• Title/Summary/Keyword: network node

Search Result 4,033, Processing Time 0.028 seconds

Network Attacks Visualization using a Port Role in Network Sessions (트래픽 세션의 포트 역할을 이용한 네트워크 공격 시각화)

  • Chang, Beomhwan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.47-60
    • /
    • 2015
  • In this paper, we propose a simple and useful method using a port role to visualize the network attacks. The port role defines the behavior of the port from the source and destination port number of network session. Based on the port role, the port provides the brief security features of each node as an attacker, a victim, a server, and a normal host. We have automatically classified and identified the type of node based on the port role and security features. We detected and visualized the network attacks using these features of the node by the port role. In addition, we are intended to solve the problems with existing visualization technologies which are the reflection problem caused an undirected network session and the problem caused decreasing of distinct appearance when occurs a large amount of the sessions. The proposed method monitors anomalies occurring in an entire network and displays detailed information of the attacker, victim, server, and hosts. In addition, by providing a categorized analysis of network attacks, this method can more precisely detect and distinguish them from normal sessions.

A Study of Node Authentication for Home Networking (홈 네트워크 환경에서 보안성을 가진 노드 인식기술)

  • Lee, Jeong-Yoon;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.225-228
    • /
    • 2005
  • In this paper, we put a focus with a node cognition section of home gateway for information equipments to operate in a home network environment organically individually. We used an IPv6 protocols on a home network node connection on IP base. A node used a certificate published in a registered process by a home gateway for security. We designed secure node cognition structure to have had strong identification.

  • PDF

Development of Smart Sensor/Actuator Node using CAN (CAN을 이용한 Smart Sensor/Actuator Node 개발)

  • Lee, Won-Moo;Jung, Joon-Hong;Yoo, Sang-Jin;Cho, Yong-Suk;Park, Ki-Heon
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2132-2134
    • /
    • 2002
  • 최근 분산제어시스템 설계시 CAN(Controller Area Network)을 적용하는 연구가 활발히 진행되고 있다. 본 논문에서는 분산제어에 필요한 각종 입출력 데이터를 CAN버스 상에서 송수신할 수 있는 Smart Sensor/Actuator Node를 직접 개발하고, 이를 이용한 실험용 Network를 구축하였다. Sensor Node에서 획득된 외부의 Analog신호를 CAN Bus를 통해 전송한 후, 원격지의 Actuator Node에서 출력하는 Data 송수신 실험을 통해서 설계된 Network와 각 Node의 효율성을 입증하였다.

  • PDF

Collective Betweenness Centrality in Networks

  • Gombojav, Gantulga;Purevsuren, Dalaijargal;Sengee, Nyamlkhagva
    • Journal of Multimedia Information System
    • /
    • v.9 no.2
    • /
    • pp.121-126
    • /
    • 2022
  • The shortest path betweenness value of a node quantifies the amount of information passing through the node when all the pairs of nodes in the network exchange information in full capacity measured by the number of the shortest paths between the pairs assuming that the information travels in the shortest paths. It is calculated as the cumulative of the fractions of the number of shortest paths between the node pairs over how many of them actually pass through the node of interest. It's possible for a node to have zero or underrated betweenness value while sitting just next to the giant flow of information. These nodes may have a significant influence on the network when the normal flow of information is disrupted. We propose a betweenness centrality measure called collective betweenness that takes into account the surroundings of a node. We will compare our measure with other centrality metrics and show some applications of it.

Power Flow Algorithm for Weakly Meshed Distribution Network with Distributed Generation Based on Loop-analysis in Different Load Models

  • Su, Hongsheng;Zhang, Zezhong
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.608-619
    • /
    • 2018
  • As distributed generation (DG) is connected to grid, there is new node-type occurring in distribution network. An efficient algorithm is proposed in this paper to calculate power flow for weakly meshed distribution network with DGs in different load models. The algorithm respectively establishes mathematical models focusing on the wind power, photovoltaic cell, fuel cell, and gas turbine, wherein the different DGs are respectively equivalent to PQ, PI, PQ (V) and PV node-type. When dealing with PV node, the algorithm adopts reactive power compensation device to correct power, and the reactive power allocation principle is proposed to determine reactive power initial value to improve convergence of the algorithm. In addition, when dealing with the weakly meshed network, the proposed algorithm, which builds path matrix based on loop-analysis and establishes incident matrix of node voltage and injection current, possesses good convergence and strong ability to process the loops. The simulation results in IEEE33 and PG&G69 node distribution networks show that with increase of the number of loops, the algorithm's iteration times will decrease, and its convergence performance is stronger. Clearly, it can be effectively used to solve the problem of power flow calculation for weakly meshed distribution network containing different DGs.

Routing Protocol for Wireless Sensor Networks Based on Virtual Force Disturbing Mobile Sink Node

  • Yao, Yindi;Xie, Dangyuan;Wang, Chen;Li, Ying;Li, Yangli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1187-1208
    • /
    • 2022
  • One of the main goals of wireless sensor networks (WSNs) is to utilize the energy of sensor nodes effectively and maximize the network lifetime. Thus, this paper proposed a routing protocol for WSNs based on virtual force disturbing mobile Sink node (VFMSR). According to the number of sensor nodes in the cluster, the average energy and the centroid factor of the cluster, a new cluster head (CH) election fitness function was designed. At the same time, a hexagonal fixed-point moving trajectory model with the best radius was constructed, and the virtual force was introduced to interfere with it, so as to avoid the frequent propagation of sink node position information, and reduce the energy consumption of CH. Combined with the improved ant colony algorithm (ACA), the shortest transmission path to Sink node was constructed to reduce the energy consumption of long-distance data transmission of CHs. The simulation results showed that, compared with LEACH, EIP-LEACH, ANT-LEACH and MECA protocols, VFMSR protocol was superior to the existing routing protocols in terms of network energy consumption and network lifetime, and compared with LEACH protocol, the network lifetime was increased by more than three times.

A Balanced Energy Consumption Strategy using a Smart Base Station in Wireless Sensor Networks (무선 센서 네트워크에서 스마트기지국을 이용한 균형된 에너지소비 방안)

  • Park, Sun-Young
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.4
    • /
    • pp.458-465
    • /
    • 2014
  • In this paper, we propose a strategy to distribute the energy consumption over the network. The proposed strategy is based on geographic routing. We use a smart base station that maintains the residual energy and location information of sensor nodes and selects a head node and an anchor node using this information. A head node gathers and aggregates data from the sensor nodes in a target region that interests the user. An anchor node then transmits the data that was forwarded from the head node back to the smart base station. The smart base station extends network lifetime by selecting an optimal head node and an optimal anchor node. We simulate the proposed protocol and compare it with the LEACH protocol in terms of energy consumption, the number of dead nodes, and a distribution map of dead node locations.

Design of Stochastic Movement Model Considering Sensor Node Reliability and Energy Efficiency

  • Cho, Do-Hyeoun;Yeol, Yun Dai;Hwang, Chi-Gon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.156-162
    • /
    • 2020
  • Wireless Sensor Network (WSN) field is mainly studied to monitor and characterize large-scale physical environments to track various environmental or physical conditions, such as temperature, pressure, wind speed and humidity. WSN can be used in various applications such as wild surveillance, military target tracking and monitoring, dangerous environmental exploration and natural disaster relief. We design probabilistic mobile models that apply to mobile ad hoc network mobile environments. A probabilistic shift model proposed by dividing the number of moving nodes and the distance of travel into two categories to express node movement characteristics. The proposed model of movement through simulation was compared with the existing random movement model, ensuring that the width and variation rate of the first node node node node (FND) was stable regardless of the node movement rate. In addition, when the proposed mobile model is applied to the routing protocol, the superiority of network life can be verified from measured FND values. We overcame the limitations of the existing random movement model, showing excellent characteristics in terms of energy efficiency and stable in terms of changes in node movement.

Synchronization of a Complex Dynamical Network with Free Coupling Matrix (자유로운 연결 구조를 갖는 복잡 동적망의 동기화)

  • Lee, Tae-Hee;Park, Ju-H.;Kwon, Oh-Min;Lee, Sang-Moon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.8
    • /
    • pp.1586-1591
    • /
    • 2011
  • This paper considers synchronization problem of a complex dynamical network. For the problem, the virtual target node is chosen as one of nodes in the complex network and only one connection is needed between an isolate target node and virtual target node not any more connections. Moreover, our synchronization scheme does not need additional conditions and information of coupling matrix comparing with existing works. Based on Lyapunov stability theory, a design criterion for a novel adaptive feedback controller for the synchronization between the isolate target node and another nodes of the complex network is proposed. Finally, the proposed method is applied to a numerical example in order to show the effectiveness of our results.

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF