• Title/Summary/Keyword: agent node

Search Result 223, Processing Time 0.023 seconds

Data Dissemination Protocol based on Home Agent and Access Node for Mobile Sink in Sensor Network (센서 네트워크에서 홈에이젼트와 액세스 노드에 기반한 모바일 싱크를 위한 데이터 전송 기법)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.383-390
    • /
    • 2008
  • The mobile sink is most suitable to guarantee the real time processing to events in ubiquitous environment. However it brings many challenges to wireless sensor networks. In particular, the question of how to transfer the collected data to the mobile sink is an important topic in the aspect of effective management of wireless sensor nodes. In this paper, a new data dissemination model is proposed. Since this method uses the home agent and the access node concepts, it provides reliable and efficient data delivery to mobile sink with minimum overhead. In this proposed method, the information of the mobile sink which is constantly moving is informed only to the home agent node and the access node, instead of all sensor nodes. Thus, the collected data from sensor nodes are transferred to the fixed home agent and it sends these data to the mobile sink. Since the confliction phenomenon between data packets in wireless networks could be reduced, the success ratio of data arriving in the mobile sink is highly enhanced. In our experiments, the proposed method reduces the number of broadcast packets so that it saves the amount of energy consumed for transmitting and receiving the data packets. This effect contributes to prolong the lifetime of the wireless sensor networks operated by batteries.

MIPv6 Binding Update Protocol Secure Against both Redirect and DoS Attacks (Redirect 공격과 DoS 공격에 안전한 MIPv6 바인딩 업데이트 프로토콜)

  • Kang Hyun-Sun;Park Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.115-124
    • /
    • 2005
  • We propose a new binding update(BU) protocol between mobile node(CN) and correspondent node(CN) for the purpose of preventing redirect attacks and DoS attacks observed from the existing BU protocols and enhancing the efficiency of the BU protocol. Home agent plays a role of both authentication server validating BU message and session key distribution center for MN and CN. Also propose the stateless Diffie-Hellman key agreement based on cryptographically generated address (CGA). Suity of our proposed Protocol is analyzed and compared with other protocols. The proposed protocol is more efficient than previous schemes in terms of the number of message flows and computation overhead and is secure against both redirect and DoS attacks.

Sentinel lymph node mapping using tri-modal human serum albumin conjugated with visible dye, near infrared fluorescent dye and radioisotope

  • Kang, Se Hun;Kim, Seo-il;Jung, So-Youn;Lee, Seeyoun;Kim, Seok Won;Kim, Seok-ki
    • Journal of Radiopharmaceuticals and Molecular Probes
    • /
    • v.1 no.1
    • /
    • pp.62-73
    • /
    • 2015
  • We developed an evans blue-indocyanine green-$^{99m}Tc$-human serum albumin conjugate for sentinel lymph node mapping and we describe its unique potential usage for clinical implications. This conjugate has combined the strengths of visible blue dye, near-infrared fluorescence and radioisotope into one single conjugate without any additional weakness/disadvantage. All the components of evans blue-indocyanine green-$^{99m}Tc$-human serum albumin are safe and of low cost, and they have already been clinically used. This conjugate was stable in the serum, it showed a long retention time in the lymphatic system and the lymph nodes showed a much higher signal-to-noise ratio after the conjugate was injected intradermally into the paw of mice. Both the single-photon emission computed tomography and near-infrared fluorescent images of the mice were successfully obtained at the same time as the excised sentinel lymph nodes showed blue color. The visual color, near-infrared fluorescence and gamma ray from this agent could be complementary for each other in all the steps of sentinel lymph node sampling: exploring and planning sentinel lymph node before excision with visualization of the exact sentinel lymph node location during an operation. Therefore, the triple modal agent will possibly be very ideal for sentinel lymph node mapping because of the high signal-to-noise ratio for non-invasive imaging and its complementary multimodal nature, easy preparation and safety. It is promising for clinical applications and it may have great advantages over the traditional single modal methods.

Active Rule Manager for the Mobile Agent Middleware System

  • Lee, Yon-Sik;Cheon, Eun-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.99-105
    • /
    • 2016
  • The active rule system is a key element of the rule-based mobile agent middleware system for activeness and autonomy of the sensor network. The rule manager, which is the main components of active rule based mobile agent framework and active rule system, performs the control and management of the rule-related processes. In this paper, we design and implement the roles and functions of the rule manager in detail. The proposed rule manager plays an important role in the sensor network environment. The sensor data server loads the active rule on the mobile agent by the rule manager according to the situations, and the mobile agent migrates to the destination node and performs the designated action. This active rule-based mobile agent middleware system presents the usefulness for the various sensor network applications. Through the rule execution experiment using the rule-based mobile agent, we show the adaptability and applicability of rule-based mobile agent middleware system to the dynamic environmental changes in sensor networks.

Design of Parallel Migration Method of Mobile Agents Using an Object Replication (객체 복제를 통한 이동 에이전트의 병렬 이주 방식 설계)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.351-360
    • /
    • 2004
  • Most mobile agents are migrated to many mobile agent systems by the sequential node migration method. However. in this case, if some problems such as host's fault or obstacle etc. happened, mobile agent falls infinity walt or orphan states. Therefore, it is difficult to get an expectation effect as use of other distribution technologies because the required time for networking between nodes increases. And so, many researches have been performed to solve this problems. However, most of methods decide node migration based on passive routing table or detour hosts which have some problems. Actually, the researches for reducing the total required time for networking are insufficient yet. In this paper, to reduce the required time for networking of mobile agent we design an active routing table based on the information of implemented objects which are registered in the meta-table of naming agent. And also, for user's keyword, we propose an replication model that replicates many agent object according to the information and number of object references corresponding to meta-table. Replicated objects are migrated to mobile agent systems in parallel and it provides minimized required time for networking.

USN metadata management agent using IoT-based EMRA

  • Lee, Jong-Sub
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.96-103
    • /
    • 2022
  • In this paper, we define EMRA-based USN metadata to describe sensor device, sensor node, and sensor network information at the application level. And the proposed method for effectively storing and retrieving USN metadata based on EMRA uses agent technology. As the sensor metadata proposed in this paper is based on SensorML, interoperability can be maintained in the USN environment, and the metadata management system can be directly utilized for metadata management in USN middleware or applications.

THE CLINICOPATHOLOGICAL STUDY ON THE RELATION OF MICROVESSEL DENSITY AND AGGRESSIVENESS IN ORAL SQUAMOUS CELL CARCINOMA (구강편평세포암종의 미세혈관 밀도와 악성도간 상관관계에 관한 임상병리학적 연구)

  • Lee, Gi-Cheol;Myoung, Hoon;Lim, Sung-Sam;Kim, Myung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.28 no.2
    • /
    • pp.155-160
    • /
    • 2002
  • Oral squamous cell carcinoma (OSCC), the most common head and neck cancer, shows poor prognosis as a result of frequent local invasion and lymph node metastasis that is mediated by multiple proteolytic enzymes and angiogenesis. In recent reports, angiogenesis is known to play an important role in tumor invasion and metastasis. The purpose of this study was to determine the role of angiogenesis in OSCCs, particularly with respect to the invasive and the metastatic potential. The microvessel density (CD31) in 34 human OSCC cases were investigated by immunohistochemistry, and reviewed with respect to the invasiveness and the presence of lymph node metastasis and following results were obtained. The blood vessel density $(28.8{\pm}7.9)$ in the strong invasive cases were significantly higher than those $(23.3{\pm}6.9)$ in the weak invasive cases. (p<0.05) In the 14 cases with lymph node metastasis, the average blood vessel density was $28.5{\pm}9.6$. On the other hand, in the 20 cases without lymph node metastasis, the blood vessel density was $25.2{\pm}6.4$. The blood vessel density was not statistically related to lymph node metastasis. (p>0.05) These results suggest that angiogenesis may be related to the local invasion of OSCC and further research will be needed to investigate the possibility that antiangiogenic agent can be used as an anticancer agent for OSCC.

Anonymity for Low-Power Sensor Node in Ubiquitous Network (유비쿼터스 네트워크에서 저 전력 센서노드의 익명성)

  • Kim, Dong-Myung;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.177-184
    • /
    • 2006
  • The sensors in a ubiquitous network are limited because of the low power and ultra light weight, so many studies have revolved around the sensor. This study improves the process of the registration and authorization and suggests a way to minimize discloser of privacy by using an alias. We introduce RA(Relay Agent) for the restrict function of sensor node, and improve anonymity for private information of each sensor node by assigning alias from SM(Service Manager) in procedure of registration and authentication. The privacy of sensor node is secure in procedure of registration, authentication, and communication between nodes. We could improve the level of security with the only partial increment of computation power of RA and SM without an increase in the amount of sensor nodes.

  • PDF

A Study on the Mobile IP Routing Optimization through the MRT Agent (MRT 에이전트를 통한 Mobile IP 라우팅 최적화에 관한 연구)

  • 김보균;홍충선;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.728-735
    • /
    • 2003
  • It is a mainly issue that provide mobility smoothly in Mobile IP networks. The IP mobility support being standardized in the IETF utilized tunneling of IP packets from a home agent to foreign agent and utilized reverse tunneling of IP packets from foreign agent to home agent. In this paper, We propose that solve the triangular routing problem in IP mobility and that lessen the messages about IETF routing optimization. Through the Mobile Routing Table on the edge router, agent process the message instead of a end node when handoff occur and that lessen the routing path length by sending directly from FA to to Correspond Node's router. This action lessen the message occurrence frequency and the packet drop. We compare the standard IP, Routing Optimization of Mobile IP, Wu's method and the proposed algorithm. Finally, the simulation results are presented.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.