• Title/Summary/Keyword: misbehavior

Search Result 43, Processing Time 0.024 seconds

Inter-Process Correlation Model based Hybrid Framework for Fault Diagnosis in Wireless Sensor Networks

  • Zafar, Amna;Akbar, Ali Hammad;Akram, Beenish Ayesha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.536-564
    • /
    • 2019
  • Soft faults are inherent in wireless sensor networks (WSNs) due to external and internal errors. The failure of processes in a protocol stack are caused by errors on various layers. In this work, impact of errors and channel misbehavior on process execution is investigated to provide an error classification mechanism. Considering implementation of WSN protocol stack, inter-process correlations of stacked and peer layer processes are modeled. The proposed model is realized through local and global decision trees for fault diagnosis. A hybrid framework is proposed to implement local decision tree on sensor nodes and global decision tree on diagnostic cluster head. Local decision tree is employed to diagnose critical failures due to errors in stacked processes at node level. Global decision tree, diagnoses critical failures due to errors in peer layer processes at network level. The proposed model has been analyzed using fault tree analysis. The framework implementation has been done in Castalia. Simulation results validate the inter-process correlation model-based fault diagnosis. The hybrid framework distributes processing load on sensor nodes and diagnostic cluster head in a decentralized way, reducing communication overhead.

An Efficient Detection and Management Technique of Misbehavior nodes in Ad-hoc Networks (Ad-hoc 네트워크에서의 효율적인 비정상행위 노드 탐지 및 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.71-80
    • /
    • 2009
  • Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.

The way of interpreting plays in which anxiety and class problems emerged (<두뇌수술(頭腦手術)>에 나타난 불안(不安) 정동(情動)과 계급(階級)의 함의(含意))

  • KIM, UJIN
    • (The) Research of the performance art and culture
    • /
    • no.42
    • /
    • pp.5-22
    • /
    • 2021
  • This work shows the possibility of expansion of existing interpretations through anxiety. They were continuing their previous misbehavior in the name of science. Such a phenomenon is due to the selection of their desires. So they were appearing in violent forms. Audiences who see the scene will be able to choose the opposite realization or action. It can shake the audience mentally. Therefore, this performance represents the anxiety of this period and motivates the audience to take a new action.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

SVC-based Adaptive Video Streaming over Content-Centric Networking

  • Lee, Junghwan;Hwang, Jaehyun;Choi, Nakjung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2430-2447
    • /
    • 2013
  • In recent years, HTTP adaptive streaming (HAS) has attracted considerable attention as the state-of-the-art technology for video transport. HAS dynamically adjusts the quality of video streaming according to the network bandwidth and device capability of users. Content-Centric Networking (CCN) has also emerged as a future Internet architecture, which is a novel communication paradigm that integrates content delivery as a native network primitive. These trends have led to the new research issue of harmonizing HAS with the in-network caching provided by CCN routers. Previous research has shown that the performance of HAS can be improved by using the H.264/SVC(scalable video codec) in the in-network caching environments. However, the previous study did not address the misbehavior that causes video freeze when overestimating the available network bandwidth, which is attributable to the high cache hit rate. Thus, we propose a new SVC-based adaptation algorithm that utilizes a drop timer. Our approach aims to stop the downloading of additional enhancement layers that are not cached in the local CCN routers in a timely manner, thereby preventing excessive consumption of the video buffer. We implemented our algorithm in the SVC-HAS client and deployed a testbed that could run Smooth-Streaming, which is one of the most popular HAS solutions, over CCNx, which is the reference implementation of CCN. Our experimental results showed that the proposed scheme (SLA) could avoid video freeze in an effective manner, but without reducing the high hit rate on the CCN routers or affecting the high video quality on the SVC-HAS client.

Blackconsumer Tendency upon Demographic Characteristics and the Effect of Blackconsumer Tendency on Retaliation Intention and Self-justification (인구통계적 특성에 따른 블랙컨슈머 성향과 성향이 보복의도와 자기정당성에 미치는 영향)

  • Shin, Bong-Sup
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.379-388
    • /
    • 2015
  • Due to misbehavior of blackconsumer, companies bear higher financial burden and innocent consumers are also damaged. This study identified the characteristics of blackconsumer and their differences by demographics. Also this study scrutinizes the effects of blackconsumer characteristics on retaliation intention and self-justification. The analyses results identified three factors composing blackconsumer, namely deliberation, recidivism and persistency. Ages of 50s and 40s showed higher in persistency and 40s and 30s are higher in recidivism. Also the results showed that deliberation has a significant influence on self-justification where as recidivism and persistency have on both retaliation intention and self-justification.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

A Study on Health / Illness Concepts of Preschoolers (학령전기 아동의 건강/질병 개념에 관한 연구)

  • 이은주
    • Journal of Korean Academy of Nursing
    • /
    • v.22 no.2
    • /
    • pp.143-156
    • /
    • 1992
  • This descriptive study explored the health and illness concepts of preschoolers to provide understanding on which to build research. The subjects were convenience sample three to six year of age attending one art institute in Cheju city. Data were collected through semistructured interviews by author, Children were asked to draw two figures, one healthy and one ill persons. The drawings were not analysed to grasp the meaning as in a projective technique, but only to relate to their response. Data were coded and categorized by content analysis. The results of this study are summarized as follows : 1) Three year olds responded with some unrelated answers but well to questions related to their experiences of illness ; older participants answered questions related health and illness concepts more easily. Generally the levels of subjects' responses did not differ according to age and sex. 2) Preschoolers' answers about the cause, treatment and prevention of illness, and the meaning and promotion of health were coded and then classificated to 9 categories, (food, obedience to authoritys physical function, presence or absence of illness or symptoms, hygiene. treatment, traumatic injury, rest and germs). Food and obeidence to authority categories were most frequent responses the food category was associated with obeidence to authority because it seemed that the children follow the orders of their parents or other authority figures to eat or not to eat something This result was compatible with that of previous studies that preschoolers perceived illness as possible punishment for misbehavior. Participants except for one four year old boy did not suggest that germs cause illness. The children perceived themselves and their families as healthy even though they had symptoms of illness. 3) Preschoolers' health and illness concepts were. influenced by their experiences and related to their development that rules derived from authority and if not complied with, will bring punishment. These oonceptualizations may be the disparity that they perceived themselves and their families as healthy even though they were ill. A previous study by Perrin and Gerrity suggested that the level of children's illness concepts correlated with that of their physical causality and was lower than it. But the levels of health and illness concepts in this sample higher than those of the physical causality.

  • PDF

Development of Autonomous Combine Using DGPS and Machine Vision (DGPS와 기계시각을 이용한 자율주행 콤바인의 개발)

  • Cho, S. I.;Park, Y. S.;Choi, C. H.;Hwang, H.;Kim, M. L.
    • Journal of Biosystems Engineering
    • /
    • v.26 no.1
    • /
    • pp.29-38
    • /
    • 2001
  • A navigation system was developed for autonomous guidance of a combine. It consisted of a DGPS, a machine vision system, a gyro sensor and an ultrasonic sensor. For an autonomous operation of the combine, target points were determined at first. Secondly, heading angle and offset were calculated by comparing current positions obtained from the DGPS with the target points. Thirdly, the fuzzy controller decided steering angle by the fuzzy inference that took 3 inputs of heading angle, offset and distance to the bank around the rice field. Finally, the hydraulic system was actuated for the combine steering. In the case of the misbehavior of the DGPS, the machine vision system found the desired travel path. In this way, the combine traveled straight paths to the traget point and then turned to the next target point. The gyro sensor was used to check the turning angle. The autonomous combine traveled within 31.11cm deviation(RMS) on the straight paths and harvested up to 96% of the whole rice field. The field experiments proved a possibility of autonomous harvesting. Improvement of the DGPS accuracy should be studied further by compensation variations of combines attitude due to unevenness of the rice field.

  • PDF

A Fair MAC Algorithm under Capture Effect in IEEE 802.11 DCF -based WLANs (IEEE 802.11 무선랜에서 캡쳐 효과를 고려한 Fair MAC 알고리즘)

  • Jeong, Ji-Woong;Choi, Sun-Woong;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.386-395
    • /
    • 2010
  • Widespread deployment of infrastructure WLANs has made Wi-Fi an integral part of today's Internet access technology. Despite its crucial role in affecting end-to-end performance, past research has focused on MAC protocol enhancement, analysis, and simulation-based performance evaluation without sufficiently considering a misbehavior stemming from capture effect. It is well known that the capture effect occurs frequently in wireless environment and incurs throughput unfairness between nodes. In this paper, we propose a novel Fair MAC algorithm which achieves fairness even under physically unfair environment. While satisfying the fairness, the proposed algorithm maximizes the system throughput. Extensive simulation results show that the proposed Fair MAC algorithm substantially improves fairness without throughput reduction.