• 제목/요약/키워드: Network protection

검색결과 1,087건 처리시간 0.029초

The IRPA Young Generation Network: Activity Report from the Middle of 2018 to the Beginning of 2021

  • Andresz, Sylvain;Sakoda, Akihiro;Ha, Wi-Ho;Kabrt, Franz;Kono, Takahiko;Munoz, Marina Saez;Nusrat, Omar;Papp, Cinthia;Qiu, Rui;Bryant, Pete
    • Journal of Radiation Protection and Research
    • /
    • 제46권3호
    • /
    • pp.143-150
    • /
    • 2021
  • Since its establishment in 2018, the Young Generation Network (YGN) has been dedicated, with support of the International Radiation Protection Association (IRPA), to a variety of activities to promote communication, collaboration and professional development of students and young professionals in the area of radiation protection and its allied fields. This article reports our recent activities from the middle of 2018 to the beginning of 2021, with highlights on some important events: "Joint JHPS-SRP-KARP Workshop of Young Generation Network" (December 2019 in Japan); contribution to "Nuclear Energy Agency Workshop on Optimization: Rethinking the Art of Reasonable" (January 2020 in Portugal); survey on the impact of coronavirus disease 2019 (COVID-19) on radiation protection among IRPA YGN members (March 2020); and contribution to IRPA15 (15th International Congress of the IRPA; January-February 2021, online). The discussion and insight obtained from each activity are also summarized. The IRPA YGN will aim to achieve its on-going activities and continue to follow the ways paved in the Strategic Agenda and despite the challenges raised by the COVID-19 pandemic. Namely, running an international survey (for example, on the usage of social media in radiation protection, and on the long-term consequences of the COVID-19 pandemic), engaging national YGNs, extending the network, finding new relationships with networks with an interest in the young generation and participation in (remote) events will be aspired for.

무선 메쉬망에서의 안전하고 효율적인 키관리 스킴 (Secure and Efficient Key Management Scheme for Wireless Mesh Network)

  • ;;이상곤;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Protection Management for Guaranteed User-Driven Virtual Circuit Services in Dynamic Multi-domain Environments: Design Issues and Challenges

  • Lim, Huhnkuk
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.369-379
    • /
    • 2015
  • Fault management of virtualized network environments using user-driven network provisioning systems (NPSs) is crucial for guaranteeing seamless virtual network services irrespective of physical infrastructure impairment. The network service interface (NSI) of the Open Grid Forum reflects the need for a common standard management API for the reservation and provisioning of user-driven virtual circuits (VCs) across global networks. NSI-based NPSs (that is, network service agents) can be used to compose user-driven VCs for mission-critical applications in a dynamic multi-domain. In this article, we first attempt to outline the design issues and challenges faced when attempting to provide mission-critical applications using dynamic VCs with a protection that is both user-driven and trustworthy in a dynamic multi-domain environment, to motivate work in this area of research. We also survey representative works that address inter-domain VC protection and qualitatively evaluate them and current NSI against the issues and challenges.

Protection of a Multicast Connection Request in an Elastic Optical Network Using Shared Protection

  • BODJRE, Aka Hugues Felix;ADEPO, Joel;COULIBALY, Adama;BABRI, Michel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.119-124
    • /
    • 2021
  • Elastic Optical Networks (EONs) allow to solve the high demand for bandwidth due to the increase in the number of internet users and the explosion of multicast applications. To support multicast applications, network operator computes a tree-shaped path, which is a set of optical channels. Generally, the demand for bandwidth on an optical channel is enormous so that, if there is a single fiber failure, it could cause a serious interruption in data transmission and a huge loss of data. To avoid serious interruption in data transmission, the tree-shaped path of a multicast connection may be protected. Several works have been proposed methods to do this. But these works may cause the duplication of some resources after recovery due to a link failure. Therefore, this duplication can lead to inefficient use of network resources. Our work consists to propose a method of protection that eliminates the link that causes duplication so that, the final backup path structure after link failure is a tree. Evaluations and analyses have shown that our method uses less backup resources than methods for protection of a multicast connection.

MPLS망의 보호 복구 기술의 비교 (A Comparison of Restoration Schemes in Multiprotocol Label Switching Networks)

  • 오승훈;김영한
    • 한국통신학회논문지
    • /
    • 제27권4C호
    • /
    • pp.316-325
    • /
    • 2002
  • This paper investigates the restoration schemes which are applied to the MPLS domain upon a network failure. We define the following three restoration service models by combining the various restoration schemes: "FIS-based protection service" (FIS: failure indication signal), "inversion traffic protection service" and "1+1 protection service". After a qualitative analysis of the performance in them, we have analyzed it on quantitative basis by the simulation. According to the simulation results, "1+1 protection service" guarantees the fastest and most lossless restoration service among them; however, it results in consuming considerable bandwidth and producing an amount of control traffic, which means poor network utilization. On the other hand, "FIS-based protection service" spends less bandwidth and generates less control traffic, which means better network utilization, but produces poor restoration service. "Inversion traffic protection service" provides the medium restoration service and utilization between "1+1 protection service" and "FIS-based protection service."

다중링-메시 토폴로지 기반 T-SDN(Transport SDN)에서 보호·복구 경로 계산 방식 (Protection and restoration path calculation method in T-SDN (Transport SDN) based on multiple ring-mesh topology)

  • 김현철
    • 융합보안논문지
    • /
    • 제23권1호
    • /
    • pp.3-8
    • /
    • 2023
  • 다중 도메인 광 전송망은 기본적으로 상호 운용되지 않으며 전체 망차원의 통합 오케스트레이션 메커니즘과 경로 제공 메커니즘이 필요하다. 더불어 망의 생존성 보장은 중요한 쟁점 중의 하나이다. MPLS-TP(Multi-Protocol Label Switching-Transport Profile)에서는 다양한 보호·복구 방안을 표준으로 정의하고 있으나 보호·복구 경로를 계산·선정하는 방안에 대해서는 언급하고 있지 않다. 따라서 광회선패킷 통합망 차원에서 보호·복구 충돌을 최소화하여 통합망 전 영역에 걸쳐 신속한 보호·복구가 가능한 경로를 계산·설정하는 알고리즘이 필요하다. 본 논문에서는 다중링-메시 토폴로지 형태로 구성된 T-SDN 망에서 신속한 보호·복구가 가능한 경로를 계산·설정하는 알고리즘을 제안하였다.

Trade-off between Resource Efficiency and Fast Protection for Shared Mesh Protection

  • Cho, Choong-hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권7호
    • /
    • pp.2568-2588
    • /
    • 2021
  • Shared mesh protection (SMP) protects traffic against failures occurring in a working path, as with linear protection, and allows resource sharing of protection paths with different endpoints. The SMP mechanism coordinates multiple protection paths that require shared resources when failures occur on multiple working paths. When multiple failures occur in SMP networks sharing limited resources, activation can fail because some of the resources in the protection path are already in use. In this case, a node confirming that a resource is not available has the option to wait until the resource is available or to withdraw activation of the protection path. In this study, we recognize that the protection switching time and the number of protected services can be different, depending on which option is used for SMP networks. Moreover, we propose a detailed design for the implementation of SMP by considering options and algorithms that are commonly needed for network nodes. A simulation shows the performance of an SMP system implemented with the proposed design and utilizing two options. The results demonstrate that resource utilization can be increased or protection switching time can be shortened depending on the option selected by the network administrator.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

한국 서남 해상 풍력발전단지 통신망 연구 (Communication Network Architectures for Southwest Offshore Wind Farm)

  • 압델 하미드 모하메드;김영천
    • 한국통신학회논문지
    • /
    • 제42권1호
    • /
    • pp.88-97
    • /
    • 2017
  • With the increasing of the penetration rate of large-scale wind farms, a reliable, highly available and cost-effective communication network is needed. As the failure of a WF communication network will significantly impact the control and real-time monitoring of wind turbines, network reliability should be considered into the WF design process. This paper analyzes the network reliability of different WF configurations for the Southwest Offshore project that is located in Korea. The WF consists of 20 WTs with a total capacity of 60 MW. In this paper, the performance is compared according to a variety of indices such as network unavailability, mean downtime and network cost. To increase the network reliability, partial protection and full protection were investigated as strategies that can overcome the impact of a single point of failure. Furthermore, the reliability performances of different network architectures are analyzed, evaluated and compared.