• Title/Summary/Keyword: false path

Search Result 33, Processing Time 0.028 seconds

Regional Path Re-selection Period Determination Method for the Energy Efficient Network Management in Sensor Networks applied SEF (통계적 여과 기법이 적용된 센서 네트워크에서 에너지 효율적인 네트워크 관리를 위한 영역별 경로 재설정 주기 결정 기법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.69-78
    • /
    • 2011
  • A large-scale sensor network usually operates in open and unattended environments, hence individual sensor node is vulnerable to various attacks. Therefore, malicious attackers can physically capture sensor nodes and inject false reports into the network easily through compromised nodes. These false reports are forwarded to the base station. The false report injection attack causes not only false alarms, but also the depletion of the restricted energy resources in a battery powered network. The statistical en-route filtering (SEF) mechanism was proposed to detect and drop false reports en route. In SEF, the choice of routing paths largely affect the energy consumption rate and the detecting power of the false report. To sustain the secure routing path, when and how to execute the path re-selection is greatly need by reason of the frequent network topology change and the nodes's limitations. In this paper, the regional path re-selection period determination method is proposed for efficient usage of the limited energy resource. A fuzzy logic system is exploited in order to dynamically determine the path re-selection period and compose the routing path. The simulation results show that up to 50% of the energy is saved by applying the proposed method.

Timing Analysis by Concurrent Event Propagation (병렬 사건전파 방식에 의한 타이밍 분석)

  • Han, Chang-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.10
    • /
    • pp.1344-1348
    • /
    • 1999
  • This paper proposes concurrent event propagation technique for timing analysis. The technique makes it possible to find several input vectors and sensitizable paths at the same time. The concurrent event propagation technique is based on the event driven simulation and the timing analysis technique with boolean equations. The technique propagates as many events as possible at the same time while preventing propagation of boolean terms which do not sensitize paths. Since events do not propagate through false paths, the longest path which successfully propagates events to one of the primary outputs is one of the longest sensitizable paths. The technique can speed up timing analysis by unifying path sensitization and maximum delay calculation.

  • PDF

Hierarchical Timing Analysis considering Global False Path

  • Sunik Heo;Kim, Juho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.235-237
    • /
    • 2002
  • As the integrated circuit technology gets developed, a circuit size of more than thousands of transistors becomes normal. A hierarchical design is unavoidable due to a huge circuit size. It is important how we can consider hierarchical structure in circuit delay analysis. In this paper we present an accurate method to analyze the delay of circuit with hierarchical structure. Adding the notion of global false path to the hierarchical timing analysis performs more accurate timing analysis.

  • PDF

The Secure Path Cycle Selection Method for Improving Energy Efficiency in Statistical En-route Filtering Based WSNs (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율을 향상시키기 위한 보안 경로 주기 선택 기법)

  • Nam, Su-Man;Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2011
  • Sensor nodes are easily exposed to malicious attackers by physical attacks. The attacker can generate various attacks using compromised nodes in a sensor network. The false report generating application layers injects the network by the compromised node. If a base station has the injected false report, a false alarm also occurs and unnecessary energy of the node is used. In order to defend the attack, a statistical en-route filtering method is proposed to filter the false report that goes to the base station as soon as possible. A path renewal method, which improves the method, is proposed to maintain a detection ability of the statistical en-route filtering method and to consume balanced energy of the node. In this paper, we proposed the secure path cycle method to consume effective energy for a path renewal. To select the secure path cycle, the base station determines through hop counts and the quantity of report transmission by an evaluation function. In addition, three methods, which are statistical en-route filter, path selection method, and path renewal method, are evaluated with our proposed method for efficient energy use. Therefore, the proposed method keeps the secure path and makes the efficiency of energy consumption high.

Spatio-Temporal Searcher Structure of Adaptive Array Antenna System for 3rd Generation, W-CDMA Systems (3세대 W-CDMA 시스템에 적용 가능한 적응형 어레이 안테나 시스템을 위한 공-시간 탐색기 구조)

  • 김정호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10A
    • /
    • pp.775-779
    • /
    • 2003
  • A spatio-temporal searcher structure for 3rd generation W-CDMA systems is proposed to enhance the detection capability of the multi-path searcher for the desired signal. This searcher employs the spatio-temporal signal structure to search for newly emerging multipath signals. The proposed multi-path searcher provides better detection capability andthus reduces the mean acquisition time. The detection and false alarm probabilities of new and conventional schemes are calculated and numerical examples of mean acquisition time are given thereafter.

The Effects of Emotional Labor and Moderating Effect of Social Support and Job Autonomy on Retailing services employee's (유통업 종사자의 감정노동 영향과 사회적 지원 및 직무자율성의 조절효과)

  • Ji, Guijeong;Park, Jiyoung;Kim, Chesoong
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.3
    • /
    • pp.247-263
    • /
    • 2015
  • This study seeks to identify effects derived from emotional labor in the distribution industry, and draw ways to systematically manage the employees by exploring effects of the emotion work on performance. For the purpose, literature reviews and empirical experiments were conducted to find out effects of emotional labor and false face acting on emotion work and organizational performance and effects of social support and job autonomy on the relationship between emotion work and organizational performance. To verify the hypothesis, we conducted a hierarchical regression analysis and structural equation model analysis using SPSS 20 and AMOS19. The result of the verification in this study is as follows: First, effects of emotional labor on burnout was found to be statistically significant, second, as for the path-coefficient for "emotional labor ${\rightarrow}$ emotion work" and "emotional labor ${\rightarrow}$ job satisfaction" was not statistically significant, while the path-coefficient for "emotional labor ${\rightarrow}$ service level" was found to be statistically significant. Third, effects of emotion work on job satisfaction was found statistically significant, fourth, emotion work on the service level was found statistically significant, fifth, effects of false face acting on emotion work was found statistically significant, sixth, effects of false face acting on burnout was statistically significant, seventh, moderating were found statistically significant and lastly, moderating effects of the relationship between emotion work from job autonomy and organization performance was not verified in job satisfaction, while emotion work, job autonomy, and interaction variable in service level were statistically significant.

Optimum Path Planning for Mechanical Manipulators (기계적 로보트팔을 위한 최적 경로 설계)

  • Kim, Tae-San;Bae, Jun-Kyung;Park, Chong-Kug
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.941-944
    • /
    • 1988
  • To assure a successful completion of an assigned task without interruption, the hand of mechnical manipulator often travels along a preplanned path. This paper presents a method of obtaining a time sechdule of velocities and acceleration along the path, under the constraints. Because of the involvement of a linear performance index and a largr number of nonlinear constraints, the "method of approximate programming (AMP)" is applied. To overcome the false solutions AMP is modified. To reduce the computing time, a "direct approximate programming algorithm (DAPA)" is developed.

  • PDF

Interleaved Hop-by-Hop Authentication in Wireless Sensor Network Using Fuzzy Logic to Defend against Denial of Service Attack (인터리브드 멀티홉 인증을 적용한 무선 센서네트워크에서 퍼지로직을 이용한 서비스 거부 공격에 대한 방어 기법)

  • Kim, Jong-Hyun;Cho, Tac-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.133-138
    • /
    • 2009
  • When sensor networks are deployed in open environments, an adversary may compromise some sensor nodes and use them to inject false sensing reports. False report attack can lead to not only false alarms but also the depletion of limited energy resources in battery powered networks. The Interleaved hop-by-hop authentication (IHA) scheme detects such false reports through interleaved authentication. In IHA, when a report is forwarded to the base station, all nodes on the path must spend energies on receiving, authenticating, and transmitting it. An dversary can spend energies in nodes by using the methods as a relaying attack which uses macro. The Adversary aim to drain the finite amount of energies in sensor nodes without sending false reports to BS, the result paralyzing sensor network. In this paper, we propose a countermeasure using fuzzy logic from the Denial of Service(DoS) attack and show an efficiency of energy through the simulataion result.

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

Collision-free tool orientation optimization in five-axis machining of bladed disk

  • Chen, Li;Xu, Ke;Tang, Kai
    • Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.197-205
    • /
    • 2015
  • Bladed disk (BLISK) is a vital part in jet engines with a complicated shape which is exclusively machined on a five-axis machine and requires high accuracy of machining. Poor quality of tool orientation (e.g., false tool positioning and unsmooth tool orientation transition) during the five-axis machining may cause collision and machine vibration, which will debase the machining quality and in the worst case sabotage the BLISK. This paper presents a reference plane based algorithm to generate a set of smoothly aligned tool orientations along a tool path. The proposed method guarantees that no collision would occur anywhere along the tool path, and the overall smoothness is globally optimized. A preliminary simulation verification of the proposed algorithm is conducted on a BLISK model and the tool orientation generated is found to be stable, smooth, and well-formed.