• 제목/요약/키워드: Internet-Based Simulation

검색결과 1,608건 처리시간 0.022초

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

A Bankruptcy Game for Optimize Caching Resource Allocation in Small Cell Networks

  • Zhang, Liying;Wang, Gang;Wang, Fuxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2319-2337
    • /
    • 2019
  • In this paper, we study the distributed cooperative caching for Internet content providers in a small cell of heterogeneous network (HetNet). A general framework based on bankruptcy game model is put forth for finding the optimal caching policy. In this framework, the small cell and different content providers are modeled as bankrupt company and players, respectively. By introducing strategic decisions into the bankruptcy game, we propose a caching value assessment algorithm based on analytic hierarchy process in the framework of bankruptcy game theory to optimize the caching strategy and increase cache hit ratio. Our analysis shows that resource utilization can be improved through cooperative sharing while considering content providers' satisfaction. When the cache value is measured by multiple factors, not just popularity, the cache hit rate for user access is also increased. Simulation results show that our approach can improve the cache hit rate while ensuring the fairness of the distribution.

인터넷 구조 기반의 동적 데이터 그리드 복제 정책 (A Dynamic Data Grid Replication Strategy Based on Internet Architecture)

  • 김준상;이원주;전창호
    • 전자공학회논문지CI
    • /
    • 제45권3호
    • /
    • pp.1-6
    • /
    • 2008
  • 데이터 그리드는 지리적으로 분산된 대용량의 데이터 자원을 광대역 통신망을 통해 공유한다. 이러한 그리드 환경은 물리적 네트워크인 인터넷 상에서 구현되기 때문에 대용량의 데이터를 전송하는데 많은 시간이 소요된다. 이러한 문제를 극복하기 위해서 여러 가지 복제 정책들이 제안되었는데, 기존의 데이터 그리드 복제 정책은 실제 인터넷의 구조를 고려하지 않고 논리적인 토폴로지를 바탕으로 제안되었기 때문에 실제 구축된 데이터 그리드에서 최적의 성능을 기대할 수 없다. 그리드에서 데이터 접근시간은 물리적 네트워크인 인터넷의 구조에 의해 가장 큰 영향을 받기 때문이다. 본 논문에서는 인터넷 구조 기반의 새로운 데이터 그리드 복제 정책으로 RSIA(Replication Strategy based on Internet Architecture) 복제 정책을 제안한다. 이 정책은 인터넷의 각 요소들 사이에 존재하는 구조적인 계층성을 고려하여 데이터 복사본을 배치하고, 데이터 전송 시 대역폭의 병목 구간을 피함으로써 시스템의 성능 저하를 줄인다. 본 논문에서는 시뮬레이션을 통하여 제안하는 RSIA가 기존의 복제 정책에 비해 데이터 그리드의 성능 향상 면에서 우수함을 보인다.

Defending HTTP Web Servers against DDoS Attacks through Busy Period-based Attack Flow Detection

  • Nam, Seung Yeob;Djuraev, Sirojiddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권7호
    • /
    • pp.2512-2531
    • /
    • 2014
  • We propose a new Distributed Denial of Service (DDoS) defense mechanism that protects http web servers from application-level DDoS attacks based on the two methodologies: whitelist-based admission control and busy period-based attack flow detection. The attack flow detection mechanism detects attach flows based on the symptom or stress at the server, since it is getting more difficult to identify bad flows only based on the incoming traffic patterns. The stress is measured by the time interval during which a given client makes the server busy, referred to as a client-induced server busy period (CSBP). We also need to protect the servers from a sudden surge of attack flows even before the malicious flows are identified by the attack flow detection mechanism. Thus, we use whitelist-based admission control mechanism additionally to control the load on the servers. We evaluate the performance of the proposed scheme via simulation and experiment. The simulation results show that our defense system can mitigate DDoS attacks effectively even under a large number of attack flows, on the order of thousands, and the experiment results show that our defense system deployed on a linux machine is sufficiently lightweight to handle packets arriving at a rate close to the link rate.

Secure Transmission for Interactive Three-Dimensional Visualization System

  • Yun, H.Y.;Yoo, Sun Kook
    • Journal of International Society for Simulation Surgery
    • /
    • 제4권1호
    • /
    • pp.17-20
    • /
    • 2017
  • Purpose Interactive 3D visualization system through remote data transmission over heterogeneous network is growing due to the improvement of internet based real time streaming technology. Materials and Methods The current internet's IP layer has several weaknesses against IP spoofing or IP sniffing type of network attacks since it was developed for reliable packet exchange. In order to compensate the security issues with normal IP layer, we designed a remote medical visualization system, based on Virtual Private Network. Results Particularly in hospital, if there are many surgeons that need to receive the streaming information, too much load on the gateway can results in deficit of processing power and cause the delay. Conclusion End to end security through the network method would be required.

인터넷 환경을 통한 생물학적 모델의 정량적 분석 (Quantitative Analysis of Biological Models under the Internet Environment)

  • 윤좌문;이동엽;조아연;이상엽;박선원
    • 제어로봇시스템학회논문지
    • /
    • 제11권10호
    • /
    • pp.837-842
    • /
    • 2005
  • The computational modeling and simulation of complex biological systems are indispensable for new knowledge extraction from huge experimental data and ever growing vast amount of information in systems biology. Moreover, gathering and sharing of the existing information and newly-generated knowledge can speed up this research process. In this regard, several modeling projects have been undertaken for quantitatively analyzing the biological systems via the internet. They include Virtual Cell, JWS and OBIYagns. We also develop an integrated web-based environment, which facilitate investigation of dynamic behavior of cellular systems.

Scaled-Energy Based Spectrum Sensing for Multiple Antennas Cognitive Radio

  • Azage, Michael Dejene;Lee, Chaewoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5382-5403
    • /
    • 2018
  • In this paper, for a spectrum sensing purpose, we heuristically established a test statistic (TS) from a sample covariance matrix (SCM) for multiple antennas based cognitive radio. The TS is formulated as a scaled-energy which is calculated as a sum of scaled diagonal entries of a SCM; each of the diagonal entries of a SCM scaled by corresponding row's Euclidean norm. On the top of that, by combining theoretical results together with simulation observations, we have approximated a decision threshold of the TS which does not need prior knowledge of noise power and primary user signal. Furthermore, simulation results - which are obtained in a fading environment and in a spatially correlating channel model - show that the proposed method stands effect of noise power mismatch (non-uniform noise power) and has significant performance improvement compared with state-of-the-art test statistics.

Enhanced Second-order Implicit Constraint Enforcement for Dynamic Simulations

  • Hong, Min;Welch, Samuel W.J.;Jung, Sun-Hwa;Choi, Min-Hyung;Park, Doo-Soon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권1호
    • /
    • pp.51-62
    • /
    • 2008
  • This paper proposes a second-order implicit constraint enforcement method which yields enhanced controllability compared to a first-order implicit constraints enforcement method. Although the proposed method requires solving a linear system twice, it yields superior accuracy from the constraints error perspective and guarantees the precise and natural movement of objects, in contrast to the first-order method. Thus, the proposed method is the most suitable for exact prediction simulations. This paper describes the numerical formulation of second-order implicit constraints enforcement. To prove its superiority, the proposed method is compared with the firstorder method using a simple two-link simulation. In this paper, there is a reasonable discussion about the comparison of constraints error and the analysis of dynamic behavior using kinetic energy and potential energy.

Improved Resource Allocation Scheme in LTE Femtocell Systems based on Fractional Frequency Reuse

  • Lee, Insun;Hwang, Jaeho;Jang, Sungjeen;Kim, Jaemoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2153-2169
    • /
    • 2012
  • Femtocells provide high quality indoor communications with low transmit power. However, when femtocells are applied in cellular systems, a co-channel interference problem between macrocells and femtocells occurs because femtocells use the same spectrum as do the macrocells. To solve the co-channel interference problem, a previous study suggested a resource allocation scheme in LTE cellular systems using FFR. However, this conventional resource allocation scheme still has interference problems between macrocells and femtocells near the boundary of the sub-areas. In this paper, we define an optimization problem for resource allocation to femtocells and propose a femtocell resource allocation scheme to solve the optimization problem and the interference problems of the conventional scheme. The evaluation of the proposed scheme is conducted by System Level Simulation while varying the simulation environments. The simulation results show that the proposed scheme is superior to the conventional scheme and that it improves the overall performance of cellular systems.

Realistic Visual Simulation of Water Effects in Response to Human Motion using a Depth Camera

  • Kim, Jong-Hyun;Lee, Jung;Kim, Chang-Hun;Kim, Sun-Jeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.1019-1031
    • /
    • 2017
  • In this study, we propose a new method for simulating water responding to human motion. Motion data obtained from motion-capture devices are represented as a jointed skeleton, which interacts with the velocity field in the water simulation. To integrate the motion data into the water simulation space, it is necessary to establish a mapping relationship between two fields with different properties. However, there can be severe numerical instability if the mapping breaks down, with the realism of the human-water interaction being adversely affected. To address this problem, our method extends the joint velocity mapped to each grid point to neighboring nodes. We refine these extended velocities to enable increased robustness in the water solver. Our experimental results demonstrate that water animation can be made to respond to human motions such as walking and jumping.