• 제목/요약/키워드: Computer-networks

검색결과 5,191건 처리시간 0.03초

수중 음파 센서네트워크에 기존 네트워크 보안을 적용하기 위한 고려사항과 논쟁점 (Considerations and Issues for Applying the Existing Network Security to Underwater Acoustic Sensor Networks)

  • 신동현;이승준;김창화
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1940-1950
    • /
    • 2017
  • The security threat types in underwater communication networks environment are almost the same as the terrestrial, but the security of mechanisms the terrestrial RF-based networks environment can not be directly applied due to not only the limited resources of each node but also unsafe channel such as low propagation delay, high bit error rate etc. Nevertheless there has not been much research on the security of underwater acoustic communication networks. Therefore, in this paper analyzes the differences between the terrestrial communication networks and underwater acoustic communication networks, and identifies issues that are the starting points of underwater communication networks security research.

융합망에서 액세스 네트워크 관리 방안 (A Scheme of Access Network Management in Convergence Networks)

  • 박상준;이종찬;신성윤
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권11호
    • /
    • pp.93-99
    • /
    • 2012
  • B3G 네트워크는 이종의 네트워크 시스템 및 서비스에 대한 연동을 제공하는 차세대 네트워크 기술로 사용자 요구에 맞는 서비스 제공을 목적으로 구성된다. 본 논문에서는 B3G 네트워크에서 액세스 네트워크로 사용될 수 있는 UMTS와 WLAN과 같은 이종 네트워크에 대한 시스템 연동 방안을 기술하며, 각 네트워크에서의 서비스 제공 및 이종 액세스 네트워크를 기반으로 한 서비스 연동 방안을 기술한다. UMTS와 WLAN 시스템은 각 네트워크 특성에 맞는 서비스를 제공하며 B3G 네트워크 구성에 참여하여 상호 보완적인 서비스 제공을 통하여 이동 가입자의 서비스 사용 효과를 증대시킬 수 있다.

Incremental Strategy-based Residual Regression Networks for Node Localization in Wireless Sensor Networks

  • Zou, Dongyao;Sun, Guohao;Li, Zhigang;Xi, Guangyong;Wang, Liping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권8호
    • /
    • pp.2627-2647
    • /
    • 2022
  • The easy scalability and low cost of range-free localization algorithms have led to their wide attention and application in node localization of wireless sensor networks. However, the existing range-free localization algorithms still have problems, such as large cumulative errors and poor localization performance. To solve these problems, an incremental strategy-based residual regression network is proposed for node localization in wireless sensor networks. The algorithm predicts the coordinates of the nodes to be solved by building a deep learning model and fine-tunes the prediction results by regression based on the intersection of the communication range between the predicted and real coordinates and the loss function, which improves the localization performance of the algorithm. Moreover, a correction scheme is proposed to correct the augmented data in the incremental strategy, which reduces the cumulative error generated during the algorithm localization. The analysis through simulation experiments demonstrates that our proposed algorithm has strong robustness and has obvious advantages in localization performance compared with other algorithms.

Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks

  • Hafiz Abdullah, Muhammad Daniel;Hanapi, Zurina Mohd;Zukarnain, Zuriati Ahmad;Mohamed, Mohamad Afendee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1493-1515
    • /
    • 2015
  • A smart meter is one of the core components in Advanced Metering Infrastructure (AMI) that is responsible for providing effective control and monitor of electrical energy consumptions. The multifunction tasks that a smart meter carries out such as facilitating two-way communication between utility providers and consumers, managing metering data, delivering anomalies reports, analyzing fault and power quality, simply show that there are huge amount of data exchange in smart metering networks (SMNs). These data are prone to security threats due to high dependability of SMNs on Internet-based communication, which is highly insecure. Therefore, there is a need to identify all possible security threats over this network and propose suitable countermeasures for securing the communication between smart meters and utility provider office. This paper studies the architecture of the smart grid communication networks, focuses on smart metering networks and discusses how such networks can be vulnerable to security attacks. This paper also presents current mechanisms that have been used to secure the smart metering networks from specific type of attacks in SMNs. Moreover, we highlight several open issues related to the security and privacy of SMNs which we anticipate could serve as baseline for future research directions.

A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak;Lee, Taek;Yoon, Byung-Sik;Kim, Hyo-Gon;In, Hoh Peter
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.626-633
    • /
    • 2009
  • Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

TLF: Two-level Filter for Querying Extreme Values in Sensor Networks

  • Meng, Min;Yang, Jie;Niu, Yu;Lee, Young-Koo;Jeong, Byeong-Soo;Lee, Sung-Young
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.870-872
    • /
    • 2007
  • Sensor networks have been widely applied for data collection. Due to the energy limitation of the sensor nodes and the most energy consuming data transmission, we should allocate as much work as possible to the sensors, such as data compression and aggregation, to reduce data transmission and save energy. Querying extreme values is a general query type in wireless sensor networks. In this paper, we propose a novel querying method called Two-Level Filter (TLF) for querying extreme values in wireless sensor networks. We first divide the whole sensor network into domains using the Distributed Data Aggregation Model (DDAM). The sensor nodes report their data to the cluster heads using push method. The advantages of two-level filter lie in two aspects. When querying extreme values, the number of pull operations has the lower boundary. And the query results are less affected by the topology changes of the wireless sensor network. Through this method, the sensors preprocess the data to share the burden of the base station and it combines push and pull to be more energy efficient.

  • PDF

Adaptive Partition-Based Address Allocation Protocol in Mobile Ad Hoc Networks

  • Kim, Ki-Il;Peng, Bai;Kim, Kyong-Hoon
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.141-147
    • /
    • 2009
  • To initialize and maintain self-organizing networks such as mobile ad hoc networks, address allocation protocol is essentially required. However, centralized approaches that pervasively used in traditional networks are not recommended in this kind of networks since they cannot handle with mobility efficiently. In addition, previous distributed approaches suffer from inefficiency with control overhead caused by duplicated address detection and management of available address pool. In this paper, we propose a new dynamic address allocation scheme, which is based on adaptive partition. An available address is managed in distributed way by multiple agents and partitioned adaptively according to current network environments. Finally, simulation results reveal that a proposed scheme is superior to previous approach in term of address acquisition delay under diverse simulation scenarios.

An Adaptive Fast Expansion, Loading Statistics with Dynamic Swapping Algorithm to Support Real Time Services over CATV Networks

  • Lo Chih-Chen, g;Lai Hung-Chang;Chen, Wen-Shyen E.
    • Journal of Communications and Networks
    • /
    • 제8권4호
    • /
    • pp.432-441
    • /
    • 2006
  • As the community antenna television (CATV) networks becomes ubiquitous, instead of constructing an entirely new broadband network infrastructure, it has emerged as one of the rapid and economic technologies to interconnecting heterogeneous network to provide broadband access to subscribers. How to support ubiquitous real-time multimedia applications, especially in a heavy traffic environment, becomes a critical issue in modern CATV networks. In this paper, we propose a time guaranteed and efficient upstream minislots allocation algorithm for supporting quality-of-service (QoS) traffic over data over cable service interface specification (DOCSIS) CATV networks to fulfill the needs of realtime interactive services, such as video telephony, video on demand (VOD), distance learning, and so on. The proposed adaptive fast expansion algorithm and the loading statistics with dynamic swapping algorithm have been shown to perform better than that of the multimedia cable network system (MCNS) DOCSIS.

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.