기존의 분산 처리 모델을 적웅용면 통신 오버헤드 이외에 부수적인 오버헤드(프로그래밍 및 확용 절차)로 인하여 실효성을 발휘하기 어렵다. 단일 컴퓨팅 환경을 위한 절차와 서비스를 그대로 적용하여 분산된 컴퓨팅 환경을 구성하는 여러 대의 컴퓨터를 통합하여 활용하는 방안은 이와 같은 부수적인 오버헤드를 해결할 수 있으며 본 연구팀에서 이미 발표한 TORB(Transparent Object Request Broker)는 프로그래밍 투명성의 제공을 통하여 분산된 컴퓨팅 환경을 활용하기 위한 프로그램을 단일 컴퓨팅 환경을 위한 프로그래밍 기법을 적응하여 작성할 수 있도록 지원한다. 지속적인 연구를 통하여 프로그래밍 투명성의 범위를 확장함과 동시에 활용 절차의 투명성을 지원하는 방안을 추가하였고 새로운 분산 처리 모델을 설계하여 이러한 절차와 서비스를 체계적으로 정립하였다. 인터넷에 연결된 컴퓨터는 적절한 수준의 컴퓨팅 능력을 갖추고 있고 상호 간의 정보 교환을 할 수 있는 상태이므로 "TORB"와 같이 잘 정의된 패러다임으로 이들을 통합하여 운영하면 병렬 처리에 참여하는 프로세서의 개수를 자유롭게 활용하여 수행시간 감소 효과(병렬 처리에 의한)를 극대화할 수 있다. 그러나 인터넷을 기반으로 하는 분산된 병렬 처리를 지원하기 위해서는 "TORB"가 이미 제공하는 투명성 외에 불특정한 타인이 작성한 프로그램 코드가 "TORB"를 통하여 자신의 컴퓨터에서 실행되어도 악의적인 동작을 수행하지 못하게 하는 보안 기능과 인터넷에 연결된 방대한 수의 컴퓨터를 "TORB"에 의해 구성되는 분산된 컴퓨팅 환경에 참여시키는 시나리오가 필요하다.

  • PDF

Performance Enhancement of AAA-based Authentication forHMIPv6 (AAA 기반의 인증을 이용한 HMIPv6 성능 개선 기법)

  • Kim, Mi-Young;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.551-560
    • /
    • 2005
  • To reduce the amount of the signaling messages occurred in movement, HMIPv6 has been introduced as the hierarchical mobility management architecture tor MIPv6 by regarding the locality of movements. When approaching the visited link, the authentication procedure should be done successfully prior to any motility support message exchanges. The AAA(Authentication, Authorization and Account) authentication service is applied gradually to the wireless LAN and Cellular networks. However, It may bring about the service latency for the sessions of requiring the real-time processing due to not providing the optimized signaling in local and frequent movements. In this paper, we propose the authentication architecture with 'delegation' scheme to reduce the amount of signaling message and latency to resume for local movements by integrating it with HMIPv6 architecture. We provide the integrated authentication model and analyze the performance and effectivity of our proposal and finally offer the analysis materials comparing to the exiting authentication scheme. It cuts down the cost to $33.6\%$ at average measurement.

A Study on Development of Small Scale Electric Power Management System for Smart Grid (스마트 그리드를 위한 소규모 전력에너지 관리 시스템 개발에 관한 연구)

  • Lee, Chang-Soo;Oh, Hea-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2826-2832
    • /
    • 2012
  • A smart grid is an electric-power grid that employs a new information technology.This technology makes it possible to exchange real-time energy information between suppliers and consumers, finally resulting in high energy efficiency. The energy management system in smart grid provides up to date information on electricity consumption as well as dynamic electricity price to consumers of smart grid system. However, the existing energy management systems only focus on pricing system, for example, real-time electricity prices. In this paper, we try to improve the existing energy management system and propose the energy management system that mainly focuses on the efficiency of electricity consumption. In the proposed management system, PMU(Phasor Measurement Units) installed in switchboards gathers electricity data in a real time. We also propose to use data mining method, which is applied to analyzed electricity data for improving energy efficiency. Also, the proposed energy management system is designed to efficiently control the electricity between PMU and management system in case of a shortage of electricity or surplus electricity.

Design and Implementation of A Scan Detection Management System with real time Incidence Response (실시간 e-mail 대응 침입시도탐지 관리시스템의 설계 및 구현)

  • Park, Su-Jin;Park, Myeong-Chan;Lee, Sae-Sae;Choe, Yong-Rak
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.359-366
    • /
    • 2002
  • Nowadays, the hacking techniques are developed increasingly with wide use of internet. The recent type of scanning attack is appeared in against with multiple target systems on the large scaled domain rather than single network of an organization. The development of scan detection management system which can detect and analyze scan activities is necessary to prevent effectively those attacking at the central system. The scan detection management system is useful for effective utilization of various detection information that received from scan detection agents. Real time scan detection management system that can do the integrated analysis of high lever more that having suitable construction in environment of large scale network is developed.

An Interpretation of Interoperability Definitions Using Association Rules Discovery (연관성 규칙 탐사를 이용한 상호운용성 정의의 해석)

  • Heo, Hwan;Kim, Ja-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.39-71
    • /
    • 2011
  • Lately, developing systems fully interoperable with others is considered an essential element for successful projects, as not only do e-commerce becomes ubiquitous but also distributed systems' paradigm spreads. However, since definitions of interoperability vary by viewpoints, it is still difficult to have the same understanding and evaluation criteria on interoperability. For instance, various interoperability parties in military use different definitions of interoperability, and its T&E is not conducted according to the definition, but only to levels of information exchange. In this paper, we proposed a new definition of interoperability as followsm First of all, we collected existing and various interoperability definitions, extracting key components in each of them. Second, we statistically analyzed those components and applied the association rules discovery in data mining. We compared existing interoperability definitions to ours. From this research, we found associations among the components from various definitions applying market-basketanalysis, redefining interoperability. Key findings of this research can contribute to a unified viewpoint on the definition, level, and evaluation items of interoperability.