• Title/Summary/Keyword: B-MAC

Search Result 314, Processing Time 0.028 seconds

Prevention Scheme of DDoS Attack in Mobile WiMAX Networks Using Shared Authentication Information (Mobile WiMAX 네트워크에서 공유 인증 정보를 이용한 분산 서비스 거부 공격 방어)

  • Kim, Young-Wook;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.162-169
    • /
    • 2009
  • Message Authentication Code (MAC) assures integrity of messages. In Mobile WiMAX, 128-bit Cipher-based MAC (CMAC) is calculated for management messages but only the least significant half is actually used truncating the most significant 64 bits. Naming these unused most significant 64bits Shared Authentication Information (SAI), we suggest that SAI can be applied to protect the network from DDoS attack which exploits idle mode vulnerabilities. Since SAI is the unused half of CMAC, it is as secure as 64bits of CMAC and no additional calculations are needed to obtain it. Moreover, SAI doesn't have to be exchanged through air interface and shared only among MS, BS, and ASN Gateway. With these good properties, SAI can efficiently reduce the overheads of BS and ASN GW under the DDoS attack.

Decentralized TDM-PON MAC Protocol Based on Power Detection (파워검출 기반의 분산형 TDM-PON MAC 프로토콜)

  • Lee, Sung-Kuen;Kim, Eal-Lae;Lee, Yong-Won;Lee, Sang-Rok;Jung, Dae-Kwang;Hwang, Seong-Taek;Oh, Yun-Je;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.83-89
    • /
    • 2007
  • In this paper, we have proposed the power detection (PD)-based TDM-PON architecture, which is implemented with a hardware-based decentralized DBA (Dynamic Bandwidth Allocation) algorithm among ONUs, without OLT's intervention. Of particular importance in the proposed approach is that the hardware-based power detection scheme is used to manage the distributed MAC algorithm without any complex, time-consuming and costly software-processing elements for DBA in ONUs and OLT. We evaluate the performance of average packet end-to-end delay in a statistical analysis and numerical analysis. In addition, through simulations with various traffic models, we verified the superior performance of the proposed approach by comparing with the results of other E-PONs.

Study on the Correlation between Sasang Constitution and the Data of Pulse Diagnosis Device - A Systematic Review in Korean Articles - (사상체질과 맥진기 검사 결과와의 상관성에 대한 연구 - 국내 논문에 대한 체계적 고찰 -)

  • Lee, Hye Yoon;Jung, A Ram;Son, Han Beom;Hwang, Man Suk;Lee, Jeong Won;Kim, Gyeong Cheol;Yun, Young Ju
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.26 no.5
    • /
    • pp.621-629
    • /
    • 2012
  • This study aimed to examine the possibility of data from pulse diagnosis device to be used for diagnosis of Sasang constitution. Systematic searches of 5 major Korean medical database were conducted for articles published up to May 2012. Searching key word was "Sasang" or "Constitution". Studies dealt with correlation between Sasang constitution and the pulse wave data from pulse diagnosis machine were included. Totally 2886 studies are searched and 3 studies are added from references of evaluated articles. Among them, 12 studies were met our inclusion criteria (2 Xishu Mac, 2 Self-made pulse diagnosis machine, 8 3D-Mac). Three of the eight 3D-Mac studies intended to develop a formula of constitutional differential diagnosis, 2 studies compared variables by Sasang constitution in healthy group and 3 studies compared variables by Sasang constitution in healthy group and special disease group. They all reported some significant variables, however results are not consistent between studies. The accuracy of the formula of constitutional differential diagnosis using 3D-Mac pulse diagnosis devices is 46.0% by now. Improvements in measuring pulse are required to achieve more accurate result and be used for diagnosis of Sasang constitution. Compensating B.M.I. among Sasang constitutional groups and separating constitutional pulse factors from acquired characteristics are also needed in further study.

An Energy Consumption Model for Time Hopping IR-UWB Wireless Sensor Networks

  • Hoque, M.E.;Khan, M.A.;Parvez, A.Al;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6B
    • /
    • pp.316-324
    • /
    • 2007
  • In this paper we proposed an energy consumption model for IR-UWB wireless sensor networks. The model takes the advantages of PHY-MAC cross layer design, and we used slotted and un-slotted sleeping protocols to compare the energy consumption. We addressed different system design issues that are responsible to energy consumption and proposed an optimum model for the system design. We expect the slotted sleeping will consume less energy for bursty load than that of the un-slotted one. But if we consider latency, the un-slotted sleeping model performs better than the slotted sleeping case.

The Relationship Between Attachment Behaviors and Narrative Representations about Mothers by 3 and 4 year-old Children (3-4세 유아의 애착 행동과 어머니에 대한 표상 간의 관계)

  • Shin, Hyewon;Lee, Young
    • Korean Journal of Child Studies
    • /
    • v.26 no.6
    • /
    • pp.89-110
    • /
    • 2005
  • Subjects were 66 3- to 4-year-old-Children of unemployed mothers from upper middle class families. Attachment behaviors were measured with the Preschool Strange Situation(Cassidy and Marvin, 1992) and classified as secure, avoidant, dependent, or disorganized. Narrative representations of mothers by Children were obtained by video taped interviews using the MacArthur Story-Stem Battery and coded by the MacArthur Narrative Working Group(1997) system. Data were analyzed with descriptive statistics and t test. Results were that children in the secure group showed more positive representations of their mothers, more prosocial story themes, had higher scores in theme coherence and showed more positive emotional expression than those in the insecure group. The attachment behaviors of the 4 groups(A, B, C, D) were closely correlated with the attachment representations shown in MSSB.

  • PDF

Variations and Series Expansions of the Symbolic Multiple-Valued Logic functions (기호 다치 논리함수와 그 변화 및 전개)

  • 이성우;정환묵
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.20 no.5
    • /
    • pp.1-7
    • /
    • 1983
  • Generally, multiple-valued logic algebra is based on the number system of modulo-M. In this paper, characters a, b, c‥… each of them represents the independent state, are regarded as the elements of the symbolic multiple-valued logic. By using the set theory, the symbolic multiple - valued logic and their functions are defined. And Varation for the symbolic logic function due to the variation of a variable and their properties are suggested and analized. With these variations, the MacLaurin's and Taylor's Series expansions of the symbolic logic functions are proposed and proved.

  • PDF

Dynamic Retry Adaptation Scheme to Improve Transmission of H.264 HD Video over 802.11 Peer-to-Peer Networks

  • Sinky, Mohammed;Lee, Ben;Lee, Tae-Wook;Kim, Chang-Gone;Shin, Jong-Keun
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1096-1107
    • /
    • 2015
  • This paper presents a dynamic retry adaptation scheme for H.264 HD video, called DRAS.264, which dynamically adjusts the retry limits of frames at the medium access control (MAC) layer according to the impact those frames have on the streamed H.264 HD video. DRAS.264 is further improved with a bandwidth estimation technique, better prediction of packet delays, and expanded results covering multi-slice video. Our study is performed using the Open Evaluation Framework for Video Over Networks as a simulation environment for various congestion scenarios. Results show improvements in average peak signal-to-noise ratios of up to 4.45 dB for DRAS.264 in comparison to the default MAC layer operation. Furthermore, the ability of DRAS.264 to prioritize data of H.264 bitstreams reduces error propagation during video playback, leading to noticeable visual improvements.

Overview of 3G LTE L1/L2 Standardization Works (3G LTE 물리계층/MAC 계층 기술 동향)

  • Kim, I.G.;Kim, J.H.;Kim, Y.H.;Ryu, B.H.;Park, H.J.;Bang, S.C.
    • Electronics and Telecommunications Trends
    • /
    • v.21 no.3 s.99
    • /
    • pp.36-47
    • /
    • 2006
  • 이동통신 시스템은 점차 고품질 및 고속의 멀티미디어 서비스를 제공하는 방향으로 가고 있다. 3GPP에서는 기존의 WCDMA 기반의 3세대 이동통신 시스템의 기술적 한계를 극복하기 위해 2004년 말에 3rd Generation Long Term Evolution(3G LTE) Plan을 발표하고, 2006년 6월까지 Technical Report 규격을 작성완료하고 2007년 6월까지 Technical Standard 작성완료를 목표로 2005년 초부터 규격 작업을 수행하고 있다. 본 고에서는 3G LTE 물리계층 및 MAC 계층의 기술 표준화 동향을 살펴본다.

A File/Directory Reconstruction Method of APFS Filesystem for Digital Forensics

  • Cho, Gyu-Sang;Lim, Sooyeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.8-16
    • /
    • 2022
  • In this paper, we propose a method of reconstructing the file system to obtain digital forensics information from the APFS file system when meta information that can know the structure of the file system is deleted due to partial damage to the disk. This method is to reconstruct the tree structure of the file system by only retrieving the B-tree node where file/directory information is stored. This method is not a method of constructing nodes based on structural information such as Container Superblock (NXSB) and Volume Checkpoint Superblock (APSB), and B-tree root and leaf node information. The entire disk cluster is traversed to find scattered B-tree leaf nodes and to gather all the information in the file system to build information. It is a method of reconstructing a tree structure of a file/directory based on refined essential data by removing duplicate data. We demonstrate that the proposed method is valid through the results of applying the proposed method by generating numbers of user files and directories.

THE GROWTH OF BLOCH FUNCTIONS IN SOME SPACES

  • Wenwan Yang;Junming Zhugeliu
    • Bulletin of the Korean Mathematical Society
    • /
    • v.61 no.4
    • /
    • pp.959-968
    • /
    • 2024
  • Suppose f belongs to the Bloch space with f(0) = 0. For 0 < r < 1 and 0 < p < ∞, we show that $$M_p(r,\,f)\,=\,({\frac{1}{2\pi}}{\int_{0}^{2\pi}}\,{\mid}f(re^{it}){\mid}^pdt)^{1/p}\,{\leq}\,({\frac{{\Gamma}(\frac{p}{2}+1)}{{\Gamma}(\frac{p}{2}+1-k)}})^{1/p}\,{\rho}{\mathcal{B}}(log\frac{1}{1-r^2})^{1/2},$$ where ρʙ(f) = supz∈ⅅ(1 - |z|2)|f'(z)| and k is the integer satisfying 0 < p - 2k ≤ 2. Moreover, we prove that for 0 < r < 1 and p > 1, $${\parallel}f_r{\parallel}_{B_q}\,{\leq}\,r\,{\rho}{\mathcal{B}}(f)(\frac{1}{(1-r^2)(q-1)})^{1/q},$$ where fr(z) = f(rz) and ||·||ʙq is the Besov seminorm given by ║f║ʙq = (∫𝔻 |f'(z)|q(1-|z|2)q-2dA(z)). These results improve previous results of Clunie and MacGregor.