• 제목/요약/키워드: Physical Network Approach

검색결과 205건 처리시간 0.027초

An IBC and Certificate Based Hybrid Approach to WiMAX Security

  • Rodoper, Mete;Trappe, Wade;Jung, Edward Tae-Chul
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.615-625
    • /
    • 2009
  • Worldwide inter-operability for microwave access (WiMAX) is a promising technology that provides high data throughput with low delays for various user types and modes of operation. While much research had been conducted on physical and MAC layers, little attention has been paid to a comprehensive and efficient security solution for WiMAX. We propose a hybrid security solution combining identity-based cryptography (IBC) and certificate based approaches. We provide detailed message exchange steps in order to achieve a complete security that addresses the various kind of threats identified in previous research. While attaining this goal, efficient fusion of both techniques resulted in a 53% bandwidth improvement compared to the standard's approach, PKMv2. Also, in this hybrid approach, we have clarified the key revocation procedures and key lifetimes. Consequently, to the best of knowledge our approach is the first work that unites the advantages of both techniques for improved security while maintaining the low overhead forWiMAX.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • 센서학회지
    • /
    • 제16권4호
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

GT-PSO- An Approach For Energy Efficient Routing in WSN

  • Priyanka, R;Reddy, K. Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.17-26
    • /
    • 2022
  • Sensor Nodes play a major role to monitor and sense the variations in physical space in various real-time application scenarios. These nodes are powered by limited battery resources and replacing those resource is highly tedious task along with this it increases implementation cost. Thus, maintaining a good network lifespan is amongst the utmost important challenge in this field of WSN. Currently, energy efficient routing techniques are considered as promising solution to prolong the network lifespan where multi-hop communications are performed by identifying the most energy efficient path. However, the existing scheme suffer from performance related issues. To solve the issues of existing techniques, a novel hybrid technique by merging particle swarm optimization and game theory model is presented. The PSO helps to obtain the efficient number of cluster and Cluster Head selection whereas game theory aids in finding the best optimized path from source to destination by utilizing a path selection probability approach. This probability is obtained by using conditional probability to compute payoff for agents. When compared to current strategies, the experimental study demonstrates that the proposed GTPSO strategy outperforms them.

건강의 유형별 연관성 평가: 네트워크 분석을 중심으로 (Study of Association between the Types of Health on the Basis of Network Analysis)

  • 조호수;류민호
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제32권3호
    • /
    • pp.41-61
    • /
    • 2023
  • Purpose This study aims to categorize the types of health, analyze the effects among health types based on network analysis find the most important type of health, and explain whether the results between health types vary depending on demographic characteristics. Design/methodology/approach This study investigated individual physical, clinical, mental, and social health(social capital and social support) levels through a survey of 100 people. Network analysis was applied to the survey data to confirm the degree centrality of nodes. Furthemore, we investigated the differences in core nodes according to gender and age groups. Findings According to the analysis result, social support was the most important health type in the entire group. Furthermore, the importance of health type was different depending on the characteristics of the groups. In the case of men, clinical health was the most important health type, and social support was analyzed to be the most important for women. In the case of young people, clinical health was the most important health type, and mental health was the most important health type in the middle-aged.

음원 파라미터 모델과 인공신경망을 이용한 음성장애 검출 (Screening of Voice Disorder using Source Parameter Model and Artificial Neural Network)

  • 파벨시틸;조철우;미샤파벨
    • 음성과학
    • /
    • 제15권2호
    • /
    • pp.89-97
    • /
    • 2008
  • There is a number of clinical conditions that affect directly or indirectly the physical properties of the vocal folds and thereby the pressure waveforms of elicited sounds. If the relationships between the clinical conditions and the voice quality are sufficiently reliable, it should be possible to detect these diseases or disorders. The focus of this paper is to determine the set of features and their values that would characterize the speaker's state of vocal folds. To the extent that these features can capture the anatomical, physiological, and neurological aspects of the speaker they can be potentially used to mediate an unobtrusive approach to diagnosis. We will show a new approach to this problem supported with results obtained from two disordered voice corpora.

  • PDF

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.

Measuring the Perceived Mental Image of Practical Courses among Students using Electronic Questionnaire

  • Khaled Hussein Mohamed Aly
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.1-9
    • /
    • 2023
  • The practical courses are considered as a model for the courses taught by the student of the Department of Physical Education at different levels of study, during which he employs his mental, physical and skill abilities to understand and master the motor skills and develop his physical abilities to be able to master them and later teach and train them, so this study was conducted with the aim of identifying the perceived mental image For the practical courses of the students of the Department of Physical Education at Umm Al-Qura University, by designing a scale for the perceived mental image of the practical courses, and identifying the percentages and the extent of their prevalence for each of the positive mental image, the nonperceived mental image, and the negative mental image of the practical courses among the students of the Department of Physical Education at Umm Al-Qura University, The researcher used the descriptive approach from the survey studies by designing a measure of the perceived mental image on a sample of (175) students, and they were chosen by the intentional method from the fourth level students who studied all the practical courses in the department, whether for the first or second semester of the academic year 2021 /2022. Data using frequencies, percentages and the test of significance of the ratio, and one of the most important results was the validity of the scale used in measuring the mental image perceived by students of the Department of Physical Education about practical courses. Realizing a positive mental image that is statistically significant about the practical courses of (53.20%) of the students of the Department of Physical Education, the sample of this study. And realizing a positive mental image that is statistically significant for students about the axes of the nature of studying practical courses, their abilities in practical performance, the method of implementing lectures, the lecturer, and their evaluation methods. The mental image of the student, and taking appropriate measures to develop the practical courses and academic programs, applying similar studies to measure the mental image of the department's graduates on the specialized tracks in the Department of Physical Education, reviewing the number of hours for some practical courses so that they are not less than two hours for all practical courses.

DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구 ((A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM))

  • 조광현;정창현;홍경동;김성운
    • 대한전자공학회논문지TC
    • /
    • 제42권9호
    • /
    • pp.85-96
    • /
    • 2005
  • "인터넷을 기반으로 하는 VPN(Virt at Private Network)"은 비용과 운용측면에서 효율적이다 하지만 광 대역폭 그리고 신뢰성 있는 서비스에 대한 요구의 증가는 IP/GMPLS over DWDM 기반의 백본 네트워크가 차세대 OVPN (Optical VPN)을 위하여 가장 적합한 백본 네트워크로 간주되게 하였다. 그러나, 높은 데이터 전송율을 가지는 OVPN망에서 광 소자의 일시적인 fault/attack에 의해서 일어나는 서비스 파괴는 순식간에 막대한 트래픽 손실을 야기 할 수 있으며, 비 인가된 physical attack 으로 인하여 물리적인 구성소자를 통해 정보가 도청 될 수 있다 또한 데이터 전송을 관리하는 제어 메시지가 변조되거나 복사되어 조작될 경우 데이터가 전송도중 실패하더라도 망의 생존성을 보장할수가 없게 된다. 따라서, OVPN에서는 생존성 문제 (i.e. fault/attack에 대한 물리적인 구조와 광 소자를 고려한 최적의 복구 매커니즘, 그리고 GMPLS 제어메시지의 보안성 있는 전송) 가 중요한 이슈로 대두되고 있다. 본 논문에서는 fault/attack을 관리하기 위해 광 소자들과 공통된 위험 요소를 포함하는 소자들을 분류하고, SRLG (Shared Risk Link Group)를 고려한 경로 설립 스킴과 GMPLS의 RSVP-TE+(Reservation Protocol-Traffic Engineering Extension)와 LMP(Link Management Protocol)의 보안성 제공 메커 니즘을 제안하여, OVPN에서의 생존성을 보장한다. 끝으로 시뮬레이션 결과를 통하여 제안된 알고리즘이 망 생존성을 위하여 더욱 효율적임을 증명하였다.

The Influence of Virtuality on Social Network: A Multi-level Approach

  • Suh, A-Young;Shin, Kyung-Shik;Kim, Min-Soo
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2008년도 춘계학술대회
    • /
    • pp.52-63
    • /
    • 2008
  • Virtuality is a product of the information age, and as it plays a larger role in the activities of individuals, groups and organizations, the issue of how human behavior varies between virtual and physical space has become one of the most important questions facing the management environment of today. The purpose of this article is to examine how virtuality shapes individuals' social relationships within and outside their work groups. We developed a conceptual framework that explores the links between virtuality and social network based on computer-mediated communication theory and social network theory. Using data from 172 individuals of 42 project teams in 5 global business consulting firms, we tested cross-level hypotheses. The results of hierarchical linear modeling (HLM) indicate that virtuality significantly influences individual's internal tie strength as well as external bridging ties. The results also show the effects of virtual process via CMC vary along with the virtual context.

  • PDF