• Title/Summary/Keyword: Tree-Based Network

Search Result 639, Processing Time 0.021 seconds

Energy Efficient Routing Protocol in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율적인 라우팅 프로토콜)

  • 손병락;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.2
    • /
    • pp.65-73
    • /
    • 2004
  • By the progress of communication and hardware technology, It is possible to organize wireless sensor nodes using the tiny sensor in recently. It is a critical aspect to minimize energy consumption for long-term lively sensor because wireless sensor nodes are associated with the available resources. The wireless sensor network is restricted in communication, exhaustion of power, and computation but it is very similar an Ad-Hoc network. Each sensor node products a few data and application layer of each sensor has slow transmitting feature. Unlike Ad-hoc, which is usually source or sink, base station of the each senor nodes works as sink and the other nodes except sink node works as source. Generally, wireless sensor network keep staying fixed state and observing circumstances continuously after setting up. It doesnt fit for the wireless sensor networks under functioning of existing ad-hoc networks because original Ad-Hoc network routing protocol couldnt operate for wireless sensor network features. This thesis propose the effective routing protocol way in the filed of the expanded routing protocol based on tree with considering on the characteristic of wireless sensor networks pattern.

  • PDF

Ensemble Based Optimal Feature Selection Algorithm for Efficient Intrusion Detection in Wireless Sensor Network

  • Shyam Sundar S;R.S. Bhuvaneswaran;SaiRamesh L
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.8
    • /
    • pp.2214-2229
    • /
    • 2024
  • Wireless sensor network (WSN) consists of large number of sensor nodes that are deployed in geographical locations to collect sensed information, process data and communicate it to the control station for further processing. Due the unfriendly environment where the sensors are deployed, there exist many possibilities of malicious nodes which performs malicious activities in the network. Therefore, the security threats affect performance and life time of sensor networks, whereas various security aspects are there to address security issues in WSN namely Cryptography, Trust Management, Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS). However, IDS detect the malicious activities and produce an alarm. These malicious activities exploit vulnerabilities in the network layer and affect all layers in the network. Existing feature selection methods such as filter-based methods are not considering the redundancy of the selected features and wrapper method has high risk of overfitting the classification of intrusion. Due to overfitting, the classification algorithm fails to detect the intrusion in better manner. The main objective of this paper is to provide the efficient feature selection algorithm which was suitable for any type classification algorithm to detect the intrusion in an effective manner. This paper, the security of the network is addressed by proposing Feature Selection Algorithm using Chi Squared with Ensemble Method (FSChE). The proposed scheme employs the combination of decision tree along with the random forest classification algorithm to form ensemble classifier. The experimental results justify the feasibility of the proposed scheme in terms of attack detection, packet delivery ratio and time analysis by employing NSL KDD cup data Set. The obtained results shows that the proposed ensemble method increases the overall performance by 10% to 25% with respect to mentioned parameters.

A Method of Selecting Core for the Shared-Tree based Multicast Routing (공유 트리 기반 멀티캐스트 라우팅을 위한 코어 선택 방법)

  • Hwang, Soon-Hwan;Youn, Sung-Dae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.885-890
    • /
    • 2003
  • The Core Base Tree (CBT) multicast routing architecture is a multicast routing protocol for the internet. The CBT establishes a single shared tree for a multicast connection. The shared tree Is rooted at a center node called core. The location of the core may affect the cost and performance of the CBT. The core placement method requires the knowledge of the network topology In this Paper, we propose a simple and effective method for selecting the core. This method requires the distance vector information. in addition, we used results that calculated sample correlation coefficient. And then we select suitable routing algorithm according to member's arrangement states in muliticast group. we select core node that have minimum average cost or PIM-SM protocol is selected. The performance of this method is compared with several other methods by extensive simulations (i.e mean delay, maximum delay, and total cost). Our results shows that this method for Selecting Core is very effective.

An efficient spatio-temporal index for spatio-temporal query in wireless sensor networks

  • Lee, Donhee;Yoon, Kyoungro
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4908-4928
    • /
    • 2017
  • Recent research into wireless sensor network (WSN)-related technology that senses various data has recognized the need for spatio-temporal queries for searching necessary data from wireless sensor nodes. Answers to the queries are transmitted from sensor nodes, and for the efficient transmission of the sensed data to the application server, research on index processing methods that increase accuracy while reducing the energy consumption in the node and minimizing query delays has been conducted extensively. Previous research has emphasized the importance of accuracy and energy efficiency of the sensor node's routing process. In this study, we propose an itinerary-based R-tree (IR-tree) to solve the existing problems of spatial query processing methods such as efficient processing and expansion of the query to the spatio-temporal domain.

Models for Technology Evolution Path Creation Based on Citation Tree to Investigate Technology Opportunity Discovery (기술기회발굴을 위한 문서인용기반 기술진화 경로 생성 모형)

  • Lee, Jae-Min;Lee, Bangrae;Moon, Yeong-Ho;Kwon, Oh-Jin
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.spc
    • /
    • pp.1152-1170
    • /
    • 2011
  • We selected core documents from enormous number of documents by analyzing citation relation of papers or patents including direct citation and indirect citation. Then we tried to creat the technology evolution path from citation network tree. By applying the method to the patent DB of OLED (Organic Light Emitting Diode), we obtained genealogical citation network of core patents of OLED. We analyzed how the one of OLED technology was transferred to the semiconductor related technology and we named the process of transition as 'technology evolution path' of OLED technology. And we also analyzed the genealogical citation network of papers on graphene. From the analysis, we found that the weight count method including indirect citation was better in evaluating the value of technology of a paper than the times cited method.

  • PDF

Cost Effective Remote Subscription scheme for Ubiquitous Convergence IP-based Network (유비쿼터스 컨버젼스 IP 기반 대용량 네트워크에서 비용 절감형 리모트-서브스크립션 기법)

  • Shin, Soo-Young;Yoon, Young-Muk;Park, Soo-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.95-104
    • /
    • 2007
  • Mobile multimedia services such as TV-call or video streaming are gradually becoming popular in the 3rd or more generation mobile network (IMT-2000). Multimedia traffic is expected to continue increasing into the coming years, and IP technology is considered to be the efficient way of transporting such huge volumes of multimedia traffic. IP-based IMT network platform represents an evolution from IMT-2000. The structure of IP-based IMT network as ubiquitous platform is three-layered model : Middleware including Network Control PlatForm (NCPF) and Service Support PlatForm (SSPF), IP-BackBone (IP-BB), access network including sensor network. Mobility Management (MM) architecture in NCPF is proposed for IP-based IMT network in order to manage routing information and location information separately. The generous existing method of multicast control in IP-based IMT network is Remote Subscription. But Remote Subscription has problem that should be reconstructed whole multicast tree when sender in multicast tree moves to another area. To solve this problem, we propose the way to put Multicast-manager in NCPF.

Design and Evaluation of ANFIS-based Classification Model (ANFIS 기반 분류모형의 설계 및 성능평가)

  • Song, Hee-Seok;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.3
    • /
    • pp.151-165
    • /
    • 2009
  • Fuzzy neural network is an integrated model of artificial neural network and fuzzy system and it has been successfully applied in control and forecasting area. Recently ANFIS(Adaptive Network-based Fuzzy Inference System) has been noticed widely among various fuzzy neural network models because of its outstanding accuracy of control and forecasting area. We design a new classification model based on ANFIS and evaluate it in terms of classification accuracy. We identified ANFIS-based classification model has higher classification accuracy compared to existing classification model, C5.0 decision tree model by comparing their experimental results.

  • PDF

Mobile Multicast Mechanism in IP based-IMT Network Platform (IP기반-IMT 네트워크에서의 모바일 멀티캐스트 기법)

  • Yoon Young-Muk;Park Soo-Hyun
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.3-7
    • /
    • 2005
  • The structure of $IP^2$(IP based-IMT Network Platform) as ubiquitous platform is three-layered model : Middleware including NCPF(Network Control Platform) and SSPF(Service Support Platform), IP-BB(IP-Backbone), Access network including Sensor network. A mobility management(MM) architecture in NCPF is proposed for $IP^2$. It manages routing information and location information separately. The existing method of multicast control in $IP^2$ is Remote Subscription. But Remote Subscription has problem that should be reconstructed whole Multicast tree when sender moves. To solve this problem, we propose a way to put Multicast Manager in NCPF.

  • PDF

A Scheduling Algorithm for Performance Enhancement of Science Data Center Network based on OpenFlow (오픈플로우 기반의 과학실험데이터센터 네트워크의 성능 향상을 위한 스케줄링 알고리즘)

  • Kong, Jong Uk;Min, Seok Hong;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1655-1665
    • /
    • 2017
  • Recently data centers are being constructed actively by many cloud service providers, enterprises, research institutes, etc. Generally, they are built on tree topology using ECMP data forwarding scheme for load balancing. In this paper, we examine data center network topologies like tree topology and fat-tree topology, and load balancing technologies like MLAG and ECMP. Then, we propose a scheduling algorithm to efficiently transmit particular files stored on the hosts in the data center to the destination node outside the data center, where fat-tree topology and OpenFlow protocol between infrastructure layer and control layer are used. We run performance analysis by numerical method, and compare the analysis results with those of ECMP. Through the performance comparison, we show the outperformance of the proposed algorithm in terms of throughput and file transfer completion time.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.