• Title/Summary/Keyword: 트리워킹

Search Result 9, Processing Time 0.023 seconds

Backward Channel Protection Method For RFID Tag Security in the Randomized Tree Walking Algorithm (랜덤화된 트리워킹 알고리즘에서의 RFID 태그 보안을 위한 백워드 채널 보호 방식)

  • Choi Wonjoon;Roh Byeong-hee;Yoo S. W.;Oh Young Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.415-421
    • /
    • 2005
  • Passive RFID tag does not have its own power, so it has very poor computation abilities and it can deliver signals in very short range. From the facts, most RFID Tag security schemes assumed that the backward channel from tags to a reader is safe from eavesdropping. However, eavesdroppers near a tag can overhear message from a tag illegally. In this paper, we propose a method to protect the backward channel from eavesdropping by illegal readers. The proposed scheme can overcome the problems of conventional schemes such as randomized tree walking, which have been proposed to secure tag information in tree-walking algorithm as an anti-collision scheme for RFID tags. We showed the efficiency of our proposed method by using an analytical model, and it is also shown that the proposed method can provide the probability of eavesdropping in some standardized RFID tag system such as EPCglobal, ISO, uCode near to '0'.

미래 인터넷을 위한 콘텐트 기반 네트워킹 아키텍쳐

  • Gwon, Tae-Gyeong
    • Information and Communications Magazine
    • /
    • v.27 no.10
    • /
    • pp.43-47
    • /
    • 2010
  • 본고에서는 미래 인터넷 구조를 제안하는 연구 중에서 콘텐트 기반 네트워킹 구조에 관련된 연구들을 살펴본다. DONA는 모든 콘텐트에 대해 각각 유일하고 flat한 이름을 부여하고 전체 콘텐트들을 하나의 트리 구조로 라우팅하는 네트워킹 구조를 제시한다. CCN은 기존의 URL과 비슷한 계층적인 콘텐트 이틈을 사용하는 것을 제시하나 콘텐트가 호스트와 무관하게 위치하기 때문에 역시 콘텐트 이름 별로 flooding 기반의 라우팅을 하게 된다. 또한 본고에서는 기존의 호스트 기반 네트워킹과 콘텐트 기반의 네트워킹의 장단점을 비교한다.

Flow Protocol based Flow Entry Eviction Strategy for Software Defined Networking (소프트웨어 정의 네트워킹에서 플로우 프로토콜을 고려한 플로우 엔트리 방출 전략)

  • Choi, Hanhimnara;Raza, Syed Muhammad;Kim, Moonseong;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.128-130
    • /
    • 2020
  • 소프트웨어 정의 네트워킹(SDN)은 기존 네트워크의 컨트롤 기능을 컨트롤러에 중앙 집중화하여 프로그램 가능하며 유연한 네트워크 관리 방식을 제공한다. 컨트롤러-스위치 간 인터페이스 표준 기술인 OpenFlow에서는 스위치 내부의 플로우 테이블을 이용하여 네트워크에 접근하는 패킷을 처리한다. 하지만 OpenFlow 스위치에 주로 사용되는 TCAM의 부족한 용량으로 인해, 많은 트래픽이 발생하는 환경에서 플로우 테이블에 충분한 양의 플로우 엔트리를 설치하지 못하는 문제가 발생한다. 이 경우 플로우 테이블 오버플로우가 발생하는데, 네트워크에 새로이 진입하는 플로우를 위하여 기존의 플로우 엔트리를 방출시킬 필요가 있다. 이때, 활성화된 플로우 엔트리를 방출하게 되면 네트워크 컨트롤 오버헤드가 크게 증가할 위험이 있다. 따라서 오버플로우가 발생했을 때 어떤 플로우 엔트리를 방출시킬지 정하는 것이 중요하다. 이에 본 논문은 플로우 프로토콜 타입에 기반한 플로우 엔트리 방출 정책을 제안하여 효율적인 플로우 테이블 사용을 목표로 한다.

Collision Tree Based Anti-collision Algorithm in RFID System (RFID시스템에서 충돌 트리 기반 충돌방지 알고리즘)

  • Seo, Hyun-Gon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.316-327
    • /
    • 2007
  • RFID (Radio Frequency Identification) is one of the most promising air interface technologies in the future for object identification using radio wave. If there are multiple tags within the range of the RFID tag reader, all tags send their tag identifications to the reader at the same time in response to the reader's query. This causes collisions on the reader and no tag is identified. A multi-tag identification problem is a core issue in the RFID. It can be solved by anti-collision algorithm such as slot based ALHOA algorithms and tree based algorithms. This paper, proposes a collision tree based anti-collision algorithm using collision tree in RFID system. It is a memory-less algorithm and is an efficient RFID anti-collision mechanism. The collision tree is a mechanism that can solve multi-tag identification problem. It is created in the process of querying and responding between the reader and tags. If the reader broadcasts K bits of prefix to multiple tags, all tags with the identifications matching the prefix transmit the reader the identifications consisted of k+1 bit to last. According to the simulation result, a proposed collision tree based anti-collision algorithm shows a better performance compared to tree working algorithm and query tree algorithm.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

A Study on the Tree based Memoryless Anti-Collision Algorithm for RFID Systems (RFID 시스템에서의 트리 기반 메모리래스 충돌방지 알고리즘에 관한 연구)

  • Quan Chenghao;Hong Wonkee;Lee Yongdoo;Kim Hiecheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.851-862
    • /
    • 2004
  • RFID(Radio frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. The multi-tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, most of the existing anti-collision algorithms have a problem of heavy implementation cost and low performance. In this paper. we propose a new tree based memoryless anti-collision algorithm called a collision tracking tree algorithm and presents its performance evaluation results obtained by simulation. The Collision Tracking Tree algorithm proves itself the capability of an identification rate of 749 tags per second and the performance evaluation results also show that the proposed algorithm outperforms the other two existing tree-based memoryless algorithms, i.e., the tree-walking algorithm and the query tree algorithm about 49 and 2.4 times respectively.

Modeling of Virtual Switch in Cloud System (클라우드 시스템의 가상 스위치 모델링)

  • Ro, Cheul-Woo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.479-485
    • /
    • 2013
  • Virtualization is a promising approach to consolidating multiple online services onto a smaller number of computing resources. A virtualized server environment allows computing resources to be shared among multiple performance isolated platforms called virtual machines. Through server virtualization software, applications servers are encapsulated into VMs, and deployed with APIs on top generalized pools of CPU and memory resources. Networking and security have been moved to a software abstraction layer that transformed computing, network virtualization. And it paves the way for enterprise to rapidly deploy networking and security for any application by creating the virtual network. Stochastic reward net (SRN) is an extension of stochastic Petri nets which provides compact modeling facilities for system analysis. In this paper, we develop SRN model of network virtualization based on virtual switch. Measures of interest such as switching delay and throughput are considered. These measures are expressed in terms of the expected values of reward rate functions for SRNs. Numerical results are obtained according to the virtual switch capacity and number of active VMs.

An Efficient Multicast Routing Scheme for Mobile Hosts in IPv6 based Networks (IPv6 기반 망에서 이동 호스트들을 위한 효율적인 멀티캐스트 라우팅 기법)

  • Yang, Seung-Jei;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.11-18
    • /
    • 2001
  • In this paper, we propose a multicast routing scheme for an efficient and reliable support of multicast service to mobile hosts in IPv6 based networks. The purpose of this paper is to develop an algorithm to reduce both the number or multicast tree reconstruction and the multicast service disrupt time. The proposed multicast routing scheme is a hybrid method using the advantages of the bi-directional tunneling and the remote subscription proposed by the IETF Mobile IP working group. The proposed scheme satisfies the maximum tolerable transfer delay time and supports the maximum tunneling service. The simulation results show that the proposed scheme has better performance in the number of multicast tree reconstruction and the time of multicast service disrupt than the previous schemes does.

  • PDF

Improvement of the Data Authentication of CCN (CCN 데이터 인증 기술의 성능 개선 연구)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.341-349
    • /
    • 2017
  • CCN proposes that intermediate network nodes on a network path for a transmitted data-packet cache the data-packet. If the nodes receive request packets for the cached data, the nodes can directly respond to the request-packets using the cached data. Since a request-packet can be responded by one of the intermediate nodes on a path of the request-packet, both faster response time and decreased data transmission amount are expected comparing to the existing host centric networking. However, CCN is vulnerable against forgery attacks because data-packet receivers cannot identify a data provider. Hence, a data authentication scheme is essentially needed to make CCN more secure. But such a data authentication process is one of the main causes of CCN-based service delays. This paper first analyzes the problems of a CCN data authentication scheme, then proposes an improved authentication operation scheme for efficiently authenticating data, and finally evaluates its performance.