• Title/Summary/Keyword: Network Mobility

Search Result 1,484, Processing Time 0.028 seconds

A Security method and Performance evaluation of preventing DoS attack against DAD in MANET (MANET 환경에서 중복 주소 탐지에 대한 DoS 공격을 방지하는 보안 기법과 성능 평가)

  • Lim, Jeong-Mi;Park, Chang-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1099-1108
    • /
    • 2009
  • The study of IP address allocation in MANET can be categories into Stateful and Stateless. The one, special node monitors other nodes' IP address and allocates IF address. And the other, node generates IP address by itself. Nodes in MANET have mobility and restricted resource, so Stateless is more suitable than Stateful. But, in Stateless, node requires DAD process because of unique IP address allocation. And Dos attack can be happened in DAD precess. In this paper, we propose a security method on preventing DoS attack against DAD in MANET using one-way hash function. Since, Computation of one-way hash function is suitable for nodes' restricted resource character in MANET. And we evaluate performance using NS2 and compare with other security method which is CGA using signature.

  • PDF

Performance Improvement of the Macro Handover using the Address Insurance Policy in HMIPv6 (HMIPv6에서 주소보장 정책을 이용한 매크로 핸드오버의 성능 향상)

  • Ahn, Chi-Hyun;Woo, Jong-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1764-1770
    • /
    • 2007
  • The binding update of MIPv6 which basically makes a route optimization lets MN bring about high signaling traffic, packet loss and delay. HMIPv6, which introduces the MAP protocol, makes the signaling traffic low, thereby reducing the packet losses and delay. However, it still has the same problem in MIPv6 in the case of macro mobility. This paper proposes HMIPv6 with the address insurance policy. It makes MAP prepare LCoA and RCoA before the macro handover happens. When it happens, MN is able to use them after the registration is done in the foreign network. The perormance can be improved because MAP is composed to assure the address in advance. In addition the MAP sends the BU message during the handover, thereby making the proposed scheme better. The simulation shows that the proposed scheme is about 33% shorter than HMIPv6 in the handover delay and about 22% less than FMIPv6 in the packet loss.

Microstructure and Mechanical Property of TiFe Compounds with Zr or Ce Prepared at Different Solidification Rates (TiFe금속간 화합물의 Zr과 Ce첨가와 냉각속도에 따른 응고 조직 변화 및 기계적 특성)

  • No, Hye-In;Choi, Chang-Wan;Yi, Seonghoon
    • Journal of Korea Foundry Society
    • /
    • v.39 no.2
    • /
    • pp.21-25
    • /
    • 2019
  • Microstructural and corresponding hardness changes of TiFe compounds with Zr (0~6 at%) or Ce (0~3 at%) were studied using samples prepared at different solidification rates. In arc-melted (TiFe)-Zr samples, the $Fe_{23}$ $Zr_6$ and $(Ti,\;Zr)_2Fe$ phases formed in the TiFe matrix, while in the (TiFe)-Ce sample, the $CeO_2$ phase formed along the grain boundary of the TiFe matrix. As the Zr content was increased, the volume fractions of the $Fe_{23}$ $Zr_6$ and $(Ti,\;Zr)_2Fe$ phases increased, forming a network structure. Accordingly, the hardness values of the samples also increased. With a small addition of Ce of approximately 0.1 at%, the as-cast microstructure could be effectively refined, reducing the average grain boundary diameter from ${\sim}100{\mu}m$ to ${\sim}14{\mu}m$. In the rapidly solidified sample prepared through a melt-spinning method, the constituent phases were identical to those of the arc-melted samples while the grains were refined. The microstructural changes of TiFe alloys can affect the hydrogen storage ability as well as the mobility of the hydrogen atoms in the alloys.

Analysis of Forwarding Schemes to Mitigate Data Broadcast Storm in Connected Vehicles over VNDN

  • Hur, Daewon;Lim, Huhnkuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.69-75
    • /
    • 2021
  • Limitation of the TCP/IP network technology included in the vehicle communication is due to the frequent mobility of the vehicle, the increase in intermittent connection requirements, and the constant presence of the possibility of vehicle hacking. VNDN technology enables the transfer of the name you are looking for using textual information without the need for vehicle identifiers like IP/ID. In addition, intermittent connectivity communication is possible rather than end-to-end connection communication. The data itself is the subject of communication based on name-based forwarding using two types of packets: Interest packet and Data packet. One of the issues to be solved for the realization of infotainment services under the VNDN environment is the traffic explosion caused by data broadcasting. In this paper, we analyze and compare the existing technologies to reduce the data broadcast storm. Through this, we derive and analyze the requirements for presenting the best data mitigation technique for solving the data explosion phenomenon in the VNDN environment. We expect this paper can be utilized as prior knowledge in researching improved forwarding techniques to resolve the data broadcast explosion in connected vehicles over NDN.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.

A Methodology on System Implementation for Road Monitoring and Management Based on Automated Driving Hazard Levels (위험도 기반 도로 모니터링 및 관리 시스템 구축 방안)

  • Kyuok Kim;Sang Soo Lee;SunA Cho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.299-310
    • /
    • 2022
  • The ability of an automated driving system is based on vehicle sensors, judgment and control algorithms, etc. The safety of automated driving system is highly related to the operational status of the road network and compliant road infrastructure. The safe operation of automated driving necessitates continuous monitoring to determine if the road and traffic conditions are suitable and safe. This paper presents a node and link system to build a road monitoring system by considering the ODD(Operational Design Domain) characteristics. Considering scalability, the design is based on the existing ITS standard node-link system, and a method for expressing the monitoring target as a node and a link is presented. We further present a technique to classify and manage hazard risk into five levels, and a method to utilize node and link information when searching for and controlling the optimal route. Furthermore, we introduce an example of system implementation based on the proposed node and link system for Sejong City.

An Analysis of Internal and External Research Trend on the Issues of Rural Migrant's Social Integration - Focused on Bibliometric Method - (국내 농촌 이주민의 사회통합을 위한 국·내외 연구 동향 분석 - 계량서지학적 방법론을 중심으로 -)

  • Kim, Du-Won;Nam, Jinvo
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.25 no.1
    • /
    • pp.35-44
    • /
    • 2023
  • This study aimed to understand the driver change of recent research in relation to rural and migrant and draw overarching issues as well as to provide implications to contribute to migrants' social integration in Korean rural areas. As for the scope and method of the study, data through quantitative bibliographic analysis (quantitative data) and research keywords by period were derived. To address the aim this study employed bibliometric analysis utilising netwok mapping interface analysis by VOSviewer and topic modeling analysis by Netminer. The findings were revealed that firstly mental health issues in abroad research and employment and discrimination in domestic research both derived from migrant mobility constituted staple key issues, secondly internal and external research differed two issues in health and violence where Korea has overlooked the issues seriously. Therefore this study presented implications which are about first, health and violence-related sections for migrants should be specified into domestic law, second domestic-focused MIPEX index should be developed in which the two issues are over-weighted and last such newly emerging approach 'inclusive formation of social psychological mechanisms should be widely spread. Concluding remark is that delivering the implications can be foster to migrants' integration in rural area underlining that this will ultimately contribute to migrants' quality of life.

Metro Station Clustering based on Travel-Time Distributions (통행시간 분포 기반의 전철역 클러스터링)

  • Gong, InTaek;Kim, DongYun;Min, Yunhong
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.193-204
    • /
    • 2022
  • Smart card data is representative mobility data and can be used for policy development by analyzing public transportation usage behavior. This paper deals with the problem of classifying metro stations using metro usage patterns as one of these studies. Since the previous papers dealing with clustering of metro stations only considered traffic among usage behaviors, this paper proposes clustering considering traffic time as one of the complementary methods. Passengers at each station were classified into passengers arriving at work time, arriving at quitting time, leaving at work time, and leaving at quitting time, and then the estimated shape parameter was defined as the characteristic value of the station by modeling each transit time to Weibull distribution. And the characteristic vectors were clustered using the K-means clustering technique. As a result of the experiment, it was observed that station clustering considering pass time is not only similar to the clustering results of previous studies, but also enables more granular clustering.

A Study on the Characteristics of Colour Perception According to Light and Dark Mode in the Digital Media Environment (디지털 미디어 환경에서 사용자 환경 모드에 따른 색채 인지 특성 연구)

  • Ji-Young Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.65-70
    • /
    • 2023
  • In recent years, the digital media environment has begun to diversify, with a greater focus being placed on user-centric design. With the development of digital technology, the digital media environment has formed a vast network of information, which supports interactive communication between people, creating a need for user-centric research. Mobile displays, as a representation of the digital media environment, have the advantage of mobility through the use of thin screen displays and low-performance image sensors, which allow for miniaturization and power saving. However, this results in reduced colour accuracy compared to large displays. This study investigates users' colour perception when using dark and light mode mobile displays. Colour perception was measured using a psycho-physical experiment, which controls each colour attribute based on the 12 colours of KS. The results were analysed to determine whether there is a difference in colour perception between dark mode and light mode, and if the difference was statistically significant. Future research directions based on the results are then discussed.