• Title/Summary/Keyword: The Industry Network

Search Result 2,733, Processing Time 0.026 seconds

A Study on Secure Cooperative Caching Technique in Wireless Ad-hoc Network (Wireless Ad-hoc Network에서 보안 협력 캐싱 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.91-98
    • /
    • 2013
  • Node which plays the role of cache server does not exist in the wireless ad-hoc network consisting of only mobile nodes. Even if it exists, it is difficult to provide cache services due to the movement of nodes. Therefore, the cooperative cache technique is necessary in order to improve the efficiency of information access by reducing data access time and use of bandwidth in the wireless ad-hoc network. In this paper, the whole network is divided into zones which don't overlap and master node of each zone is elected. General node of each zone has ZICT and manages cache data to cooperative cache and gateway node use NZCT to manage cache information of neighbor zone. We proposed security structure which can accomplish send and receive in the only node issued id key in the elected master node in order to prepare for cache consistent attack which is vulnerability of distributed caching techniques. The performance of the proposed method in this paper could confirm the excellent performance through comparative experiments of GCC and GC techniques.

A Study for Detection Accuracy Improvement of Malicious Nodes on MANET (MANET에서의 의심노드 탐지 정확도 향상을 위한 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.95-101
    • /
    • 2013
  • MANET has an advantage that can build a network quickly and easily in difficult environment to build network. In particular, routing protocol that uses in existing mobile environment cannot be applied literally because it consists of only mobile node. Thus, routing protocol considering this characteristic is necessary. Malicious nodes do extensive damage to the whole network because each mobile node has to act as a router. In this paper, we propose technique that can detect accurately the suspected node which causes severely damage to the performance of the network. The proposed technique divides the whole network to zone of constant size and is performed simultaneously detection technique based zone and detection technique by collaboration between nodes. Detection based zone translates the information when member node finishes packet reception or transmission to master node managing zone and detects using this. The collaborative detection technique uses the information of zone table managing in master node which manages each zone. The proposed technique can reduce errors by performing detection which is a reflection of whole traffic of network.

An Efficient Routing Algorithm for extreme networking environments (극단적인 네트워크 환경을 위한 효율적인 라우팅 알고리즘)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.47-53
    • /
    • 2012
  • Sensor networks and car networks that have different structure from that of conventional TCP/IP network require extreme network environment due to frequent change of connectivity. Because such extreme network environment has characteristics like unreliable link connectivity, long delay time, asymmetrical data transfer rate, and high error rate, etc., it is difficult to perform normally with the conventional TCP/P-based routing. DTNs (delay and disruption tolerant network) was designed to support data transfer in extreme network environment with long delay time and no guarantee for continuous connectivity between terminals. This study suggests an algorithm that limits the maximum number of copying transferred message to L by improving the spray and wait routing protocol, which is one of the conventional DTNs routing protocols, and using the azimuth and density data of the mobile nods. The suggested algorithm was examined by using ONE, a DTNs simulator. As a result, it could reduce the delay time and overhead of unnecessary packets compared to the conventional spray and wait routing protocol.

A Study on Development of Long-Term Runoff Model for Water Resources Planning and Management (수자원의 이용계획을 위한 장기유출모형의 개발에 관한 연구)

  • Cho, Hyeon-Kyeong
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.16 no.3
    • /
    • pp.61-68
    • /
    • 2013
  • Long-term runoff model can be used to establish the effective plan of water reources allocation and the determination of the storage capacity of reservoir. So this study aims at the development of monthly runoff model using artificial neural network technique. For this, it was selected multi-layer neural network(MLN) and radial basis function neural network(RFN) model. In this study, it was applied model to analysis monthly runoff process at the Wi stream basin in Nakdong river which is representative experimental river basin of IHP. For this, multi-layer neural network model tried to construct input 3, hidden 7, and output 1 for each number of layer. As the result of analysis of monthly runoff process using models connected with artificial neural network technique, it showed that these models were effective in the simulation of monthly runoff.

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

Proposal of Research Issues related to the Technology, Service, Policy and Business Model in Commercializing and Promoting 5G Network (5G 실용화 및 활성화에 필요한 관련 기술, 서비스, 정책 및 비즈니스 모델에 관련된 연구 이슈 제안)

  • Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, it is anticipated that 5G network would play the significant role of the neural network for 4th generation industry revolution and create huge value for the new market. However, in spite of proliferating prospect of 5G network industry and leading position in the launch of 5G, network operators have hesitated to give their full support to establishing proper network. Due to the lack of business models promoting 5G industry, network operators feel that they will not realize the return from the exorbitant investment in 5G network establishment. Moreover, the rigorous research efforts to investigate and analyze the various business environments regarding 5G rarely exists. Therefore, the purpose of the research is to holistically propose the research issues related to the technology, service providing method, governmental policy, and business models in commercializing and promoting 5G network.

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

A Study on Industrial Development Direction at Transitional Periods of Industrial Structure in Chungcheongbuk-do Region (산업구조 전환기 충북지역 산업의 발전방향)

  • 한주성
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.6 no.2
    • /
    • pp.293-306
    • /
    • 2003
  • This paper aims to clarify the change in industrial structure and industry itself, and makes suggestions for the industrial development direction at transitional periods in the Chungcheongbuk-do(province) region. Because profits of regional gross production in Chungcheongbuk-do region flow out of the region, basic industries must be brought up. For this phenomenon, main manufacturing must be developed for the industrial power of the next generation of high added values that combined with digital industry; the petrochemistry, semiconductor industry as major type of industry, and automobile industry as minor type of industry. Also for supporting industry, education service, health and welfare, research and development services that are knowledge-based service industries in Chungcheongbuk-do region, must be formated the network among corporations and constructed regional innovation system linked with educational institutions, precision chemistry industry and biology technology as major type of industry, and precision machinery and tools industry as minor type of industry.

  • PDF

Network Attacks Visualization using a Port Role in Network Sessions (트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화)

  • Chang, Beomhwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

Analysis of Innovation Patterns of Korean Online Game Industry (한국 온라인게임 산업의 서비스 혁신패턴 분석)

  • Nam, Young-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.1
    • /
    • pp.117-137
    • /
    • 2008
  • Using the service innovation system model, the development of Korean online game industry is analyzed. The model proposed by Gallouj (2002) is modified in order to reflect IT service characteristics such as network externalities. Success factors and innovations patterns of Korean online game industry are examined. First, at the early stage of her growth, Korean online game industry was not supported or coordinated by any Government policies unlike DRAM, CDMA or TFT-LCD. Many parts of technical and service innovations were unintentionally initiated by online game developing ventures without predeterminde strategies. Second, the online game industry is basically a service industry so that users' needs and technical and service characteristics are intertwined to produce innovation. The innovation system of the online game industry is quite different from conventional product technological innovation systems in a sense that there are no blueprints for innovation as well as major players in the system. Third, Government's policies for promotion of IT industry such as the broadband infrastructure installation policy, the hi-tech venture promotion policy and the military exemption policy contributed greatly to development of the online game industry. However, these policy tools were not intended for online game industry but in the end gave a great impact on the service innovation system of the online game industry.

  • PDF