• Title/Summary/Keyword: Entropy source

Search Result 66, Processing Time 0.026 seconds

Source-Location Privacy in Wireless Sensor Networks Countermeasures and Analysis (무선 센서 네트워크에서의 소스 위치 프라이머시 : 익명성 제공 방법 및 수학적 분석)

  • Lee Song-Woo;Park Young-Hun;Son Ju-Hyung;Seo Seune-Woo;Kang Yu;Moon Ho-Kun;Lee Myuong-Soo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.778-783
    • /
    • 2006
  • 최근 센서 네트워크 분야를 비롯해 네트워크 분야에서 내용 보호, 인증뿐만 아니라 Source의 위치 프라이비시와 관련하여 많은 연구가 이루어지고 있다. 특히 센서 네트워크에서의 Source 위치는 실제 센서의 지리적 위치이기 때문에 Source의 위치를 노출하지 않는 것이 매우 중요하다. 그리고 인터넷과 Ad-Hoc 네트워크에서 익명성(Anonymity)을 제공하기 위한 기법들이 많이 제안되었지만, 이러한 기법들은 센서 네트워크에 적합하지 않기 때문에 센서 네트워크의 특성에 맞는 익명성 제공 요법이 요구되고 있다. 본 논문에서는 Source의 익명성과 관련해 센서네트워크에서 나타날 수 있는 Eavesdropper의 유형을 정의하고, 이러한 Eavesdropper의 유형에 따라 Source의 익명성을 제공할 수 있는 방법을 제안하였다. 그리고 제안한 방법이 얼마만큼의 익명성을 제공하는가를 정량화하기 위해 엔트로피(Entropy) 성질을 이용해 수학적으로 분석하였다. 그 결과, 제안하는 방법이 보다 높은 익명성을 제공하고, 센서의 전송 거리가 Source의 익명성 제공에 있어 매우 중요한 요소임을 확인하였다.

  • PDF

Part-Of-Speech Tagging using multiple sources of statistical data (이종의 통계정보를 이용한 품사 부착 기법)

  • Cho, Seh-Yeong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.501-506
    • /
    • 2008
  • Statistical POS tagging is prone to error, because of the inherent limitations of statistical data, especially single source of data. Therefore it is widely agreed that the possibility of further enhancement lies in exploiting various knowledge sources. However these data sources are bound to be inconsistent to each other. This paper shows the possibility of using maximum entropy model to Korean language POS tagging. We use as the knowledge sources n-gram data and trigger pair data. We show how perplexity measure varies when two knowledge sources are combined using maximum entropy method. The experiment used a trigram model which produced 94.9% accuracy using Hidden Markov Model, and showed increase to 95.6% when combined with trigger pair data using Maximum Entropy method. This clearly shows possibility of further enhancement when various knowledge sources are developed and combined using ME method.

An Algorithm of Score Function Generation using Convolution-FFT in Independent Component Analysis (독립성분분석에서 Convolution-FFT을 이용한 효율적인 점수함수의 생성 알고리즘)

  • Kim Woong-Myung;Lee Hyon-Soo
    • The KIPS Transactions:PartB
    • /
    • v.13B no.1 s.104
    • /
    • pp.27-34
    • /
    • 2006
  • In this study, we propose this new algorithm that generates score function in ICA(Independent Component Analysis) using entropy theory. To generate score function, estimation of probability density function about original signals are certainly necessary and density function should be differentiated. Therefore, we used kernel density estimation method in order to derive differential equation of score function by original signal. After changing formula to convolution form to increase speed of density estimation, we used FFT algorithm that can calculate convolution faster. Proposed score function generation method reduces the errors, it is density difference of recovered signals and originals signals. In the result of computer simulation, we estimate density function more similar to original signals compared with Extended Infomax and Fixed Point ICA in blind source separation problem and get improved performance at the SNR(Signal to Noise Ratio) between recovered signals and original signal.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

Condition Monitoring of an LCD Glass Transfer Robot Based on Wavelet Packet Transform and Artificial Neural Network for Abnormal Sound (LCD 라인의 음향 특성신호에 웨이브렛 변환과 인경신경망회로를 적용한 공정로봇의 건정성 감시 연구)

  • Kim, Eui-Youl;Lee, Sang-Kwon;Jang, Ji-Uk
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.7
    • /
    • pp.813-822
    • /
    • 2012
  • Abnormal operating sounds radiated from a moving transfer robot in LCD (liquid crystal display) product lines have been used for the fault detection line of a robot instead of other source signals such as vibrations, acoustic emissions, and electrical signals. Its advantage as a source signal makes it possible to monitor the status of multiple faults by using only a microphone, despite a relatively low sensitivity. The wavelet packet transform for feature extraction and the artificial neural network for fault classification are employed. It can be observed that the abnormal operating sound is sufficiently useful as a source signal for the fault diagnosis of mechanical components as well as other source signals.

An Entropy-based Dynamic Routing Protocol for Supporting Effective Route Stability in Mobile Ad-hoc Wireless Sensor Networks (모바일 Ad-hoc 무선 센서 네트워크에서 효과적인 경로 안정성을 지원하기 위한 엔트로피 기반 동적 라우팅 프로토콜)

  • An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.29-34
    • /
    • 2008
  • In this paper, we propose an entropy-based dynamic routing protocol for supporting effective route stability in mobile ad-hoc wireless sensor networks(MAWSN). The basic ideas and features are as follows. First, construction of entropy-based stable routing route using mobility of nodes between a source node and a destination node. Second, usage of location and direction information for route construction to support resource saving. Third, We consider a realistic approach, in the points of view of the MAWSN, based on mobile sensor nodes as well as fixed sensor nodes in sensor fields while the conventional research for sensor networks focus on mainly fixed sensor nodes. The performance evaluation of the proposed routing protocol is performed via simulation using OPNET. The simulation results show the proposed routing protocol can effectively support route stability and packet delivery ratio.

  • PDF

A Design and Implementation of the Light-Weight Random Number Generator Using Sensors (센서를 이용한 경량 난수발생기 설계 및 구현)

  • Kang, Hana;Yoo, Taeil;Yeom, Yongjin;Kang, Ju-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.307-315
    • /
    • 2017
  • Random number generator(RNG) is essential in cryptographic applications. As recently a system using small devices such as IoT, Sensor Network, SmartHome appears, the lightweight cryptography suitable for this system is being developed. However due to resource limitations and difficulties in collecting the entropy, RNG designed for the desktop computer are hardly applicable to lightweight environment. In this paper, we propose a lightweight RNG to produce cryptographically strong random number using sensors. Our design uses a Hankel matrix, block cipher as the structure and sensors values as noise source. Futhermore, we implement the lightweight RNG in Arduino that is one of the most popular lightweight devices and estimate the entropy values of sensors and random number to demonstrate the effectiveness and the security of our design.

Minimum Entropy Deconvolution을 이용한 지하수 상대 재충진양의 시계열 추정법

  • 김태희;이강근
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2003.09a
    • /
    • pp.574-578
    • /
    • 2003
  • There are so many methods to estimate the groundwater recharge. These methods can be categorized into four groups. First groupis related to the water balance analysis, second group is concerned with baseflow/springflow recession, and third group is interested in some types of tracers; environmental tracers and/or temperature profile. The limitation of these types of methods is that the estimated results of recharge are presented in the form of an average over some time period. Forth group has a little different approach. They use the time series data of hydraulic head and specific yield evaluated from field test, and the results of estimation are described in the sequential form. But their approach has a serious problem. The estimated results in forth typeof methods are generally underestimated because they cannot consider the discharge phase of water table fluctuation coupled with the recharge phase. Ketchum el. at. (2000) proposed calibrated method, considering recharge- and discharge-coupled water table fluctuation. But the dischargeis considered just as the areal average with discharge rate. On the other hand, there are many methods to estimate the source wavelet with observed data set in geophysics/signal processing and geophysical methods are rarely applied to the estimation of groundwater recharge. The purpose this study is the evaluation of the applicability of one of the geophysical method in the estimation of sequential recharge rate. The applied geophysical method is called minimum entropy deconvolution (MED). For this purpose, numerical modeling with linearized Boussinesq equation was applied. Using the synthesized hydraulic head through the numerical modeling, the relative sequenceof recharge is calculated inversely. Estimated results are very concordant with the applied recharge sequence. Cross-correlations between applied recharge sequence and the estimated results are above 0.985 in all study cases. Through the numerical test, the availability of MED in the estimation of the recharge sequence to groundwater was investigated

  • PDF

An Effective Feature Generation Method for Distributed Denial of Service Attack Detection using Entropy (엔트로피를 이용한 분산 서비스 거부 공격 탐지에 효과적인 특징 생성 방법 연구)

  • Kim, Tae-Hun;Seo, Ki-Taek;Lee, Young-Hoon;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.63-73
    • /
    • 2010
  • Malicious bot programs, the source of distributed denial of service attack, are widespread and the number of PCs which were infected by malicious bot program are increasing geometrically thesedays. The continuous distributed denial of service attacks are happened constantly through these bot PCs and some financial incident cases have found lately. Therefore researches to response distributed denial of service attack are necessary so we propose an effective feature generation method for distributed denial of service attack detection using entropy. In this paper, we apply our method to both the DARPA 2000 datasets and also the distributed denial of service attack datasets that we composed and generated ourself in general university. And then we evaluate how the proposed method is useful through classification using bayesian network classifier.

SPATIO-SPECTRAL MAXIMUM ENTROPY METHOD: II. SOLAR MICROWAVE IMAGING SPECTROSCOPY

  • Bong, Su-Chan;Lee, Jeong-Woo;Gary Dale E.;Yun Hong-Sik;Chae Jong-Chul
    • Journal of The Korean Astronomical Society
    • /
    • v.38 no.4
    • /
    • pp.445-462
    • /
    • 2005
  • In a companion paper, we have presented so-called Spatio-Spectral Maximum Entropy Method (SSMEM) particularly designed for Fourier-Transform imaging over a wide spectral range. The SSMEM allows simultaneous acquisition of both spectral and spatial information and we consider it most suitable for imaging spectroscopy of solar microwave emission. In this paper, we run the SSMEM for a realistic model of solar microwave radiation and a model array resembling the Owens Valley Solar Array in order to identify and resolve possible issues in the application of the SSMEM to solar microwave imaging spectroscopy. We mainly concern ourselves with issues as to how the frequency dependent noise in the data and frequency-dependent variations of source size and background flux will affect the result of imaging spectroscopy under the SSMEM. We also test the capability of the SSMEM against other conventional techniques, CLEAN and MEM.