• Title/Summary/Keyword: home network infrastructure

Search Result 74, Processing Time 0.026 seconds

A Tree-Based Approach for the Internet Connectivity of Mobile Ad Hoc Networks

  • Oh, Ro-An
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.261-270
    • /
    • 2009
  • We propose a tree-based integration of infrastructure networks and MANETs (TUM) to efficiently extend the scope of mobile Internet protocol to mobile ad hoc networks and devise a tree-based routing protocol (TBRP) that is suitable for the TUM architecture. Infrastructure networks have a number of fixed Internet Gateways that connect two heterogeneous networks. Mobile nodes form a number of small trees named pMANETs, each of them growing from anchor node which can communicate directly with an Internet Gateway. A new node registers with foreign agent and home agent along the tree path without resorting to an inefficient flooding. Furthermore, the TBRP sets up a routing path efficiently by exploiting the tree information without relying on flooding. We show by resorting to simulation that our approach is competitive against the conventional AODV based approach.

Performance Comparison between Random CA Group Authentication and Home CA Authentication in Mobile Ad hoc Network (모바일 애드혹 네트워크에서 임의의 CA 그룹을 이용한 이동노드의 인증과 홈 CA를 이용한 인증방법의 성능 비교)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.40-48
    • /
    • 2008
  • Security of self organized mobile ad hoc networks is an important issue because administration information in the networks is managed by the constituent nodes. Especially authentication mechanism is necessary for trust setup between newly joining nodes and the network. The authentication models and protocols which are based on the wireline infrastructure could not be practical for mobile ad hoc network. Although public key algorithm-based method is widely used for authentication, it is not easy to be applied to mobile ad hoc networks because they do not have infrastructure such as centralized CA which is needed for certificate verification. In this paper, we consider the public key based random CA group method proposed in [1] to provide efficient authentication scheme to mobile ad hoc networks and analyze the performance of the method, which is then compared to the home CA method. From the analysis results, we see that the random CA method where the function of CA is distributed to some mobile nodes and the authentication information is propagated to randomly chosen CAs shows higher reliability and lower cost than home CA method.

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

Network-to-Network Router VPN Support System (네트워크 간 VPN 지원 유무선 공유기 시스템)

  • Kim, Chang-Su;Yang, Seung-Eui;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.636-638
    • /
    • 2015
  • Take advantage of smart devices is time and place constraints beyond the Office, home, school and a Korean or foreign travel was being keep doing it yourself anywhere. But in order to build the infrastructure of these network-to-network VPN-only expert support and expensive equipment is needed for some reason does not go as far as small-to medium-sized institutions, popularised. In this paper, H/W wired/wireless router a cheap, open platforms, open network-only embedded OS is based on OpenSSH, OpenVPN, OpenWRT platforms to implement network VPN iproute support system design and implementation.

  • PDF

Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

  • Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.95-102
    • /
    • 2023
  • The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

Implementation of a Testbed for the Use of Mobile IP in the Campus Network (Mobile IP의 학내망 사용을 위한 테스트베드 구현)

  • 이종민;김성우;김태석
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.64-72
    • /
    • 2004
  • Mobility changes the computing environment of computer users rapidly with the broad use of the Internet. In order to support mobility in the Internet infrastructure, IETF standardized Mobile IP With the use of Mobile IP, the Internet users can use the Internet freely without any change in the IP address configuration when they move from their home networks to foreign networks. In this paper, we implement a test bed for evaluation the performance of Mobile IP to use it in the campus network. By evaluating the effect of the use of Mobile IP on the network performance, we expect that the possible side effect of its direct use in the campus network will be reduced.

  • PDF

A Study on Design of Meter Data Management System for Operation of AMI (AMI 운영을 위한 MDMS 설계 연구)

  • Jung, Nam-Joon;Kim, Dong-Wook;Song, Jae-Ju;Chae, Chang-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.208-211
    • /
    • 2012
  • 전력시스템에서 MDMS(Meter Data Management System)는 HAN(Home Area Network)과 Smart Meter, SUN(Smart energy Utility Network)와 같은 AMI(Advanced Metering Infrastructure) 기반 환경에서 수많은 전력 또는 수도 가스 사용량과 같은 데이터를 수집, 취득하고, 이들 데이터를 처리, 가공, 분석하여 가치 있는 정보로 변환시켜, 요금서비스 및 다양한 부가서비스 창출에 활용되는 소프트웨어 인프라이다. 최근 MDMS 개발은 기능의 중요성 뿐만 아니라 다른 응용 시스템들과의 상호 운용성을 고려하여 개발하는 요구 기능을 가진다. 본 논문에서는 스마트그리드 환경에 적합한 AMI의 전력처리시스템(MDMS) 개발을 위한 설계 방안을 기술하였다.

The Role of Residents for the Sustainable Ecopolis and Ecovillage (지속가능한 생태도시 및 생태마을에서의 거주자의 역할)

  • 곽인숙
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.6
    • /
    • pp.109-122
    • /
    • 2001
  • This study was performed to identify the roles of residents for the environmentally sound and sustainable development, taco-polis(kologisches Bauen), eco-village and Symbiotic Housing. These buildings will achieve energy efficiency through design strategies such as passive solar heating system, natural cooling and day lighting. Their infrastructure will feature parking on the periphery, extensive pedestrian paths, outdoor ground lights that preserve stellar visibility, and environmentally sensitive technologies such as low writer use fixtures. And they will restore biodiversity while protecting the wildlife, wetlands, forests, soil, air and water. Their houses wile be designed to support home-based occupations, offering high-speed Internet access and other options to promote a localized, sustainable economy. To support and encourage the evolution of sustainable settlements, it is necessary to prepare constructing the physical facilities and the social functions relating with residents. The roles of residents are important to provide a high Quality lifestyle and to integrate a supportive social environment with a low-impact way of life. This study concluded the four main roles of residents for the sustainable of Eco-polis and Ecovillage. 1. Residents assist transition towards a sustainable society as eco-conscious consumers in the planning stage. 2. Residents live in a ecological way for the sustainable ecovillage. 3. Residents exchange information and education for increasing the community glue as a communication network. 4. Residents support and transmit their cultural vitality and tradition for the next generation. So, users are expected to encourage resident's participation in the planning, design, ongoing management and maintenance of the sustainable ecovillage.

  • PDF

A Study on the Implementation of a Portable Healthcare System using Zigbee (Zigbee를 이용한 휴대형 헬스케어 시스템 구현에 관한 연구)

  • Kang, Sung-In;Kim, Gwan-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1793-1798
    • /
    • 2007
  • Recently there are some trends to construct smart home system infrastructure depending upon the development of Information and Communication Technology. Also requirements of the Ubiquitous Healthcare Systems at home which can monitor the status of health continuously are increased rapidly comparing with hospitals. Healthcare service can be divided into two categories. The first one is Alarm Service that can be used for the emergency status and the other one is Remote Support Service which can monitor the patient including home environments and give those diagnosis information to medical office or to his family. Generally wired networks and fixed healthcare measuring system have some limits to transmit reliable realtime based information for both categories described above comparing with portable monitoring system. Getting over the inefficiency we will design and implement portable healthcare system under the wireless Zigbee network environments.

A Study analysis and solutions to the problems related to use of IP phones in ALL IP environment and IMS server products (All IP 환경에서 상용화 IP Phones 과 IMS 서버 제품 군에 대한 문제점 분석 및 해결 방안연구)

  • Chung, In-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.581-584
    • /
    • 2010
  • Based on superspeed nation-wide communication infrastructure, high speed and high quality ALL IP communication network is created. It is a point in time where such infrastructure allows residential and commercial phones to be ported from PSTN to IP network. The problem experienced on IP phones in ALL IP environment and IMS server products are not easily approachable and dealt with. Therefore, this paper discusses approaches used in analyzing and resolving problems before they actually occur. This paper first discusses briefly the IP phones used in IMS network and their related problems. Then next topic deals with characteristics of these problems and current status. Last but not least, the causes of the problems are analyzed and solutions to these problems are introduced. Also discussed are solutions to possible future issues followed by conclusion.