• Title/Summary/Keyword: Availability Guarantee

Search Result 71, Processing Time 0.026 seconds

Orbit Ephemeris Failure Detection in a GNSS Regional Application

  • Ahn, Jongsun;Lee, Young Jae;Won, Dae Hee;Jun, Hyang-Sig;Yeom, Chanhong;Sung, Sangkyung;Lee, Jeong-Oog
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.16 no.1
    • /
    • pp.89-101
    • /
    • 2015
  • To satisfy civil aviation requirements using the Global Navigation Satellite System (GNSS), it is important to guarantee system integrity. In this work, we propose a fault detection algorithm for GNSS ephemeris anomalies. The basic principle concerns baseline length estimation with GNSS measurements (pseudorange, broadcasted ephemerides). The estimated baseline length is subtracted from the true baseline length, computed using the exact surveyed ground antenna positions. If this subtracted value differs by more than a given threshold, this indicates that an ephemeris anomaly has been detected. This algorithm is suitable for detecting Type A ephemeris failure, and more advantageous for use with multiple stations with various long baseline vectors. The principles of the algorithm, sensitivity analysis, minimum detectable error (MDE), and protection level derivation are described and we verify the sensitivity analysis and algorithm availability based on real GPS data in Korea. Consequently, this algorithm is appropriate for GNSS regional implementation.

Performance Analysis of Coordinated Cognitive Radio Networks under Fixed-Rate Traffic with Hard Delay Constraints

  • Castellanos-Lopez, S. Lirio;Cruz-Perez, Felipe A.;Rivero-Angeles, Mario E.;Hernandez-Valdez, Genaro
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.130-139
    • /
    • 2014
  • Due to the unpredictable nature of channel availability, carrying delay-sensitive traffic in cognitive radio networks (CRNs) is very challenging. Spectrum leasing of radio resources has been proposed in the so called coordinated CRNs to improve the quality of service (QoS) experienced by secondary users (SUs). In this paper, the performance of coordinated CRNs under fixed-rate with hard-delay-constraints traffic is analyzed. For the adequate and fair performance comparison, call admission control strategies with fractional channel reservation to prioritize ongoing secondary calls over new ones are considered. Maximum Erlang capacity is obtained by optimizing the number of reserved channels. Numerical results reveal that system performance strongly depends on the value of the mean secondary service time relative to the mean primary service time. Additionally, numerical results show that, in CRNs without spectrum leasing, there exists a critical utilization factor of the primary resources from which it is not longer possible to guarantee the required QoS of SUs and, therefore, services with hard delay constraints cannot be even supported in CRNs. Thus, spectrum leasing can be essential for CRN operators to provide the QoS demanded by fixed-rate applications with hard delay constraints. Finally, the cost per capacity Erlang as function of both the utilization factor of the primary resources and the maximum allowed number of simultaneously rented channels is evaluated.

A Study on the Hazard Identification and Risk Mitigation for ATSRX Using Hazard and Operability Study (HAZOP Study를 사용한 ATSRX의 위험원도출 및 리스크 완화에 관한 연구)

  • LEE Jun-Ho;LEE Kang-Mi;KIM Yong-Kyu;SHIN Ducko
    • Journal of the Korean Society for Railway
    • /
    • v.8 no.6 s.31
    • /
    • pp.533-538
    • /
    • 2005
  • In this paper we identity the hazard using HAZOP study for ATSRX which is a subsystem of the ATP system, and we study a safety management method for the mitigation of the risk to the acceptable level. ATSRX is a device that make a train which has a ATP system operate in ATS line. For this ATSRX send a induction signal with ATS system to vehicle controller. Thus ATSRX can be said a safety equipment that makes a train operate safely. In order to identify the hazard for the internal faults in ATSRX system, we employ HAZOP study method which is recommended as hazard identification in IEC 62278, RAMS requirements in railway signal, and also it provide the detail activity in IEC 61882. Thus, in this paper we perform HAZOP study based on ATSRX related standards and using the assessment of the identified hazard we study a method to guarantee the system safety through the change of the design to mitigate the risk to the acceptable level.

Design Patterns for Building Context-Aware Transactional Services in PaaS-Enabled Systems

  • Ettazi Widad;Riane Driss;Nassar Mahmoud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.91-100
    • /
    • 2023
  • Pervasive computing is characterized by a key characteristic that affects the operating environment of services and users. It places more emphasis on dynamic environments where available resources continuously vary without prior knowledge of their availability, while in static environments the services provided to users are determined in advance. At the same time, Cloud computing paradigm introduced flexibility of use according to the user's profile and needs. In this paper, we aimed to provide Context-Aware Transactional Service applications with solutions so that it can be integrated and invoked like any service in the digital ecosystem. Being able to compose is not enough, each service and application must be able to offer a well-defined behavior. This behavior must be controlled to meet the dynamicity and adaptability necessary for the new user's requirements. The motivation in this paper is to offer design patterns that will provide a maximum of automatism in order to guarantee short reaction times and minimal human intervention. Our proposal includes a cloud service model by developing a PaaS service that allows CATS adaptation. A new specification for the validation of CATS model has been also introduced using the ACTA formalism.

A Survey on LEO-PNT Systems

  • Hong-Woo Seok;Sangjae Cho;Seung-Hyun Kong;Jung-Min Joo;Jongwon Lim
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.323-332
    • /
    • 2023
  • Today, services using Positioning, Navigation, and Timing (PNT) technology are provided in various fields, such as smartphone Location-Based Service (LBS) and autonomous driving. Generally, outdoor positioning techniques depend on the Global Navigation Satellite System (GNSS), and the need for positioning techniques that guarantee positioning accuracy, availability, and continuity is emerging with advances in service. In particular, continuity is not guaranteed in urban canyons where it is challenging to secure visible satellites with standalone GNSS, and even if more than four satellites are visible, the positioning accuracy and stability are reduced due to multipath channels. Research using Low Earth Orbit (LEO) satellites is already underway to overcome these limitations. In this study, we conducted a trend analysis of LEO-PNT research, an LEO satellite-based navigation and augmentation system. Through comparison with GNSS, the differentiation of LEO-PNT was confirmed, and the system design and receiver processing were analyzed according to LEO-PNT classification. Lastly, the current status of LEO-PNT development by country and institution was confirmed.

DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight

  • Hui Jin;Zhaoyang Li;Ruiqin Hu;Jinglei Tan;Hongqi Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3163-3181
    • /
    • 2023
  • Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the important nodes determined by the nature of network topology provide a great convenience for eavesdropping attacks. To resist monitoring attacks, this paper proposes a random routing mutation defense method based on dynamic path weight (DPW-RRM). It utilizes network centrality indicators to determine important nodes in the network topology and reduces the probability of important nodes in path selection, thereby distributing traffic to multiple communication paths, achieving the purpose of increasing the difficulty and cost of eavesdropping attacks. In addition, it dynamically adjusts the weight of the routing path through network state constraints to avoid link congestion and improve the availability of routing mutation. Experimental data shows that DPW-RRM could not only guarantee the normal algorithmic overhead, communication delay, and CPU load of the network, but also effectively resist eavesdropping attacks.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Resolution Scheme of CRP Reservation Conflicts for Supporting QoS in ECMA-392-Based Ship Area Networks (ECMA-392 기반 선박 내 네트워크에서 QoS를 지원하는 CRP 예약 충돌 해결 방안)

  • Lee, Seong Ro;Oh, Joo-Seong;Kim, Beom-Mu;Lee, Yeonwoo;Jeong, Min-A;Lee, Seung Beom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1298-1306
    • /
    • 2014
  • In this paper, we use the ECMA-392 standard, the first cognitive radio networks to meet the demand for IT services in the ship. And, we investigate about the conflicts of devices that support multi-hop network based on the ECMA-392. Therefore, we propose the resolution scheme of CRP reservation conflicts to solve this. The current CRP reservation approaches does not solve the CRP reservation conflicts of ECMA-392 between devices that move at a distance of three hops. Therefore, it is not possible to guarantee the QoS of real time services such as multimedia streaming. So, we provide a new CRP reservation scheme to avoid conflict through a new 2-hop CRP Availability IE and the change of CRP Control field. From the simulation results, we know that the proposed method of 3 hops CRP reservation conflicts resolution improves the throughput of device.