• Title/Summary/Keyword: Node Generation

Search Result 347, Processing Time 0.024 seconds

Building More Secure Femtocell with Improved Proxy Signature (개선된 위임 서명 방식을 이용해서 더 안전한 펨토셀 환경 구축)

  • Choi, Hyoung-Kee;Han, Chan-Kyu;Kim, Seung-Ryong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.75-86
    • /
    • 2014
  • Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP defines new architecture and security requirement for Release 9 to deal with femtocell, Home eNode B referred as HeNB. In this paper, we analyze the HeNB security with respect to mutual authentication, access control, and secure key agreement. Our analysis pointed out that a number of security vulnerabilities have still not been addressed and solved by 3GPP technical specification. These include eavesdropping, man-in-the-middle attack, compromising subscriber access list, and masquerading as valid HeNB. To the best of our knowledge, any related research studying HeNB security was not published before. Towards this end, this paper proposes an improved authentication and key agreement mechanism for HeNB which adopts proxy-signature and proxy-signed proxy-signature. Through our elaborate analysis, we conclude that the proposed not only prevents the various security threats but also accomplishes minimum distance from use-tolerable authentication delay.

Using the On-Package Memory of Manycore Processor for Improving Performance of MPI Intra-Node Communication (MPI 노드 내 통신 성능 향상을 위한 매니코어 프로세서의 온-패키지 메모리 활용)

  • Cho, Joong-Yeon;Jin, Hyun-Wook;Nam, Dukyun
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.124-131
    • /
    • 2017
  • The emerging next-generation manycore processors for high-performance computing are equipped with a high-bandwidth on-package memory along with the traditional host memory. The Multi-Channel DRAM (MCDRAM), for example, is the on-package memory of the Intel Xeon Phi Knights Landing (KNL) processor, and theoretically provides a four-times-higher bandwidth than the conventional DDR4 memory. In this paper, we suggest a mechanism to exploit MCDRAM for improving the performance of MPI intra-node communication. The experiment results show that the MPI intra-node communication performance can be improved by up to 272 % compared with the case where the DDR4 is utilized. Moreover, we analyze not only the performance impact of different MCDRAM-utilization mechanisms, but also that of core affinity for processes.

In Vitro Plant Regeneration from Stolen Node Explant in Eremochloa Ophiuroides (Munro) Hack

  • Barampuram, Shyamkumar;Chung, Byung-Yeoup;Lee, Seung-Sik;An, Byung-Chull;Kim, Jae-Sung
    • Journal of Plant Biotechnology
    • /
    • v.34 no.2
    • /
    • pp.161-166
    • /
    • 2007
  • In vitro shoot regeneration and multiple shoot induction has been obtained from the stolen node explants in Eremochloa ophiuroides (Munro) Hack. The highest number of shoots ($10.66{\pm}0.21$) was observed from initial explants after one month culture duration on Murashige and Skoog (MS) medium containing 6-benzyladenine (BA: 0.5 mg/l). First generation shoot was excised and sub-cultured on the same fresh media for further multiplication of shoots. An enhanced number of second round shoots ($15.33{\pm}0.21$) was obtained compared to the initial culture media containing BA (0.5 mg/l). The number of shoots/stolon node was higher among all the concentrations of BA than kinetin (KN). In vitro regenerated shoots were successfully rooted in the phytohormone free MS medium. Plantlets generated with roots were transferred to pots containing compound mixture of soil and kept in green house conditions. Acclimatized plants showed 100% survival rate with normal morphology in green house conditions. The present study demonstrates the effect of explant and different plant growth regulators towards in vitro response in E. ophiuroides. Moreover, the study reveals the effect of cytokinin on induction of shoot number per stolen node explant in E. ophiuroides.

A Study on Developing an Integrated Model of Facility Location Problems and Safety Stock Optimization Problems in Supply Chain Management (공급사슬관리에서 생산입지선정 문제와 안전재고 최적화 문제의 통합모형 개발에 관한 연구)

  • Cho Geon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.31 no.1
    • /
    • pp.91-103
    • /
    • 2006
  • Given a bill of materials (BOM) tree T labeled by the breadth first search (BFS) order from node 0 to node n and a general network ${\Im}=(V,A)$, where V={1,2,...,m} is the set of production facilities and A is the set of arcs representing transportation links between any of two facilities, we assume that each node of T stands for not only a component. but also a production stage which is a possible stocking point and operates under a periodic review base-stock policy, We also assume that the random demand which can be achieved by a suitable service level only occurs at the root node 0 of T and has a normal distribution $N({\mu},{\sigma}^2)$. Then our integrated model of facility location problems and safety stock optimization problem (FLP&SSOP) is to identify both the facility locations at which partitioned subtrees of T are produced and the optimal assignment of safety stocks so that the sum of production cost, inventory holding cost, and transportation cost is minimized while meeting the pre-specified service level for the final product. In this paper, we first formulate (FLP&SSOP) as a nonlinear integer programming model and show that it can be reformulated as a 0-1 linear integer programming model with an exponential number of decision variables. We then show that the linear programming relaxation of the reformulated model has an integrality property which guarantees that it can be optimally solved by a column generation method.

An Adaptive Sensor Network Node Structure for Next Generation Ubiquitous Environment (차세대 유비쿼터스 환경을 위한 적응적 센서 네트워크 노드 구조)

  • 박수용;김성수;이상학
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.253-255
    • /
    • 2004
  • 현재의 센서 네트워크를 구성하고 있는 센서 노드들은 배치 전에 미리 입력된 라우팅 및 감지 서비스만을 제공한다. 이러한 센서 네트워크 및 노드 구조는 기존의 고정화된 환경에는 적합하나 차세대 유비쿼터스 환경과 같이 시스템이 스스로 성장하며 서비스 추가 및 재설정 요구가 빈번하게 일어나는 환경에서는 그대로 적용하기가 힘들다. 따라서 본 논문에서는 유비쿼터스 환경에서 시스템 레벨의 정책 및 환경 변화에 따라 적응적으로 동작할 수 있는 센서 네트워크 노드 구조를 제안하여, 또한 제안된 구조에서 기존의 구조에 대한 에너지 소모 정도를 분석하여 제안의 현실성을 검증한다.

  • PDF

Analyses of a Signal Traffic for Authentication in Mobile Sensor Network (이동 센서 네트워크망에서의 인증 메카니즘 신호의 트래픽 분석)

  • Kim Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1524-1528
    • /
    • 2005
  • In this paper, we analyses of a traffic for authentication signaling in third generation mobile sensor network. In universal mobile telecommunication system, authentication functions are utilized to identify and authentication a mobile station and validate the service request network services. The authenticating parties are the authentication the serving general packet radio service support node access the authentication center to obtain the authentication with the mobile station. In this paper, we propose that the automatic cost-effective solution size of the authentication vector array.

Comparison of error estimation methods and adaptivity for plane stress/strain problems

  • Ozakca, Mustafa
    • Structural Engineering and Mechanics
    • /
    • v.15 no.5
    • /
    • pp.579-608
    • /
    • 2003
  • This paper deals with adaptive finite element analysis of linearly elastic structures using different error estimators based on flux projection (or best guess stress values) and residual methods. Presentations are given on a typical h-type adaptive analysis, a mesh refinement scheme and the coupling of adaptive finite element analysis with automatic mesh generation. Details about different error estimators are provided and their performance, reliability and convergence are studied using six node quadratic triangular elements. Several examples are presented to demonstrate the reliability of different error estimators.

A Study on the Efficient Meshfree Method Using Adaptive Refinement Analysis (적응적 세분화기법을 이용한 효율적 무요소법에 관한 연구)

  • Han, Kyu-Taek
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.9 no.5
    • /
    • pp.50-56
    • /
    • 2010
  • Meshfree methods show many advantages over finite element method(FEM) in the class of problems for which the remeshing process is inevitable when the conventional FEM used, such as propagating crack problems, large deformation and so on. One of the promising applications of meshfree methods is the adaptive refinement for problems having multi-scale nature. In this study, an adaptive node generation procedure is proposed and several numerical examples are also presented to illustrate the efficiency of proposed method.

Analyses of Security Model and Design of Protocol for Wireless Ad-Hoc Network (무선 Ad-Hoc 망의 프로토콜 설계 및 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.860-863
    • /
    • 2005
  • Ad-Hoc networks are a new generation of networks offering unrestricted mobility without any underlying infrastructure. Primary applications of Ad-Hoc networks are in military, tractical and other security sensitive operations, where the environment is hostile. Hence, security is a critical issue. In this paper, we ahve identified certain misbehaviors caused by mallicious node for reactive routing protocol. We also discuss the intrusion detection and intrusion prevention model to prevent several identified attacks in the networks

  • PDF

An Energy-Efficient Clustering Using Load-Balancing of Cluster Head in Wireless Sensor Network (센서 네트워크에서 클러스터 헤드의 load-balancing을 통한 에너지 효율적인 클러스터링)

  • Nam, Do-Hyun;Min, Hong-Ki
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.277-284
    • /
    • 2007
  • The routing algorithm many used in the wireless sensor network features the clustering method to reduce the amount of data transmission from the energy efficiency perspective. However, the clustering method results in high energy consumption at the cluster head node. Dynamic clustering is a method used to resolve such a problem by distributing energy consumption through the re-selection of the cluster head node. Still, dynamic clustering modifies the cluster structure every time the cluster head node is re-selected, which causes energy consumption. In other words, the dynamic clustering approaches examined in previous studies involve the repetitive processes of cluster head node selection. This consumes a high amount of energy during the set-up process of cluster generation. In order to resolve the energy consumption problem associated with the repetitive set-up, this paper proposes the Round-Robin Cluster Header (RRCH) method that fixes the cluster and selects the head node in a round-robin method The RRCH approach is an energy-efficient method that realizes consistent and balanced energy consumption in each node of a generated cluster to prevent repetitious set-up processes as in the LEACH method. The propriety of the proposed method is substantiated with a simulation experiment.