• Title/Summary/Keyword: Access Network Selection

Search Result 139, Processing Time 0.026 seconds

Multi-path Routing Policy for Content Distribution in Content Network

  • Yang, Lei;Tang, Chaowei;Wang, Heng;Tang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2379-2397
    • /
    • 2017
  • Content distribution technology, which routes content to the cache servers, is considered as an effective method to reduce the response time of the user requests. However, due to the exponential increases of content traffic, traditional content routing methods suffer from high delay and consequent inefficient delivery. In this paper, a content selection policy is proposed, which combines the histories of cache hit and cache hit rate to collaboratively determine the content popularity. Specifically, the CGM policy promotes the probability of possible superior paths considering the storage cost and transmission cost of content network. Then, the content routing table is updated with the proportion of the distribution on the paths. Extensive simulation results show that our proposed scheme improves the content routing and outperforms existing routing schemes in terms of Internet traffic and access latency.

A Study on the Insider Behavior Analysis Using Machine Learning for Detecting Information Leakage (정보 유출 탐지를 위한 머신 러닝 기반 내부자 행위 분석 연구)

  • Kauh, Janghyuk;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • In this paper, we design and implement PADIL(Prediction And Detection of Information Leakage) system that predicts and detect information leakage behavior of insider by analyzing network traffic and applying a variety of machine learning methods. we defined the five-level information leakage model(Reconnaissance, Scanning, Access and Escalation, Exfiltration, Obfuscation) by referring to the cyber kill-chain model. In order to perform the machine learning for detecting information leakage, PADIL system extracts various features by analyzing the network traffic and extracts the behavioral features by comparing it with the personal profile information and extracts information leakage level features. We tested various machine learning methods and as a result, the DecisionTree algorithm showed excellent performance in information leakage detection and we showed that performance can be further improved by fine feature selection.

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

An Analysis on the Selection Process of Core Wireless Communications Technologies in Korean National IT R&D Program

  • Ilsue Roh;Lee, Byoung-Nam;Lee, Jungman
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1320-1323
    • /
    • 2002
  • This paper reviews the Korean government’s selection process of core wireless communications technologies, and presents technology trends, perspectives and strategies of 5 core technologies to develop in wireless communications areas based on the mid term IT technology development plan(2002∼2004). Delphi Panel Method and Analytic Hierarchy Process(AHP) Analysis were adapted to select 30 core technologies in 9 strategic areas. Especially, 5 core wireless communications technologies out of 24 required technologies are selected: 4 G Core Technology, Broadband Wireless Access Network Technology, IMT-2000 Plus STP Technology, OBP Based Multimedia Satellite Communications Technology, Stratosphere Communications System Technology. Strategic national IT R&D program has been essential to continue success story of CDMA technology, and acquiring technology independency from advanced nations. In long term perspectives, a strategy of intensive investment with prudent selection onto core technologies should be deployed in the IT R&D programs. Also, the national IT R&D programs should be limited in the high risk & high returen areas where only government can afford the failures as well as better spill over effects are expected for the technology development and national economy. Korean industry has some strength in wireless communications technology area. Therefore, more policy concerns should be given into this area not only to secure present strength but also to explore better technology competitiveness.

  • PDF

A Sensing Node Selection Scheme for Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Sensor Networks (인지 무선 센서 네트워크에서 에너지 효율적인 협력 스펙트럼 센싱을 위한 센싱 노드 선택 기법)

  • Kong, Fanhua;Jin, Zilong;Cho, Jinsung
    • Journal of KIISE
    • /
    • v.43 no.1
    • /
    • pp.119-125
    • /
    • 2016
  • Cognitive radio technology can allow secondary users (SUs) to access unused licensed spectrums in an opportunistic manner without interfering with primary users (PUs). Spectrum sensing is a key technology for cognitive radio (CR). However, few studies have examined energy-efficient spectrum sensing in cognitive radio sensor networks (CRSNs). In this paper, we propose an energy-efficient cooperative spectrum sensing nodes selection scheme for cluster-based cognitive radio sensor networks. In our proposed scheme, false alarm probability and energy consumption are considered to minimize the number of spectrum sensing nodes in a cluster. Simulation results show that by applying the proposed scheme, spectrum sensing efficiency is improved with a decreased number of spectrum sensing nodes. Furthermore, network energy efficiency is guaranteed and network lifetime is substantially prolonged.

Mobility-Aware Service Migration (MASM) Algorithms for Multi-Access Edge Computing (멀티 액세스 엣지 컴퓨팅을 위한 Mobility-Aware Service Migration (MASM) 알고리즘)

  • Hamzah, Haziq;Le, Duc-Tai;Kim, Moonseong;Choo, Hyunseung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2020
  • In order to reach Ultra-Reliable Low-Latency communication, one of 5G aims, Multi-access Edge Computing paradigm was born. The idea of this paradigm is to bring cloud computing technologies closer to the network edge. User services are hosted in multiple Edge Clouds, deployed at the edge of the network distributedly, to reduce the service latency. For mobile users, migrating their services to the most proper Edge Clouds for maintaining a Quality of Service is a non-convex problem. The service migration problem becomes more complex in high mobility scenarios. The goal of the study is to observe how user mobility affects the selection of Edge Cloud during a fixed mobility path. Mobility-Aware Service Migration (MASM) is proposed to optimize service migration based on two main parameters: routing cost and service migration cost, during a high mobility scenario. The performance of the proposed algorithm is compared with an existing greedy algorithm.

Spatial Correlation-based Resource Sharing in Cognitive Radio SWIPT Networks

  • Rong, Mei;Liang, Zhonghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3172-3193
    • /
    • 2022
  • Cognitive radio-simultaneous wireless information and power transfer (CR-SWIPT) has attracted much interest since it can improve both the spectrum and energy efficiency of wireless networks. This paper focuses on the resource sharing between a point-to-point primary system (PRS) and a multiuser multi-antenna cellular cognitive radio system (CRS) containing a large number of cognitive users (CUs). The resource sharing optimization problem is formulated by jointly scheduling CUs and adjusting the transmit power at the cognitive base station (CBS). The effect of accessing CUs' spatial channel correlation on the possible transmit power of the CBS is investigated. Accordingly, we provide a low-complexity suboptimal approach termed the semi-correlated semi-orthogonal user selection (SC-SOUS) algorithm to enhance the spectrum efficiency. In the proposed algorithm, CUs that are highly correlated to the information decoding primary receiver (IPR) and mutually near orthogonal are selected for simultaneous transmission to reduce the interference to the IPR and increase the sum rate of the CRS. We further develop a spatial correlation-based resource sharing (SC-RS) strategy to improve energy sharing performance. CUs nearly orthogonal to the energy harvesting primary receiver (EPR) are chosen as candidates for user selection. Therefore, the EPR can harvest more energy from the CBS so that the energy utilization of the network can improve. Besides, zero-forcing precoding and power control are adopted to eliminate interference within the CRS and meet the transmit power constraints. Simulation results and analysis show that, compared with the existing CU selection methods, the proposed low-complex strategy can enhance both the achievable sum rate of the CRS and the energy sharing capability of the network.

An Efficient Network Resource Reservation Mechanism with Mobility in Nested Heterogeneous Mobile Networks (중첩 이종 무선 망 환경에서 단말의 이동 속도를 고려한 효과적인 망 자원 예약)

  • Park, In-Soo;Tak, Dong-Kuk;Kim, Won-Tae;Park, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.83-98
    • /
    • 2007
  • The handover between different radio access networks, especially where their coverage overlaps, suffers various complications since the different access networks provide different service characteristics. One way to reduce service interruptions and QoS (i.e., bandwidth, throughput, delay) degradations during the inter-technology handover is to reserve the required resource in advance. The resource reservation algorithm should minimize the handover latency and maximize the resource utilization based on the accurate estimation on mobile's location, velocity, movement pattern and service requirements. In this paper, we propose a resource reservation algorithm based on the mobile terminal velocity and the cell selection probability, which maximizes resource utilization ana reduces network overhead. We compare the proposed algorithm with PMS(Predictive Mobility Support) and VCDS(Velocity and Call Duration Support scheme) based on 3-layer network model under various scenarios.

Optimal Location Selection Algorithm of MSAP for Tactical Communication Networks (전술통신 환경 구축을 위한 MSAP의 최적위치 선정 알고리즘)

  • Cho, Sang-Mok;Kang, Jung-Ho;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1736-1743
    • /
    • 2011
  • In Network Centric Warfare (NCW) environment, having a tactical communication network which provides high data exchange rate is very important. In the process, Korean Army developed Mobile Subscriber Access Point (MSAP) which is based on the commercial Wireless BroadBand (Wibro). MSAP is a vehicle attached base station which provide high data exchange communication environment in a given area. Thus MSAP can provide high data exchange rate and mobility to accomplish missions in the battlefield more effectively. In this paper, we propose an operational strategy of using MSAP to provide tactical communication network in the battlefield. The idea is to find the optimal location point of the MSAP in the operational area where all the troops in the operational area can be supported by the MSAP with a minimum number of MSAP. Since the current Korean Army's basic idea of using MSAP is just distribute this MSAP to each troop, so by applying our strategy we can save MSAP devices for more flexible operation. We will show our strategy's benefits through the mathematical model and the algorithm of the presented problem.

Handoff Improvement Method of an AP Choice for Guarantee of Mobile Node Network Performance according to Speed in Wireless LAN System (무선랜 시스템에서 속도에 따른 이동노드 네트워크 성능 보장을 위한 AP 선택 핸드오프 개선기법)

  • Kim, Dong-Geun;Park, Jae-Heung;Kim, Sang-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.64-71
    • /
    • 2010
  • When Handoff occurs at wireless network, existing AP search chooses one of various APs according to signal strength information. However, IEEE 802.11 uses Medium Access method with CSMA/CA that competes to obtain a channel by sharing medium. Therefore, network performance is heavily affected by the number of nodes and network congestion aside from signal strength. This scheme presented an additional AP selection indicator and a new handoff algorithm to realize handoff guaranteeing the network performance of mobile node in a process selecting new AP. This indicator is includes a handoff cost function reflecting the network information of mobile node, and the mobile node made handoff guaranteeing the network performance using network information possible by using this. also we classified the nodes into high-speed node and low-speed node. Then, when Handoff occurs, high-speed node was made itself choose AP by signal strength information. We also made the low-speed node choose its AP by using AP network information which is applied area. Hence, we demonstrate through simulation that gets an improvement in performance, even in the wireless network which many users concurrently access to, and it has considerable effects on aspects of resources and network management by distribution of users.