• Title/Summary/Keyword: Multi-network

Search Result 4,630, Processing Time 0.034 seconds

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.

A Study on Point Traffic Sensors' Placement for Detecting the Dilemma Zone Problem (딜레마 구간 검지를 위한 지점교통센서 배치에 관한 연구)

  • Jang, Jeong-Ah;Choi, Kee-Choo;Lee, Sang-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.26-37
    • /
    • 2009
  • This paper suggests a sensor's placement method for detecting the dilemma zone problem when real-time driver's safety service is provided at signalized intersections by multiple pointed traffic sensors using USN environments. For detecting the dangerous situations from vehicles accelerating through yellow intervals, red-light running and stopping abruptly like as dilemma zone problem, VISSIM(microscopic, behavior-based multi-purpose traffic simulation program) is used to perform a real-time multiple detection situation by changing the input data like as various inflow-volume, design speed change, driver perception and response time. As a result, the optimal interval of traffic sensors is 20~27m, and the initialized sensor location from stop-line is different according to road design speed. Moreover, the pattern of detection about dilemma zone is also different according to inflow-volumes. This paper shows that the method is useful to evaluate the sensor's placement problem based on micro-simulation and the results can be used as the basic research for USN services.

  • PDF

Low-noise Design Method of Small-size Underwater Acoustic System and Module (초소형 수중 음향 시스템 모듈의 저잡음 설계 방법)

  • Lee, Dong-Ho;Shin, Young-San;Song, Jin-Ho;Wee, Jae-Kyung;Lee, Jeong-Min;Seol, Jae-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.31 no.5
    • /
    • pp.309-316
    • /
    • 2012
  • This paper suggest configuration method of small-size system and design method of module using multi power. In particular module designed to focus on PDN(Power Distribution Network) and filter configuration method to improve the characteristics of noise sensitive analog IC. For the prevention of high-voltage noise, manufactured module is used the ground-isolated technique and via stitching, and is connected grounds with a series of filters. In this paper, so we analyzed PDN structure through the simulation using lumped modeling and confirmed through measurement. Simulation results, when connecting 4.7uH inductor, we made certain that noise of -7dB decreases much more than when it did not. And it was confirmed 12% less than Background Noise.

Research Regard to Necessity of Smart Water Management Based on IoT Technology (IoT 기술을 활용한 스마트 물관리 필요성에 관한 연구)

  • Choi, Young Hwan;Kim, Yeong Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.11-18
    • /
    • 2017
  • The Objective of this Study is to Prove the Effectiveness of a Smart Water Management(SWM) Technology. The SWM Technology can Reduce the Production Cost using Internet of Thing(IoT) Technology that Utilizes Remote Metering of Consumer's Water usage and Reduce the Leakage of Supply Facilities. The SWM Demonstration Model Installed a Remote Water Leakage Sensor, Smart Metering and Micro Multi Sensor in Water Supply Facility, and Provided Real-Time Monitoring of the Operation Status. Consumers can be Provided the usage of Tap Water and the Water Puality through a Smart Phone Application. At this Time, we Surveyed Whether Consumers save the Tap Water or Drinking Directly using the Tap Water usage Information. Also, this Study is to Verify the Degree of Improvement of Water Supply Rates and Drinking Water Rate, and to Decrease Consumer's Complaints, Operating Costs, and Water Consumption by the SWM Technology. It is also Established a SWM Model Combined with the IoT Sensor at Supply Facilities, operator monitoring system and explored recovery solution detected events. It means the upbringing of the domestic water industry by developing the related technologies and spreading the SWM to advanced levels.

Design and Implementation of Path Computation Element Protocol (PCEP) - FSM and Interfaces (Path Computation Element 프로토콜 (PCEP)의 설계 및 구현 - FSM과 인터페이스)

  • Lee, Wonhyuk;Kang, Seungae;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.19-25
    • /
    • 2013
  • The increasing demand for fast, flexible and guaranteed Quality of Service (QoS) in core networks has caused to deploy MultiProtocol Label Switching (MPLS) and Generalized MPLS (GMPLS) control plane. In GMPLS control plane, path computation and cooperation processes are one of the crucial element to maintain an acceptable level of service. The Internet Engineering Task Force (IETF) has proposed the Path Computation Element (PCE) architecture. The PCE is a dedicated network element devoted to path computation process and communications between Path Computation Clients (PCC) and PCEs is realized through the PCE Protocol (PCEP). This paper examines the PCE-based path computation architecture to include the design and implementation of PCEP. The functional modules including Finite State Machine (FSM) and related key design issues of each state are presented. In particular we also discuss internal/external protocol interfaces that efficiently control the communication channels.

Frequency-Code Domain Contention in Multi-antenna Multicarrier Wireless Networks

  • Lv, Shaohe;Zhang, Yiwei;Li, Wen;Lu, Yong;Dong, Xuan;Wang, Xiaodong;Zhou, Xingming
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.218-226
    • /
    • 2016
  • Coordination among users is an inevitable but time-consuming operation in wireless networks. It severely limit the system performance when the data rate is high. We present FC-MAC, a novel MAC protocol that can complete a contention within one contention slot over a joint frequency-code domain. When a node takes part in the contention, it generates randomly a contention vector (CV), which is a binary sequence of length equal to the number of available orthogonal frequency division multiplexing (OFDM) subcarriers. In FC-MAC, different user is assigned with a distinct signature (i.e., PN sequence). A node sends the signature at specific subcarriers and uses the sequence of the ON/OFF states of all subcarriers to indicate the chosen CV. Meanwhile, every node uses the redundant antennas to detect the CVs of other nodes. The node with the minimum CV becomes the winner. The experimental results show that, the collision probability of FC-MAC is as low as 0.05% when the network has 100 nodes. In comparison with IEEE 802.11, contention time is reduced by 50-80% and the throughput gain is up to 200%.

Improved Positioning Algorithm for Wireless Sensor Network affected by Holes (홀 영향을 받는 무선 센서 네트워크에서 향상된 위치 추정 기법)

  • Jin, Seung-Hwan;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10A
    • /
    • pp.784-795
    • /
    • 2009
  • An accurate positioning estimation in the wireless sensor networks (WSN) is very important in which each sensor node is aware of neighbor conditions. The multi-hop positioning estimation technique is considered as one of the suitable techniques for the WSN with many low power devices. However geographical holes, where there is no sensor node, may severely decrease the positioning accuracy so that the positioning error can be beyond the tolerable range. Therefore in this paper, we analyze error factors of DV-hop and hole effect to obtain node's accurate position. The proposed methods include boundary node detection, distance level adjustment, and unreliable anchor elimination. The simulation results show that the proposed method can achieve higher positioning accuracy using the hole detection and enhanced distance calculation methods compared with the conventional DV-hop.

Design and Fabrication of Dual Band Antenna using Skeleton Slot Radiator (Skeleton Slot 구조를 이용한 이중 대역 안테나의 설계 및 제작)

  • 김운필;이범선
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.1
    • /
    • pp.40-46
    • /
    • 2002
  • In this paper we design and fabricate the Skeleton slot antenna which operates dually in GSM 900 and 1800 bands. Its simulation results are also compared with the measured ones. The original Skeleton slot antennas had the problems of unsatisfactory VSWR characteristics and considerably changing horizontal radiation patterns at high frequencies, but the proposed design improves these problems using multi-path feeding network and folding structure. The size of the radiator is 154 $\times$ 106(mm), and its height is 33(mm), and the reflector of 190$\times$190(mm) is used. The material of the radiator and reflector is 1mm-thick aluminum. Using NTC process reduces the mass production cost significantly. The measured return losses are 13.7 % at 900 MHz band and 16.4 % at 1800 MHz band, respectively. The horizontal radiation beam width is stable within $\pm$ 1$^{\circ}$ at both frequency bands.

Analysis of Channel Capacity with Respect to Antenna Separation of an MIMO System in an Indoor Channel Environment (실내 채널 환경에서 MIMO 시스템의 안테나 이격거리에 따른 채널 용량 분석)

  • Kim, Sang-Keun;Oh, Yi-Sok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.11 s.114
    • /
    • pp.1058-1064
    • /
    • 2006
  • In this paper, the channel capacity of a specified wireless indoor multiple-input multiple-output(MIMO) channel is estimated by analyzing spatial characteristics of this channel using the three-dimensional ray tracing method, and a technique for deriving an optimized separation of multi-antenna elements is proposed. At first, the ray paths, the path losses, and the time-delay profile are computed using the three-dimensional ray tracing method in an indoor corridor environment, which has the line of sight(LOS) and non-line of sight(NLOS) regions. The ray tracing method is verified by a comparison between the computation results and the measurements which are obtained with dipole antennas, an amplifier and a network analyzer. Then, an MIMO system is positioned in the indoor channel environment and the ray paths and path losses are computed for four antenna-position combinations and various values of the antenna separation to obtain the channel capacity for the MIMO system. An optimum antenna-separation is derived by averaging the channel capacities of 100 receiver positions with four different antenna combinations.