• 제목/요약/키워드: Information Network

Search Result 31,064, Processing Time 0.06 seconds

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

A Design of Network Topology Discovery System based on Traffic In-out Count Analysis (네트워크 트래픽 입출량 분석을 통한 네트워크 토폴로지 탐색 시스템 설계)

  • Park, Ji-Tae;Baek, Ui-Jun;Shin, Mu-Gon;Lee, Min-Seong;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • With the rapid development of science and technology in recent years, the network environment are growing, and a huge amount of traffic is generated. In particular, the development of 5G networks and edge computing will accelerate this phenomenon. However, according to these trends, network malicious behaviors and traffic overloads are also frequently occurring. To solve these problems, network administrators need to build a network management system to implement a high-speed network and should know exactly about the connection topology of network devices through the network management system. However, the existing network topology discovery method is inefficient because it is passively managed by an administrator and it is a time consuming task. Therefore, we proposes a method of network topology discovery according to the amount of in and out network traffic. The proposed method is applied to a real network to verify the validity of this paper.

A Study on the Relationship between Network Structure of Corporate Communication and Corporate Reputation: Communication Network Analysis (기업 커뮤니케이션의 네트워크 구조와 기업명성간 관련성: 커뮤니케이션 네트워크 분석)

  • Cha, Hee-Won
    • Korean journal of communication and information
    • /
    • v.60
    • /
    • pp.75-103
    • /
    • 2012
  • The purpose of this study is to explore the meaning and the effect of communication as social capital, which needs to be evaluated empirically focusing on corporate reputation. Also, it tried to analyze consumers' communication network in the structural, substantial, and relational level, which is to verify how characteristics and meanings of communication network structure affect to a good corporate reputation. A survey toward 200 participants was conducted during 5 days from March 29 to April 3, 2012. Characteristics of communication network structure of a corporation with higher reputation is analyzed using the index such as degree, degree centrality, and density. The findings of the study show that a corporation with higher reputation has higher network degree, degree centrality, and density compared to a corporation with lower reputation. Consumers of a corporation with higher reputation get information from various overlapping sources. It allows them to share similar interpretation, which could elevate the degree, degree centrality, and density of network. It also proved that when the network density is high, a corporation with higher reputation can distribute information much faster and easier. Moreover, in the substantial level of social capital, product/service information network has high degree and density rather than corporate issue information network. Likewise, degree and density of information acquisition network was higher than those of information provision network. Also, this study verified the effect and relationship between the network structure characteristics and corporate loyalty in a relational level. In this way, the positive effect of the degree centrality on corporate loyalty was supported. In conclusion, as consumers share more information from overlapping sources, the degree of communication network gets higher. Throughout this network, the diffusion of information among consumers would be activated, and this confirmed that corporate reputation and corporate loyalty is closely related.

  • PDF

Modulation Recognition of MIMO Systems Based on Dimensional Interactive Lightweight Network

  • Aer, Sileng;Zhang, Xiaolin;Wang, Zhenduo;Wang, Kailin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3458-3478
    • /
    • 2022
  • Automatic modulation recognition is the core algorithm in the field of modulation classification in communication systems. Our investigations show that deep learning (DL) based modulation recognition techniques have achieved effective progress for multiple-input multiple-output (MIMO) systems. However, network complexity is always an additional burden for high-accuracy classifications, which makes it impractical. Therefore, in this paper, we propose a low-complexity dimensional interactive lightweight network (DilNet) for MIMO systems. Specifically, the signals received by different antennas are cooperatively input into the network, and the network calculation amount is reduced through the depth-wise separable convolution. A two-dimensional interactive attention (TDIA) module is designed to extract interactive information of different dimensions, and improve the effectiveness of the cooperation features. In addition, the TDIA module ensures low complexity through compressing the convolution dimension, and the computational burden after inserting TDIA is also acceptable. Finally, the network is trained with a penalized statistical entropy loss function. Simulation results show that compared to existing modulation recognition methods, the proposed DilNet dramatically reduces the model complexity. The dimensional interactive lightweight network trained by penalized statistical entropy also performs better for recognition accuracy in MIMO systems.

The method of grouping query based on EPCIS to improve the RFID application performance in EPC Network (EPC Network 기반 RFID 응용 시스템의 성능 향상을 위한 EPCIS 주소별 그룹 질의 기법)

  • Park, Sung-Jin;Kim, Dae-Hwan;Son, Min-Young;Yeom, Keun-Hyuk
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.111-122
    • /
    • 2011
  • These days RFID application has been developed rapidly. It has been applied to many business areas such as logistics and supply chains. The Electronic Product Code (EPC) Network Architecture, an open global standard, is proposed by EPCglobal for developing RFID enabled systems. People who want to obtain the product information which are master information and event information have to apply with EPC Network Architecture. However, EPCIS which has master information and event information has to be accessed base on each EPC. Therefore, there is lots of duplicate accessing to EPCIS because RFID application has to access the same EPCIS over again which makes all performance down in EPC Network. This paper proposes how to reduce access times to EPCIS using EPC grouping based on EPCIS address. We build EPC Network environment to experiment about performance of RFID application system and we prove the improvement of EPC Network. Our result shows the reducing the EPCIS communication time by maximum 99 percentages.

Theoretical Perspective of Social Network Analysis (네트웍 연구의 사회적 접근과 분석이론)

  • Yoo Sarah
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.20
    • /
    • pp.297-330
    • /
    • 1991
  • The work presents the theoretical background and methodology to network analysis. This approach to information network has been widespread use in many researches of social science. Theoretically based idea of structural analysis of information flow were reviewed and the major perspective and the practical aspects of the analysis were discussed. To show an approach of the methodology to library environment, HISP project which analyzed the network structure of a health information dissemination to a health community was demonstrated.

  • PDF

The Study On the Effectiveness of Information Retrieval in the Vector Space Model and the Neural Network Inductive Learning Model

  • Kim, Seong-Hee
    • The Journal of Information Technology and Database
    • /
    • v.3 no.2
    • /
    • pp.75-96
    • /
    • 1996
  • This study is intended to compare the effectiveness of the neural network inductive learning model with a vector space model in information retrieval. As a result, searches responding to incomplete queries in the neural network inductive learning model produced a higher precision and recall as compared with searches responding to complete queries in the vector space model. The results show that the hybrid methodology of integrating an inductive learning technique with the neural network model can help solve information retrieval problems that are the results of inconsistent indexing and incomplete queries--problems that have plagued information retrieval effectiveness.

  • PDF

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

The Police Responsibility about Illegal Information on the Information Communication Network (정보통신망상의 불법정보에 대한 경찰책임)

  • Gu, Hyung-Keun;Joung, Soon-Hyoung
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.87-94
    • /
    • 2013
  • The existing legal regulations that indiscriminately distributed various illegal information on the information network are discussing focused on civil liability and criminal liability. however, at this paper that approached with problem of police responsibility as a target of the exert of police authority for blocking illegal information on the information network. based on this recognition, this paper propose the problem and reformation about the present Information Communication Networks law's 7 of Article 44, Section 2 that for prompt blocking illegal information on the information network, not about direct regulatory approach to a person in charge of act but about the information network service provider which is a person in charge of condition.

Network Analysis on Communication of Welfare Policy Using Twitter Data

  • Seo, Bojun;Lee, Soochang
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.58-64
    • /
    • 2018
  • This main purpose of the study is to identify social network of communicators sharing information on Bokjiro for publicizing welfare policy. This study employs NodeXL pro to understand networks and their role in the social network. The data for social network analysis was collected from Twitter for a week. The result of the analysis shows that the social network of communicators on Bokjiro does not have many nodes. It also has an independent network with high possibility of information distortion. Little communicators have controlling power in information flow in one way of communication. According to the result, it is not effective for marketing strategy of welfare policy in providing online information through Bokjiro. The study suggests that the government should use the transactional approach to marketing based on agent-oriented activity focusing on the exchange relationship between information providers and demanders in an age of networked intelligence.