• Title/Summary/Keyword: Access node

Search Result 672, Processing Time 0.022 seconds

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

SQMR-tree: An Efficient Hybrid Index Structure for Large Spatial Data (SQMR-tree: 대용량 공간 데이타를 위한 효율적인 하이브리드 인덱스 구조)

  • Shin, In-Su;Kim, Joung-Joon;Kang, Hong-Koo;Han, Ki-Joon
    • Spatial Information Research
    • /
    • v.19 no.4
    • /
    • pp.45-54
    • /
    • 2011
  • In this paper, we propose a hybrid index structure, called the SQMR-tree(Spatial Quad MR-tree) that can process spatial data efficiently by combining advantages of the MR-tree and the SQR-tree. The MR-tree is an extended R-tree using a mapping tree to access directly to leaf nodes of the R-tree and the SQR-tree is a combination of the SQ-tree(Spatial Quad-tree) which is an extended Quad-tree to process spatial objects with non-zero area and the R-tree which actually stores spatial objects and are associated with each leaf node of the SQ-tree. The SQMR-tree consists of the SQR-tree as the base structure and the mapping trees associated with each R-tree of the SQR-tree. Therefore, because spatial objects are distributedly inserted into several R-trees and only R-trees intersected with the query area are accessed to process spatial queries like the SQR-tree, the query processing cost of the SQMR-tree can be reduced. Moreover, the search performance of the SQMR-tree is improved by using the mapping trees to access directly to leaf nodes of the R-tree without tree traversal like the MR-tree. Finally, we proved superiority of the SQMR-tree through experiments.

A Cost-effective Control Flow Checking using Loop Detection and Prediction (루프 검출 및 예측 방법을 적용한 비용 효율적인 실시간 분기 흐름 검사 기법)

  • Kim Gunbae;Ahn Jin-Ho;Kang Sungho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.12
    • /
    • pp.91-102
    • /
    • 2005
  • Recently, concurrent error detection for the processor becomes important. But it imposes too much overhead to adopt concurrent error detection capability on the system. In this paper, a new approach to resolve the problems of concurrent error detection is proposed. A loop detection scheme is introduced to reduce the repetitive loop iteration and memory access. To reduce the memory overheat an offset to calculate the target address of branching node is proposed. Performance evaluation shows that the new architecture has lower memory overhead and frequency of memory access than previous works. In addition, the new architecture provides the same error coverage and requires nearly constant memory size regardless of the size of the application program. Consequently, the proposed architecture can be used as an cost effective method to detect control flow errors in the commercial on the shelf products.

Study on Online Community Media Practice: Focus On Daedeok-valley Radio (온라인 공동체 미디어(Community Media) 실천연구: 대덕밸리라디오를 중심으로)

  • Choi, Soonhee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.39-54
    • /
    • 2017
  • This study started from the consciousness that the community media practice studies have been confined to the traditional terrestrial broadcasting. The following research results and implications were obtained by analyzing Daedeok-valley Radio's case to elucidate characteristics of online-based community media and content production and distribution characteristics neglected in previous researches. First, online community media activities are civic/citizen media activities that capture the value of local communities, and this locality is realized through media content production and its online distribution. Second, contents of online community media link members of the community, and individuals become nodes, interacting both online and offline. Therefore, online-based citizen media activities can be utilized effectively as a means to enhance civic participation and to achieve the locality of community in online and offline spaces depending on strategies for online contents production and distribution. Utilizing online infrastructures for media content creation and distribution in Korea demonstrates potential opportunities of local online media to be considered as niche media that can increase its own sustainability.

List Locking Protocol for XML Data Sharing (XML 데이터 공유를 위한 리스트 잠금 프로토콜)

  • Lee Eunjung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1367-1374
    • /
    • 2004
  • For sharing XML data by many users, a way of concurrency and access control is required for isolating update actions such as inserting and deleting subtrees. Exisiting locking mechanisms as 2PL or MGL suffer low concurrency when applied to tree structures. In this paper, list data subtrees model is proposed based on the semantics expressed in DTD. In this model, tree updating actions such as inserting and deleting subtrees are considered only for the repetitive parts of XML trees. The proposed model guarantees that the result XML tree after applying a tree updating action is always valid, even when multiple users access the tree at the same time. Also, a new locking mechanism called list lock-ing protocol is proposed. The new locking protocol is expected to show better accessility with less number of locking objects compared to the Helmer's OO2PL model. Since update actions on a shared XML tree usually applied to the repetitive parts of the tree, the proposed model is expected to provide a useful way for efficient data sharing when combined with previous locking methods on terminal node data.

A 0.8-V Static RAM Macro Design utilizing Dual-Boosted Cell Bias Technique (이중 승압 셀 바이어스 기법을 이용한 0.8-V Static RAM Macro 설계)

  • Shim, Sang-Won;Jung, Sang-Hoon;Chung, Yeon-Bae
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.1
    • /
    • pp.28-35
    • /
    • 2007
  • In this paper, an ultra low voltage SRAM design method based on dual-boosted cell bias technique is described. For each read/write cycle, the wordline and cell power node of the selected SRAM cells are boosted into two different voltage levels. This enhances SNM(Static Noise Margin) to a sufficient amount without an increase of the cell size, even at sub 1-V supply voltage. It also improves the SRAM circuit speed owing to increase of the cell read-out current. The proposed design technique has been demonstrated through 0.8-V, 32K-byte SRAM macro design in a $0.18-{\mu}m$ CMOS technology. Compared to the conventional cell bias technique, the simulation confirms an 135 % enhancement of the cell SNM and a 31 % faster speed at 0.8-V supply voltage. This prototype chip shows an access time of 23 ns and a power dissipation of $125\;{\mu}W/Hz$.

A Specification for Restricted Delegation to suitable on Distributed Computing (분산 컴퓨팅에 적합한 제한적인 위임 명세)

  • Eun Seung-Hee;Kim Yong-Min;Noh Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1015-1024
    • /
    • 2005
  • A delegation of privileges is one of important processes that empower authority to relevant node to process job that user wants in large-stale distributed environment such as Grid Computing. However, existing delegation methods do not give suitable privilege about Job, and do not atomize range of delegation and exists delegation of access privilege for only resources itself that is not delegation about executing process of job itself. Also, they do not apply about process that needs delegation before and after. execution of job such as reservation of system resources or host access before and after execution. Therefore, this paper proposes a method and specification for restricted delegation in distributed environment. Proposed method separates delegation for job side and privilege side, and express specification and procedure of delegation using XML schema and UML and present restricted delegation scenario in distributed computing environment.

A performance study and IC implementation of high-speed distributed-multimedia shared medium access control protocol(part I:HCR protocol structure and performance) (고속 분산 멀티미디어 서비스를 위한 공유매체 접속제어 프로토콜의 성능분석 및 집적회로 구현 (I부:HCR 프로토콜 구조 및 성능 분석))

  • 강선무;이종필;송호준;김대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.10
    • /
    • pp.2272-2281
    • /
    • 1997
  • This paepr proposes a shared medium access control protocol for hgih-speed multimedia services of distributed subscriber home and small-sized business ATM networks. This protocol offers not only global fairness for the whole network at the same time, but also local fairness for different prioritytraffics on each node. Considering that the future B-ISDN service si a mixture of real and non-real time traffic data, this protocol is designed to accommodate the real time service, by controlling the priority of the real and non-real time data. The simulation results show that the proposed protocol has better performance than the other protocols.

  • PDF

Performance of Opportunistic Incremental NOMA Relay System in Fading Channels (페이딩 채널에서 기회전송 증가 NOMA 릴레이 시스템의 성능분석)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.69-76
    • /
    • 2016
  • In this paper, we investigate the system performance of a cooperative relaying system of Non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC), which is considered promising application in fifth generation (5G) cellular networks. Previous studies have focused on the selected relays, however we include the maxmin relay selection and derive analytical outage probability of opportunistic incremental relaying systems. For the realistic mobile environment, the distributions of relays are modeled as a homogeneous Poisson point process (PPP). And maximal ratio combining (MRC) is adapted to improve the system performance at the destination node. Analytical results demonstrate the outage probability improves with the near/far user power ratio, and the cooperative relaying scheme can achieve low outage probability in comparison to the no relaying scheme. It is also conformed that the increase of the intensity of PPP cause higher gains of the spacial diversity and hence the performance improves.