• Title/Summary/Keyword: Path Establishment

Search Result 166, Processing Time 0.028 seconds

Revisiting Path-Key Establishment of Random Key Predistribution for Wireless Sensor Networks (무선센서네트워크를 위한 랜덤키사전분배기법의 경로키 설정에 대한 재고)

  • Kwon, Tae-Kyoung;Lee, Jong-Hyup;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.165-169
    • /
    • 2009
  • In this short paper, we revisit the random key predistribution methods for wireless sensor networks with regard to their intrinsic phase called the path-key establishment. First we show that the path-key establishment is less practical than expected and may degrade the performance of key establishment significantly. We then propose a novel path-key establishment method for those schemes and analyze its advantageous performance improvement.

On QoS Routing and Path Establishment in the Presence of Imprecise State Information

  • Yuan, Xin;Duan, Zhenhai
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.356-367
    • /
    • 2007
  • In large networks, maintaining precise global network state information is impossible. The imprecise network state information has significant impacts on Quality-of-Service(QoS) routing and path establishment. In this paper, we develop analytical models for investigating the QoS routing schemes that are designed to tolerate imprecise network state information, and study the performance of various QoS routing schemes, including randomized routing, multi-path routing, and probability based routing, using both the models and simulations. We further propose a new mechanism, called local rerouting, that improves the effectiveness of QoS path establishment in the presence of imprecise global network state information. Local rerouting is orthogonal to existing schemes for dealing with imprecise state information and can be used in conjunction with them to alleviate the impacts of the imprecise information. The results of our performance study indicate that local rerouting is robust and effective.

A Path Establishment Method for Improving Path Stability in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 경로의 안정성 향상을 위한 경로 설정 방식)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.563-568
    • /
    • 2007
  • This paper proposes a routing establishment method for improving path stability in mobile ad-hoc networks. In mobile ad-hoc networks, the network topology is highly dynamic due to the node mobility unlike wired networks. Since the existing methods are based on the shortest path algorithm with the minimum hop count regardless of the path stability, it could lead to packet loss and path disconnection in mobile ad-hoc networks. In particular, if control packets and critical data are transmitted on the unstable path, it causes serious problems. Therefore, this paper proposes one approach in order to minimize packet loss and path disconnection by considering the node mobility. After the destination node receives multiple RREQ messages, it selects the stable path through the proposed MinMax algorithm according to the node speed.

New Byzantine Resilient Multi-Path Key Establishment Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 비잔틴 공격에 강인한 새로운 다중 패스 키 설정 방법)

  • Kim, Young-Sik;Jang, Ji-Woong;Lim, Dae-Woon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9C
    • /
    • pp.855-862
    • /
    • 2009
  • The path key establishment phase in the wireless sensor network is vulnerable to Byzantine attack. Huang and Hedhi proposed a Byzantine resilient multi-key establishment scheme using a systematic RS code, which has shortcomings of exposing a part of message symbols and inefficient transmission. In this paper, we propose a new Byzantine resilient multi-path key establishment scheme in which direct message symbols are not exposed to an adversary and are more efficiently transmitted the RS-encoded symbols to the destination node. In the Proposed scheme, a non-systematic RS code is used to transmit a generated indirect secret key and each encoded symbol is relayed through available paths between two sensor nodes. If enough symbols are collected at the destination node, it is possible to reconstruct the secret message through RS decoding.

Development of the Roughing Path Measurement System for Footwear (신발 러핑 경로 측정기 개발)

  • 강동배;김화영;손성민;안중환
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.10
    • /
    • pp.120-129
    • /
    • 2003
  • For successful establishment of the roughing CAM system based on reverse engineering, it is necessary to develop the measurement method for generation of roughing path from a physical footwear model. In this study, the development of the roughing path measurement system is presented. It consists of 3 CCD cameras, image acquisition board and the roughing path measurement algorithm. The 3 CCD cameras capture images of the sidewall and the bottom of the footwear and, from two images, the outer and inner lines are extracted using image-processing algorithm. The roughing path measurement algorithm generates the roughing path which is reflected on the change of resolution according to the distance between the CCD camera and the measured point. The experimental results show that the developed system can measure the roughing path within the allowable roughing error range.

Cluster-based Pairwise Key Establishment in Wireless Sensor Networks (센서 네트워크에서의 안전한 통신을 위한 클러스터 기반 키 분배 구조)

  • Chun Eunmi;Doh Inshil;Oh Hayoung;Park Soyoung;Lee Jooyoung;Chae Kijoon;Lee Sang-Ho;Nah Jaehoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.473-480
    • /
    • 2005
  • We can obtain useful information by deploying large scale sensor networks in various situations. Security is also a major concern in sensor networks, and we need to establish pairwise keys between sensor nodes for secure communication. In this paper, we propose new pairwise key establishment mechanism based on clustering and polynomial sharing. In the mechanism, we divide the network field into clusters, and based on the polynomial-based key distribution mechanism we create bivariate Polynomials and assign unique polynomial to each cluster. Each pair of sensor nodes located in the same cluster can compute their own pairwise keys through assigned polynomial shares from the same polynomial. Also, in our proposed scheme, sensors, which are in each other's transmission range and located in different clusters, can establish path key through their clusterheads. However, path key establishment can increase the network overhead. The number of the path keys and tine for path key establishment of our scheme depend on the number of sensors, cluster size, sensor density and sensor transmission range. The simulation result indicates that these schemes can achieve better performance if suitable conditions are met.

Virtual Channel Re-establishment Scheme for Shortest Path in WATM LAN (무선 ATM LAN 핸드오프에서 Shortest Path를 위한 가상채널 재설정 기법)

  • 유수종;송주석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.414-416
    • /
    • 1999
  • 무선 ATM은 무선 멀티미디어 서비스를 종단간 ATM 기술로 제공하는 전송방식으로 최근에 그 요구가 급증하여 단말기의 개발과 보급이 폭증하고 있다. 이에 따라 사용자 및 전송용량의 증가로 인하여 셀의 크기가 작아지게 되고 더 많은 핸드오프가 발생하게 되는데, 좀 더 빠르고 망 자원을 보다 효율적으로 이용하도록 하기 위한 기법들에 대한 연구가 증대되고 있다. 본 논문에서는 보다 빠른 핸드오프를 위하여 사용되어지는 여러 가지 routing 방법들 중 단말기가 접속된 기지국이 바뀔 경우 VC(Victual Connection)를 재설정하는 방식인 Path Extension과 Path Rerouting을 사용하여 LAN 환경에서 해당 MSC에 속한 BS의 개수에 따라 어떠한 VC path length와 receive latencies를 나타내는지 비교하여 핸드오프 지연이 보다 적은 기법을 제안한다.

  • PDF

Development of Optimal Path Planning for Automated Excavator (자동화 굴삭기 최적경로 생성 알고리즘 개발)

  • Shin, Jin-Ok;Park, Hyong-Ju;Lee, Sang-Hak;Hong, Dae-Hee
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2007.04a
    • /
    • pp.78-83
    • /
    • 2007
  • The paper focuses on the establishment of optimized bucket path planning and trajectory control designated for force-reflecting backhoe reacting to excavation environment, such as potential obstacles and ground characteristics. The developed path planning method can be used for precise bucket control, and more importantly for obstacle avoidance which is directly related to safety issues. The platform of this research was based on conventional papers regarding the kinematic model of excavator. Jacobian matrix was constructed to find optimal joint angles and rotation angles of bucket from position and orientation data of excavator. By applying Newton-Raphson method optimal joint angles and bucket orientation were derived simultaneously in the way of minimizing positional errors of excavator. The model presented in this paper was intended to function as a cornerstone to build complete and advanced path planning of excavator by implementing soil mechanics and further study of excavator dynamics together.

  • PDF

An Efficient Protocol for the Cross Certification Path Validation (경로기반 상호인증을 위한 효율적 프로토콜)

  • 김홍석;박세현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.217-220
    • /
    • 2000
  • With the expansion of E-commerce, Public Key Infrastructure (PKI) solutions are requited to resolve Internet security problems. But the certification mechanism for each organization has been independently developed under its own circumstances, so the cooperation of heterogeneous certification mechanisms must be carefully taken into account. In this paper, we propose an efficient protocol for the cross certification based on the path validation. The proposed “cross certification gateway” provides flexibility and convenience with the initial establishment protocol for the cross certification among different certification domains.

  • PDF

A Point-to-Multipoint Routing Path Selection Algorithm for Dynamic Routing Based ATM Network (동적 라우팅기반의 점대다중점 라우팅 경로 선택)

  • 신현순;이상호;이경호;박권철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8A
    • /
    • pp.581-590
    • /
    • 2003
  • This paper proposes the routing path selection mechanism for source routing-based PtMP (Point-to-Multipoint) call in ATM switching system. Especially, it suggests PtMP routing path selection method that can share the maximum resource prior to the optimal path selection, guarantee the reduction of path calculation time and cycle prevention. The searching for the nearest branch point from destination node to make the maximum share of resource is the purpose of this algorithm. Therefore among neighbor nodes from destination node by back-tracking, this algorithm fixes the node crossing first the node on existing path having the same Call ID as branch node, constructs the optimal PtMP routing path. The optimal node to be selected by back-tracking is selected by the use of Dijkstra algorithm. That is to say, PtMP routing path selection performs the step of cross node selection among neighboring nodes by back-tracking and the step of optimal node selection(optimal path calculation) among neighboring nodes by back-tracking. This technique reduces the process of search of routing information table for path selection and path calculation, also solves the cycle prevention easily during path establishment.