• 제목/요약/키워드: network-centric

검색결과 443건 처리시간 0.029초

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권5호
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

전술데이터링크 네트워크에서의 노드 이탈 관리 기법 (A Node Management Scheme in Tactical Data Link Network)

  • 안광호;이주형;조준영;오혁준
    • 한국통신학회논문지
    • /
    • 제36권4B호
    • /
    • pp.386-390
    • /
    • 2011
  • 현대전은 플랫폼 기반의 전장(PCW: Platform Centric Warfare)에서 네트워크 기반의 전장(NCW: Network Centric Warfare)으로 변화하고 있다. 네트워크 기반의 전장으로 변화하면서 네트워크 운용 및 관리의 중요성이 높아지고 있다. 본 논문은 군사용 우선 네트워크에서의 노드 이탈 관리 기법을 제안한다. 군사용 무선 네트워크는 노드의 네트워크 가입, 탈퇴가 비교적 자유로운 특징을 갖는다. 이러한 특징은 네트워크 가용성을 저해하는 요인이 될 수 있다. 일반 노드의 네트워크 이탈 상황에서 발생하는 가용성 저해요인을 파악하고, 이에 대해 RSSI(Received Signal Strength Indication)를 이용한 네트워크 탈퇴 예측 방법을 이용한 기법을 제시한다. 마지막으로 모의실험을 통해 측정 RSSI 신호 시간 간격에 따른 예측 성공률을 확인한다.

Strengthening Authentication Through Content Centric Networking

  • Kim, Sung-Jin;Park, Jae-Kyung
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.75-82
    • /
    • 2017
  • While the internet has evolved in terms of information sharing and efficiency, it is still prone to security attacks and remains vulnerable even when equipped with a security mechanism. Repeated patching against hacks involves excessive wear of system equipment and high costs. Methods of improving network security include the introduction of security equipment and network partitions, but they have not been fully effective. A fundamental solution is the Operation Content Network (OCN), which enables the strengthening of authentication. In this paper, Instead of following the existing TCP/IP system, OCN establishes an immunity-based security system through content-centric communications. Data transmission occurs over a Content Centric Network (CCN), which is provided with a protocol verified by the CCNx group. Areas protected by OCN rely only on CCN for communication without using any IP. As such, it defends the system against unknown attacks, including zero-day attacks.

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks

  • Han, Longzhe;Nguyen, Dinh Han;Kang, Seung-Seok;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.3775-3788
    • /
    • 2014
  • With the increasing number of the wireless and mobile networks, the way that people use the Internet has changed substantively. Wireless multimedia services, such as wireless video streaming, mobile video game, and mobile voice over IP, will become the main applications of the future wireless Internet. To accommodate the growing volume of wireless data traffic and multimedia services, cognitive radio (CR) and Information-Centric Network (ICN) have been proposed to maximize the utilization of wireless spectrum and improve the network performance. Although CR and ICN have high potential significance for the future wireless Internet, few studies have been conducted on collaborative operations of CR and ICN. Due to the lack of infrastructure support in multi-hop ad hoc CR networks, the problem is more challenging for video streaming services. In this paper, we propose a Cross-layer Video Streaming Mechanism (CLISM) for Cognitive Radio Ad Hoc Information Centric Networks (CRAH-ICNs). The CLISM included two distributed schemes which are designed for the forwarding nodes and receiving nodes in CRAH-ICNs. With the cross-layer approach, the CLISM is able to self-adapt the variation of the link conditions without the central network controller. Experimental results demonstrate that the proposed CLISM efficiently adjust video transmission policy under various network conditions.

Ant Colony Optimization and Data Centric Routing Approach for Sensor Networks

  • 임슈윤;이은유;박수현;이훈재
    • 한국정보통신학회논문지
    • /
    • 제11권2호
    • /
    • pp.410-415
    • /
    • 2007
  • 최근 센서 네트워크 기술 발전은 효과적인 라우팅 방법 개발로 부터 시작되었으며, 라우팅 프로토콜이 응용프로 그램이나 네트워크 아키텍처에 의존적이라는 차이 때문에 라우팅 프로토콜은 많은 주의를 요한다. 빠른 환경 변화와 능동적인 네트워크 구조의 특징은 효과적인 라우팅과 에너지 소비에 매우 치명적이다. 센서 네트워크는 에너지 소비라는 부분에서 전통적인 네트워크와는 다르며, 따라서 데이터 중심적인 기술들은 효율적인 에너지 보급을 위하여 라우팅을 실행하곤 한다. 본 논문에서는 네트워크 라우팅에서 ant colony 최적화 기술과 전송 데이터 구성을 위한 데이터 집중 라우팅 능력 등 두 가지 이점을 이용하여 효율적인 자율센서 네트워크 구축방법을 제시한다.

유비쿼터스 환경에서의 NCW 정보보호 대책 (A Study on the Network Centric Warfare Information Security for Ubiquitous Network Computing)

  • 권문택
    • 융합보안논문지
    • /
    • 제10권3호
    • /
    • pp.15-22
    • /
    • 2010
  • 본 연구는 유비쿼터스 환경에서 네트워크 중심전(NCW)을 원활하게 실시하기 위해 필요한 정보보호 대책을 제시하기 위한 것이다. 대책을 도출하기 위해 우선 유비쿼터스 환경에서 NCW가 구현 되었을 때 예상되는 전투양상을 전장기능별로 조명해보고, 유비쿼터스 환경에서 일어날 수 있는 정보보호 위협의 특징을 도출하였다. 이러한 특징을 바탕으로 위협을 해결하기 위한 국방 정보보호 대응 방안을 제시하였다. 본 연구에서 제시한 대응방안을 바탕으로 추후 세부 실행과제를 도출한다면 보다 완벽한 NCW 개념 실현을 위한 국방정보보호 대책이 마련될 수 있을 것이다.

CCN에서 정보제공자의 이동성 지원을 위한 푸싱 기법 (Provider's Mobility Supporting Proactive Neighbor Pushing Scheme in CCN)

  • 우태희;권태욱
    • 한국군사과학기술학회지
    • /
    • 제19권6호
    • /
    • pp.721-729
    • /
    • 2016
  • CCN(Content-Centric Network) enables users to retrieve content using the content's name. Researchers face critical challenges in terms of mobility. Since the routing information is part of the content name, when the provider moves, it is necessary to update all the routers routing information. However, this requires significant costs. In this paper, we propose PNPCCN(Proactive Neighbor Pushing CCN), considering the popularity and rarity of mobility support, for providers in CCN environments. Via simulation studies, we demonstrate that our solutions are effective in terms of shorter numbers of retransmitted Interest packets, and average download times and higher delivery ratios during mobility.

CLSR: Cognitive Link State Routing for CR-based Tactical Ad Hoc Networks

  • Ahn, Hyochun;Kim, Jaebeom;Ko, Young-Bae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권1호
    • /
    • pp.50-67
    • /
    • 2015
  • The Cognitive Radio (CR) paradigm in tactical ad hoc networks is an important element of future military communications for network-centric warfare. This paper presents a novel Cognitive Link State Routing protocol for CR-based tactical ad hoc networks. The proposed scheme provides prompt and reliable routes for Primary User (PU) activity through procedures that incorporate two main functions: PU-aware power adaptation and channel switching. For the PU-aware power adaptation, closer multipoint relay nodes are selected to prevent network partition and ensure successful PU communication. The PU-aware channel switching is proactively conducted using control messages to switch to a new available channel based on a common channel list. Our simulation study based on the ns-3 simulator demonstrates that the proposed routing scheme delivers significantly improved performance in terms of average end-to-end delay, jitter, and packet delivery ratio.

A Study on Efficient Friendly Forces Location Data Sharing on Battalion and Below

  • Kim, Hyung-Seok;Shin, Sang-Heon;Kim, Yong-Cheol;Lee, Jeong-Min
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.95-101
    • /
    • 2018
  • In this paper, we propose an efficient friendly forces location data sharing algorithm in a troops using a low bandwidth radio. The future battlefield is a 'Network Centric Warfare' with a concept of identifying the position and power of the enemy and friendly forces and leading the battlefield to victory through proper links at the time of our need. One of the basic elements in the 'Network Centric Warfare' is to share friendly forces location data. The bandwidth and transmission rates of radio used in battalion are low. Nevertheless, we should share our locations data almost in real time for effective fighting in a war situation. This paper describes the efficient method of friendly forces location data sharing based on low bandwidth radio. In particular, the concept of 'network-centered warfare' is reflected in the troop below the battalion to present an integrated and efficient way to shared location data of friendly forces.