• 제목/요약/키워드: Hierarchical Network

검색결과 975건 처리시간 0.027초

MANET에서 트래픽 집중현상을 회피하는 경로설정에 관한 연구 (A study of set route path avoiding traffic concentration in Mobile Ad hoc Network)

  • 오동근;오영준;이강환
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.781-783
    • /
    • 2014
  • 유동성을 가진 노드들로 구성된 모바일 애드 혹 네트워크(Mobile Ad hoc Network)는 토폴로지의 변화에 따른 오버헤드를 발생한다. 오버헤드를 줄이기 위해, 클러스터를 형성하여 클러스터 헤드노드를 통해 통신하는 계층적 네트워크연구가 진행되어 왔다. 클러스터 헤드노드가 트래픽의 집중에 의해 트래픽이 증가하면, 클러스터 멤버노드는 목적지 노드에게 메시지를 전달하지 못하는 상황이 발생한다. 이를 해결하기 위해 본 논문에서는 Step Parent 알고리즘을 제안한다. 본 논문에서 제안하는 알고리즘은 클러스터 멤버노드는 통신 반경 안에 있는 클러스터 헤드노드들의 경로를 통해, 클러스터 멤버노드가 속한 클러스터 헤드노드의 트래픽을 파악한다. 클러스터 헤드노드가 트래픽이 집중되어 있을 경우, 클러스터 멤버노드는 타 클러스터 헤드노드의 경로 정보를 이용하여, 새로운 라우팅 경로를 생성하고 메시지를 전달함으로써, 네트워크 전달성이 증가한다.

  • PDF

SES/MB 프레임워크를 이용한 네트워크 보안 모델링 및 시뮬레이션 (Network Security Modeling and Simulation Using the SES/MB Framework)

  • 지승도;박종서;이장세;김환국;정기찬;정정례
    • 정보보호학회논문지
    • /
    • 제11권2호
    • /
    • pp.13-26
    • /
    • 2001
  • 본 논문은 계층 구조적이고 모듈화 된 모델링 및 시뮬레이션 프레임워크를 이용한 네트워크 보안 모델링과 시뮬레이션 기법의 연구를 주목적으로 한다. 최근, Howard와 Amroso는 사이버 공격, 방어 및 결과에 대한 원인-결과 모델을 개발하였다. 또한, Cohen은 원인-결과 모델을 이용하여 단순한 네트워크 보안 시뮬레이션 방법론을 제안한 바 있으나, 복잡한 네트워크 보안과 모델과 모델 기반의 사이버 공격에 대한 시뮬레이션은 불가능한 실정이다. 따라서, 본 논문에서 는 인공지능의 기호적 형식론과 시뮬레이션의 동역학적 형식론을 체계적이고 통합한 System Entity Structure/Model Base(SES/MB)을 통하여 계층 구조적이고 모듈화 된 네트워크 보안 모델링 및 시뮬레이션 방법론을 제안하고 사이버 공격 시나리오를 이용한 사례연구를 통하여 타당성을 검증하였다.

계층적 온톨로지 기반의 SOA서비스 식별 모델 (A SOA Service Identification Model Based on Hierarchical Ontology)

  • 박세권;최고봉
    • 한국IT서비스학회지
    • /
    • 제12권1호
    • /
    • pp.323-340
    • /
    • 2013
  • As the importance of collaboration becomes critical in today's open and complex business environment network, the issues and solutions on compatibility and reusability between different kinds of applications are being increasingly important as well in systems analysis and design. And therefore, service-centered SOA is receiving attention in such business environment as a strategic approach that makes possible for prompt action according to the needs of users and business process. Various implementation methodologies have been proposed for SOA, however, in practical aspects most of them have some problems since they fail to propose specific policies in definition and identification of services for the exact user requirements and business situations. To solve or alleviate those problems, this paper suggests a new service identification model based on hierarchical ontology, where three different ontologies such as business ontology, context ontology and service ontology are proposed to define the relationship and design the link between user requirements, business process, applications and services. Through a suggested methodology in this paper, it would be possible to provide proactive services that meets a variety of business environments and demands of user. Also, since the information can be modified adaptively and dynamically by hierarchical ontology, this study is expected to play a positive role in increasing the flexibility of systems and business environments.

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.

Misclassified Samples based Hierarchical Cascaded Classifier for Video Face Recognition

  • Fan, Zheyi;Weng, Shuqin;Zeng, Yajun;Jiang, Jiao;Pang, Fengqian;Liu, Zhiwen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.785-804
    • /
    • 2017
  • Due to various factors such as postures, facial expressions and illuminations, face recognition by videos often suffer from poor recognition accuracy and generalization ability, since the within-class scatter might even be higher than the between-class one. Herein we address this problem by proposing a hierarchical cascaded classifier for video face recognition, which is a multi-layer algorithm and accounts for the misclassified samples plus their similar samples. Specifically, it can be decomposed into single classifier construction and multi-layer classifier design stages. In single classifier construction stage, classifier is created by clustering and the number of classes is computed by analyzing distance tree. In multi-layer classifier design stage, the next layer is created for the misclassified samples and similar ones, then cascaded to a hierarchical classifier. The experiments on the database collected by ourselves show that the recognition accuracy of the proposed classifier outperforms the compared recognition algorithms, such as neural network and sparse representation.

Hierarchical Location Caching Scheme for Mobile Object Tracking in the Internet of Things

  • Han, Youn-Hee;Lim, Hyun-Kyo;Gil, Joon-Min
    • Journal of Information Processing Systems
    • /
    • 제13권5호
    • /
    • pp.1410-1429
    • /
    • 2017
  • Mobility arises naturally in the Internet of Things networks, since the location of mobile objects, e.g., mobile agents, mobile software, mobile things, or users with wireless hardware, changes as they move. Tracking their current location is essential to mobile computing. To overcome the scalability problem, hierarchical architectures of location databases have been proposed. When location updates and lookups for mobile objects are localized, these architectures become effective. However, the network signaling costs and the execution number of database operations increase particularly when the scale of the architectures and the numbers of databases becomes large to accommodate a great number of objects. This disadvantage can be alleviated by a location caching scheme which exploits the spatial and temporal locality in location lookup. In this paper, we propose a hierarchical location caching scheme, which acclimates the existing location caching scheme to a hierarchical architecture of location databases. The performance analysis indicates that the adjustment of such thresholds has an impact on cost reduction in the proposed scheme.

MANET에서 클러스터링 노드의 효율적인 수명 관리 기법 (An efficient Clustering Node Life Time management Technique in MANET algorithm)

  • 이종승;김영삼;;이강환
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 춘계학술대회
    • /
    • pp.746-748
    • /
    • 2011
  • MANET(Mobile Ad-hoc Network) is a self-configuration network or wireless multi-hop network based on inference topology. The proposed ATICC(Adaptive Time Interval Clustering Control) algorithm for hierarchical cluster based MANET. The proposed ATICC algorithm is time interval control technique for node management considering the attribute of node and network traffic. ATICC could be made low the network traffic. Also it could be improving the network life time by using timing control method.

  • PDF

전력계통 사고구간 판정을 위한 Commectionist Expert System (A Connectionist Expert System for Fault Diagnosis of Power System)

  • 김광호;박종근
    • 대한전기학회논문지
    • /
    • 제41권4호
    • /
    • pp.331-338
    • /
    • 1992
  • The application of Connectionist expert system using neural network to fault diagnosis of power system is presented and compared with rule-based expert system. Also, the merits of Connectionist model using neural network is presented. In this paper, the neural network for fault diagnosis is hierarchically composed by 3 neural network classes. The whole power system is divided into subsystems, the neural networks (Class II) which take charge of each subsystem and the neural network (Class III) which connects subsystems are composed. Every section of power system is classified into one of the typical sections which can be applied with same diagnosis rules, as line-section, bus-section, transformer-section. For each typical section, only one neural network (Class I) is composed. As the proposed model has hierarchical structure, the great reduction of learning structure is achieved. With parallel distributed processing, we show the possibility of on-line fault diagnosis.

  • PDF

OPTIMAL DESIGN MODEL FOR A DISTRIBUTED HIERARCHICAL NETWORK WITH FIXED-CHARGED FACILITIES

  • Yoon, Moon-Gil;Baek, Young-Ho;Tcha, Dong-Wan
    • Management Science and Financial Engineering
    • /
    • 제6권2호
    • /
    • pp.29-45
    • /
    • 2000
  • We consider the design of a two-level telecommunication network having logical full-mesh/star topology, with the implementation of conduit systems taken together. The design problem is then viewed as consisting of three subproblems: locating hub facilities, placing a conduit network, and installing cables therein to configure the logical full-mesh/star network. Without partitioning into subproblems as done in the conventional approach, the whole problem is directly dealt with in a single integrated framework, inspired by some recent successes with the approach. We successfully formulate the problem as a variant of the classical multicommodity flow model for the fixed charge network design problem, aided by network augmentation, judicious commodity definition, and some flow restrictions. With our optimal model, we solve some randomly generated sample problems by using CPLEX MIP program. From the computational experiments, it seems that our model can be applied to the practical problem effectively.

  • PDF

MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구 (A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.