• Title/Summary/Keyword: 정보통신 서비스

Search Result 10,440, Processing Time 0.034 seconds

Geographic and Energy Aware Geocasting in Ad-Hoc Networks (Ad-Hoc 네트워크에서 위치와 에너지를 고려한 지오캐스팅 알고리즘)

  • Lee Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.75-84
    • /
    • 2004
  • Geocasting, a variant of the conventional multicasting problem, is one of communication type in which the data packets are delivered to a group of all nodes within a specified geographical region (i.e., the geocasting region) and is called location-based multicasting(LBM)(l). An Ad-hoc network is a dynamically reconfigurable and temporary wireless network where all mobile devices using batteries as energy resources cooperatively maintain network connectivity without central administration or the assistance of base stations. Consequently, the technique to efficiently consume the limited amounts of energy resources is an important problem so that the system lifetime is maximized. In this paper, we propose a LBPA(Location-Based Power Aware) geocasting algorithm that selects energy-aware neighbor to route a packet towards the target region In Ad-hoc network environments. The method Is such that the energy consumption is balanced among the nodes in proportion to their energy reserves. Through the simulations, the proposed LBPA algorithm shows better results, that is, as good as 40% on the average over the conventional LBM algorithm in terms of the network lifetime.

  • PDF

AP-Initiated Flow Redirection Mechanism for AP Load Balancing in WLAN Environments (무선랜 환경에서 AP 로드 밸런싱을 위한 AP-개시 플로우 리다이렉션 메커니즘)

  • Kim, Mi-Hui;Chae, Ki-Joon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.65-73
    • /
    • 2009
  • IEEE802.11 Wireless LAN(WLAN) is being widely used in public space such as airport, and increases the networking boundary in campus and enterprise, and it has lastly attracted considerable attention for mesh network and converged network with other 3G mobile communication networks. In WLAN, load balancing among Access Points(AP) is an important issue for efficient resource management or supporting the Quality of Service(QoS) of traffic, but most researches focused on the AP selection in network entry or roaming of Stations(STA). In this paper, we propose an AP-Initiated Flow Redirection(FR) for AP load balancing by monitoring AP's availability in the true sense. When the AP's resource becomes almost saturated, that is used more than a specific threshold, the AP queries the roaming possible neighbor APs about their availability and calculates the distribution of traffic load with statistical methods such as entropy or chi-square. Finally, the AP decides flows and new APs for redirection and performs it. Our simulation results show that our FR mechanism increases the performance in the various views.

  • PDF

A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity (사용자 익명성을 제공하는 스마트카드 기반 원격 인증 프로토콜)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.229-239
    • /
    • 2009
  • To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.

  • PDF

Design and Implementation of a Request and Response Process on Help-Requesting Mobile Application (모바일 도움요청 어플리케이션에서의 요청 및 상호 대응 프로세스 설계)

  • An, Sung-Eun;Lim, Soon-Bum;Kim, Min-Jeong;You, Soo-Yeon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.320-326
    • /
    • 2015
  • With the growing concern over frequent occurrences of criminal events, help-requesting mobile applications have drawn attention. However, existing applications solely focus on providing help-requesting services. Therefore, in this paper, we design and implement a help request and response process which allows users to request help by sending messages and locating their friends, acquaintances and even near-by application users, and to allow help be reached by forwarding messages. This application is composed of three parts: help-requesting, help-responding, and checking-status. This application is developed on the Android platform where we exchange users' longitude and latitude through web server communication. We conducted test to verify the effectiveness of the forwarding function, and it has been confirmed that 93.33% of subjects used the forwarding function to help users at risk.

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

Proposal of Youngjong-do 112 Block Demo-Plant for Application of Smart Water Grid (SWG 적용성을 위한 영종도 112블록 데모플랜트 구축 방안)

  • Han, Kuk Heon;Park, Hyun Ki;Kim, Young Hwa
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.108-108
    • /
    • 2016
  • 스마트워터그리드(Smart Water Grid; 이하 SWG)란 현재 직면에 있는 물 부족, 물 안보, 물 복지 등 물에 대한 문제를 ICT 기술을 활용하여 물관리의 새로운 패러다임을 제시할 수 있는 융합 기술이다. 즉, SWG는 기존의 수자원 관리 시스템의 한계를 극복하기 위해 첨단 정보통신기술을 이용하는 고효율의 차세대 인프라 시스템으로 다양한 수원을 활용하고 물을 효율적으로 배분 관리 운송하여 수자원의 불균형을 해소하고, 첨단센서네트워크를 이용해 용수관리 전분야에 걸쳐 양방향 실시간으로 용수정보를 감시 대응하여 용수관리와 에너지 효율의 최적화된 메가시티(mega-city)에 적합한 지능형 물관리가 가능할 것으로 예상되는 시스템이다. 따라서 국토교통부 과제로 추진중인 SWG 연구단에서 개발한 스마트 워터 기술을 영종도 112 블록에 적용하여 지역주민의 물복지 향상 및 물 사용자에 대한 소비자 만족도를 높이는데 목적을 두고 데모플랜트를 구축 방안을 수립하였다. 영종도 112블록(인천 운서동 및 운북동 일원)은 인천 공촌정수장에서 해저관로를 지나 영종통합 가압장에서 가압 후 공항신도시배수지에서 물을 공급받고 있는 지역으로 면적은 $17.41km^2$, 인구는 약 17,000명, 물사용량 $8,000m^3$/일, 총관로연장 약 55km, 유수율이 겨우 73.2% 지역이다. SWG 적용성 평가를 위해 영종도 112 블록에 유수율 제고 및 운영비용 저감을 목적으로 데모플랜트를 구축하였다. 스마트 계측을 위해 스마트미터 469개(15~20mm), 디지털미터 172개(25~200mm), 누수유무센서 1개소, 다항목 수질측정기 1개소, 유량계 3개소, 수압계 5개소, AMI 시스템 641개 및 물효율 운영프로그램과 물정보 App서비스 기능으로 구성하였다. 물효율 운영프로그램은 실시간 수요량 예측, 배수지 운영에 따른 취수량, 송수량, 펌프 대수조합 및 운전스케줄링이 가능한 경제적 물공급 스케줄링, 관망상태 감시 및 제어(실시간 유량/수압 분석을 통한 누수분석) 기능이 탑재되어 통합운영센터에서 운영할 계획이다. 데모플랜트 운영을 통해 수자원의 효율적인 배분 및 공급, 유지관리 향상, 운영 비용 최소화 등의 결과를 바탕으로 신도시 및 기존도시의 물관리 정책수립에 활용할 수 있을 뿐만아니라 시간적 공간적 불균형 해소 및 물시장 발전에 크게 기여할 것으로 사료된다.

  • PDF

An Improved Handover Method Using Mobile Tracking by Fuzzy Multi-Criteria Decision Making (기준 의사 결정에 의한 모바일 트래킹을 이용한 향상된 핸드오버)

  • Kang, Il-Ko;Shin, Seong-Yoon;Lee, Jong-Chan;Pyo, Seong-Bae;Rhee, Yang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.1-10
    • /
    • 2006
  • It is widely accepted that the coverage with high user densities can only be achieved with small cell such as micro- and pico-cell. The smaller cell size causes frequent handovers between cells and a decrease in the permissible handover Processing delay. This may result in the handover failure. in addition to the loss of some Packets during the handover. In these cases. re-transmission is needed in order to compensate errors, which triggers a rapid degradation of throughput. In this paper, we propose a new handover scheme in the next generation mobile communication systems, in which the handover setup process is done in advance before a handover request by predicting the handover cell based on mobile terminal's current position and moving direction. Simulation is focused on the handover failure rate and Packet loss rate. The simulation results show that our proposed method provides a better performance than the conventional method.

  • PDF

A mobile data caching synchronization strategy based on in-demand replacement priority (수요에 따른 교체 우선 순위 기반 모바일 데이터베이스 캐쉬 동기화 정책)

  • Zhao, Jinhua;Xia, Ying;Lee, Soon-Jo;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.13-21
    • /
    • 2012
  • Mobile data caching is usually used as an effective way to improve the speed of local transaction processing and reduce server load. In mobile database environment, due to its characters - low bandwidth, excessive latency and intermittent network, caching is especially crucial. A lot of mobile data caching strategies have been proposed to handle these problems over the last few years. However, with smart phone widely application these approaches cannot support vast data requirements efficiently. In this paper, to make full use of cache data, lower wireless transmission quantity and raise transaction success rate, we design a new mobile data caching synchronization strategy based on in-demand and replacement priority. We experimentally verify that our techniques significantly reduce quantity of wireless transmission and improve transaction success rate, especially when mobile client request a large amount of data.

A Deep Learning Approach with Stacking Architecture to Identify Botnet Traffic

  • Kang, Koohong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.123-132
    • /
    • 2021
  • Malicious activities of Botnets are responsible for huge financial losses to Internet Service Providers, companies, governments and even home users. In this paper, we try to confirm the possibility of detecting botnet traffic by applying the deep learning model Convolutional Neural Network (CNN) using the CTU-13 botnet traffic dataset. In particular, we classify three classes, such as the C&C traffic between bots and C&C servers to detect C&C servers, traffic generated by bots other than C&C communication to detect bots, and normal traffic. Performance metrics were presented by accuracy, precision, recall, and F1 score on classifying both known and unknown botnet traffic. Moreover, we propose a stackable botnet detection system that can load modules for each botnet type considering scalability and operability on the real field.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.