• 제목/요약/키워드: Distributed & Dynamic Detection

검색결과 41건 처리시간 0.022초

IPv6 Autoconfiguration for Hierarchical MANETs with Efficient Leader Election Algorithm

  • Bouk, Safdar Hussain;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • 제11권3호
    • /
    • pp.248-260
    • /
    • 2009
  • To connect a mobile ad hoc network (MANET) with an IP network and to carryout communication, ad hoc network node needs to be configured with unique IP adress. Dynamic host configuration protocol (DHCP) server autoconfigure nodes in wired networks. However, this cannot be applied to ad hoc network without introducing some changes in auto configuration mechanism, due to intrinsic properties (i.e., multi-hop, dynamic, and distributed nature) of the network. In this paper, we propose a scalable autoconfiguration scheme for MANETs with hierarchical topology consisting of leader and member nodes, by considering the global Internet connectivity with minimum overhead. In our proposed scheme, a joining node selects one of the pre-configured nodes for its duplicate address detection (DAD) operation. We reduce overhead and make our scheme scalable by eliminating the broadcast of DAD messages in the network. We also propose the group leader election algorithm, which takes into account the resources, density, and position information of a node to select a new leader. Our simulation results show that our proposed scheme is effective to reduce the overhead and is scalable. Also, it is shown that the proposed scheme provides an efficient method to heal the network after partitioning and merging by enhancing the role of bordering nodes in the group.

동특성 앙상블 학습 기반 구조물 진단 모니터링 분산처리 시스템 (Decentralized Structural Diagnosis and Monitoring System for Ensemble Learning on Dynamic Characteristics)

  • 신윤수;민경원
    • 한국전산구조공학회논문집
    • /
    • 제34권4호
    • /
    • pp.183-189
    • /
    • 2021
  • 구조물에 장기적으로 발생하는 노후화를 정량적으로 파악하기 위해 상시진동 데이터를 활용한 일반화된 모니터링 시스템에 관한 연구가 세계적으로 활발히 수행중이다. 본 연구에서는 구조물에서 장기적으로 취득되는 동특성을 앙상블 학습에 활용하여 구조물의 이상을 감지하기 위한 보급형 엣지 컴퓨팅 시스템을 구축하였다. 시스템의 하드웨어는 라즈베리파이와 보급형 가속도계, 기울기센서, GPS RTK 모듈, 로라 모듈로 구성됐다. 실험실 규모의 구조물 모형 진동실험을 통해 동특성을 활용한 앙상블 학습의 구조물 이상감지를 검증하였으며, 실험을 기반으로 한 실시간 동특성 추출 분산처리 알고리즘을 라즈베리파이에 탑재하였다. 구축된 시스템을 하우징하고 포항시 행정복지센터에 설치하여 데이터를 취득함으로써 개발된 시스템의 현장 적용성을 검증하였다.

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권6호
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

분포형 유연촉각센서 (Distributed Flexible Tactile Sensor)

  • 유기호;윤명종
    • 제어로봇시스템학회논문지
    • /
    • 제10권1호
    • /
    • pp.60-65
    • /
    • 2004
  • A flexible tactile sensor away with 8 H 8 tactile elements is designed and fabricated. The material of the sensor is PVDF(polyvinylidene fluoride) film and flexible circuitry is used in the fabrication fur the flexibility of the sensor The experimental results on static and dynamic properties of the sensor are obtained and examined. The signals of a contact pressure to the sensor are sensed and processed in the DSP system in which the signals are digitalized and filtered. The processed signals of the sensor outputs are visualized in a personal computer for illustrating the shape and force distribution of a contact object. The reasonable performance for the detection of contact state is verified through sensing examples.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

다공성 구조를 가진 압저항 CNT/PDMS 소자의 감지특성 연구 (A Study of Detection Properties of Piezoresistive CNT/PDMS Devices with Porous Structure)

  • 이원준;이상훈
    • 센서학회지
    • /
    • 제33권3호
    • /
    • pp.165-172
    • /
    • 2024
  • In this study, we investigated the detection properties of piezoresistive carbon nanotubes/polydimethylsiloxane (CNT/PDMS) devices with porous structures under applied pressure. The device, having dimensions of 10 mm × 10 mm × 5 mm, was fabricated with a porosity of 74.5%. To fabricate piezoresistive CNT/PDMS devices, CNTs were added using two different methods. In the first method, the CNTs were mixed with PDMS before the fabrication of the porous structure, while in the second, the CNTs were coated after the fabrication of the porous structure. Various detection properties of the fabricated devices were examined at different applied pressures. The CNT-coated device exhibited stable outputs with lesser variation than the CNT-mixed device. Moreover, the CNT-coated device exhibited improved reaction properties. The response time of the CNT-coated device was 1 min, which was approximately about 20 times faster than that of the CNT-mixed device. Considering these properties, CNT-coated devices are more suitable for sensing devices. To verify the CNT-coated device as a real sensor, it was applied to the gripping sensor system. A multichannel sensor system was used to measure the pressure distribution of the gripping sensor system. Under various gripping conditions, this system successfully measured the distributed pressures and exhibited stable dynamic responses.

온라인 분산게임 서버의 충돌처리 설계 (The Collision Processing Design of an Online Distributed Game Server)

  • 이승욱
    • 한국콘텐츠학회논문지
    • /
    • 제6권1호
    • /
    • pp.72-79
    • /
    • 2006
  • 최근의 MMORPG 게임은 심리스 월드로 분할하는 분산 서버를 구축하고 있다. 본 연구는 이러한 분산서버 간의 공유영역에 해당되는 지역에 대한 충돌처리를 다룬다. 분산 서버간의 공유 영역에 대한 경계영역을 동적으로 조정하기 위해 DLS을 사용하고, 광선과 단말 노드 간의 충돌 위치 관계를 통하여 이웃 노드를 빠르게 탐색한다. 이렇게 구해진 노드의 값을 통하여 객체 간의 충돌처리를 판별한다. 이것은 각 서버가 공유 영역에 대한 정보를 계속 보유할 필요가 없고, 서버간의 경계 영역을 포인터를 이용하여 빠르게 탐색할 수 있게 한다. 충돌은 계층적 경계상자를 이용하여 인접한 개체의 값들을 그룹으로 이진트리로 구축한다. 이러한 처리 방법은 처리량을 이분화 시켜 효과적으로 처리량을 줄일 수 있다. 또한 실시간적으로 발생되는 개체 정보의 변경 시 공유영역에 대한 복사가 필요하지 않으므로 네트워크 트래픽에 대한 처리량도 효과적으로 줄일 수 있다.

  • PDF

Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks

  • Kong, Jong-Hwan;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.421-433
    • /
    • 2015
  • Recently, there have been fast-growing social network services based on the Internet environment and web technology development, the prevalence of smartphones, etc. Social networks also allow the users to convey the information and news so that they have a great influence on the public opinion formed by social interaction among users as well as the spread of information. On the other hand, these social networks also serve as perfect environments for rampant malware. Malware is rapidly being spread because relationships are formed on trust among the users. In this paper, an effective patch strategy is proposed to deal with malicious worms based on social networks. A graph is formed to analyze the structure of a social network, and subgroups are formed in the graph for the distributed patch strategy. The weighted directions and activities between the nodes are taken into account to select reliable key nodes from the generated subgroups, and the Incremental PageRanking algorithm reflecting dynamic social network features (addition/deletion of users and links) is used for deriving the high influential key nodes. With the patch based on the derived key nodes, the proposed method can prevent worms from spreading over social networks.

파워검출 기반의 분산형 TDM-PON MAC 프로토콜 (Decentralized TDM-PON MAC Protocol Based on Power Detection)

  • 이성근;김일래;이용원;이상록;정대광;황성택;오윤제;박진우
    • 한국통신학회논문지
    • /
    • 제32권2B호
    • /
    • pp.83-89
    • /
    • 2007
  • 본 논문에서는 OLT의 중앙집중 제어에 의한 대역폭 중재 없이 ONU간의 분산적인 동적 대역폭 할당을 이룰 수 있는 파워 검출 기반의 TDM-PON의 MAC 프로토콜을 제안하였다. 기존의 E-PON에서 사용하는 소프트웨어 기반의 DBA 방식과 달리, 제안된 방식은 하드웨어 기반의 파워 검출을 활용하여 동적 대역폭 할당 알고리즘을 수행함으로써 간단하고 빠르며 비용효과 측면에서 장점을 가진다. 제안된 가입자 망의 성능 평가는 수식적 분석과 컴퓨터 시뮬레이션을 통하여 수행하였으며, 특히 다양한 트래픽 모델 환경에서 제안된 방식의 성능향상 정도를 기존 E-PON들과 비교 및 분석하였다.

A Quantitative Approach to Minimize Energy Consumption in Cloud Data Centres using VM Consolidation Algorithm

  • M. Hema;S. KanagaSubaRaja
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권2호
    • /
    • pp.312-334
    • /
    • 2023
  • In large-scale computing, cloud computing plays an important role by sharing globally-distributed resources. The evolution of cloud has taken place in the development of data centers and numerous servers across the globe. But the cloud information centers incur huge operational costs, consume high electricity and emit tons of dioxides. It is possible for the cloud suppliers to leverage their resources and decrease the consumption of energy through various methods such as dynamic consolidation of Virtual Machines (VMs), by keeping idle nodes in sleep mode and mistreatment of live migration. But the performance may get affected in case of harsh consolidation of VMs. So, it is a desired trait to have associate degree energy-performance exchange without compromising the quality of service while at the same time reducing the power consumption. This research article details a number of novel algorithms that dynamically consolidate the VMs in cloud information centers. The primary objective of the study is to leverage the computing resources to its best and reduce the energy consumption way behind the Service Level Agreement (SLA)drawbacks relevant to CPU load, RAM capacity and information measure. The proposed VM consolidation Algorithm (PVMCA) is contained of four algorithms: over loaded host detection algorithm, VM selection algorithm, VM placement algorithm, and under loading host detection algorithm. PVMCA is dynamic because it uses dynamic thresholds instead of static thresholds values, which makes it suggestion for real, unpredictable workloads common in cloud data centers. Also, the Algorithms are adaptive because it inevitably adjusts its behavior based on the studies of historical data of host resource utilization for any application with diverse workload patterns. Finally, the proposed algorithm is online because the algorithms are achieved run time and make an action in response to each request. The proposed algorithms' efficiency was validated through different simulations of extensive nature. The output analysis depicts the projected algorithms scaled back the energy consumption up to some considerable level besides ensuring proper SLA. On the basis of the project algorithms, the energy consumption got reduced by 22% while there was an improvement observed in SLA up to 80% compared to other benchmark algorithms.