• Title/Summary/Keyword: network-sensitive applications

Search Result 98, Processing Time 0.021 seconds

A Survey Study on Standard Security Models in Wireless Sensor Networks

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.31-36
    • /
    • 2014
  • Recent advancement in Wireless Sensor Networks (WSNs) has paved the way for WSNs to enable in various environments in monitoring temperature, motion, sound, and vibration. These applications often include the detection of sensitive information from enemy movements in hostile areas or in locations of personnel in buildings. Due to characteristics of WSNs and dealing with sensitive information, wireless sensor nodes tend to be exposed to the enemy or in a hazard area, and security is a major concern in WSNs. Because WSNs pose unique challenges, traditional security techniques used in conventional networks cannot be applied directly, many researchers have developed various security protocols to fit into WSNs. To develop countermeasures of various attacks in WSNs, descriptions and analysis of current security attacks in the network layers must be developed by using a standard notation. However, there is no research paper describing and analyzing security models in WSNs by using a standard notation such as The Unified Modeling Language (UML). Using the UML helps security developers to understand security attacks and design secure WSNs. In this research, we provide standard models for security attacks by UML Sequence Diagrams to describe and analyze possible attacks in the three network layers.

  • PDF

Research on the Performance of Protocols and the Evaluation Metric for VIDEO Transmissions in an Ad Hoc Network

  • Chen, Ruey-Shin;Chao, Louis R.;Chen, Ching-Piao;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.10 no.1
    • /
    • pp.115-126
    • /
    • 2009
  • Video transmission effectiveness in the Ad Hoc network is becoming important recently, if different routing protocols are applied. Some researchers conclude that the reactive protocols are better for file transfer protocol (FTP) and constant bit rate (CBR) or hypertext transfer protocol (HTTP) transmission in an Ad Hoc wireless network but the performance report of video transmission is not much. This study adopts Qualnet (Network Simulator) as a simulation tool for environmental designing and performance testing, and employs an experimental design with eight groups. Our experiment shows that: (1) The performance of AODV (reactive) protocol is better than DSDV, ZRP and DSR when the transmission load has only one video stream; (2) Proactive (DSDV) and Hybrid protocols (ZRP) are better for a smaller Ad Hoc network when it transmits a video stream with some applications (VoIP, FTP and CBR). We conclude that packet loss rate is sensitive to the quality of video transmission and it has negative relationship with Peak Signal-to-Noise Ratio (PSNR) value. In addition, our experiment also shows that PSNR is a simple Metric for the performance evaluation of video transmission.

Highly Sensitive Stretchable Electronic Skin with Isotropic Wrinkled Conductive Network

  • Seung Hwan Jeon;Hyeongho Min;Jihun Son;Tae Kon Ahn;Changhyun Pang
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.1
    • /
    • pp.7-11
    • /
    • 2024
  • Soft-pressure sensors have numerous applications in soft robotics, biomedical devices, and wearable smart devices. Herein, we present a highly sensitive electronic skin device with an isotropic wrinkled pressure sensor. A conductive ink for soft pressure sensors is produced by a solution process using polydimethylsiloxane (PDMS), poly 3-hexylthiophene (P3HT), carbon black, and chloroform as the solvents. P3HT provides high reproducibility and conductivity by improving the ink dispersibility. The conductivity of the ink is optimized by adjusting the composition of the carbon black and PDMS. Soft lithography is used to fabricate a conductive elastic structure with an isotropic wrinkled structure. Two conductive elastic structures with an isotropic wrinkle structure is stacked to develop a pressure sensor, and it is confirmed that the isotropic wrinkle structure is more sensitive to pressure than when two elastic structures with an anisotropic wrinkle structure are overlapped. Specifically, the pressure sensor fabricated with an isotropic wrinkled structure can detect extremely low pressures (1.25 Pa). Additionally, the sensor has a high sensitivity of 15.547 kpa-1 from 1.25 to 2500 Pa and a linear sensitivity of 5.15 kPa-1 from 2500 Pa to 25 kPa.

Learning-based Improvement of CFAR Algorithm for Increasing Node-level Event Detection Performance in Acoustic Sensor Networks (음향 센서 네트워크에서의 노드 레벨 이벤트 탐지 성능향상을 위한 학습 기반 CFAR 알고리즘 개선)

  • Kim, Youngsoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.15 no.5
    • /
    • pp.243-249
    • /
    • 2020
  • Event detection in wireless sensor networks is a key requirement in many applications. Acoustic sensors are one of the most frequently used sensors for event detection in sensor networks, but they are sensitive and difficult to handle because they vary greatly depending on the environment and target characteristics of the sensor field. In this paper, we propose a learning-based improvement of CFAR algorithm for increasing node-level event detection performance in acoustic sensor networks, and verify the effectiveness of the designed algorithm by comparing and evaluating the event detection performance with other algorithms. Our experimental results demonstrate the superiority of the proposed algorithm by increasing the detection accuracy by more than 45.16% by significantly reducing false positives by 7.97 times while slightly increasing the false negative compared to the existing algorithm.

Performance Evaluation of AAL-2 by using voice CODEC Standard (음성 부호화 표준안에 따른 AAL-2의 성능 분석)

  • 김상모;추봉진;김장복
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.97-100
    • /
    • 1999
  • Mobile network applications are growing and this requires a fast and efficient transport method between the BS(Base Station) and the MSC(Mobile Switching Center). One possible solution is to use ATM and a voice CODEC standard which compresses 64kbps voice data to less than 8kbps. The low bit tate and small-sized packets made by the voice CODEC imply that significant amount of link bandwidth would be wasted, if this small-sized packet is carried by one ATM cell. The cell assembly delay increases if one ATM cell is fully filled with the small-sized packets. For the bandwidth-efficient transmission of low-rate, short, and variable length packets in delay sensitive applications, AAL-2 was standardized. This paper evaluates performance of AAL-2 by using voice CODEC standard.

  • PDF

Design and Implementation of HDFS Data Encryption Scheme Using ARIA Algorithms on Hadoop (하둡 상에서 ARIA 알고리즘을 이용한 HDFS 데이터 암호화 기법의 설계 및 구현)

  • Song, Youngho;Shin, YoungSung;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.2
    • /
    • pp.33-40
    • /
    • 2016
  • Due to the growth of social network systems (SNS), big data are realized and Hadoop was developed as a distributed platform for analyzing big data. Enterprises analyze data containing users' sensitive information by using Hadoop and utilize them for marketing. Therefore, researches on data encryption have been done to protect the leakage of sensitive data stored in Hadoop. However, the existing researches support only the AES encryption algorithm, the international standard of data encryption. Meanwhile, Korean government choose ARIA algorithm as a standard data encryption one. In this paper, we propose a HDFS data encryption scheme using ARIA algorithms on Hadoop. First, the proposed scheme provide a HDFS block splitting component which performs ARIA encryption and decryption under the distributed computing environment of Hadoop. Second, the proposed scheme also provide a variable-length data processing component which performs encryption and decryption by adding dummy data, in case when the last block of data does not contains 128 bit data. Finally, we show from performance analysis that our proposed scheme can be effectively used for both text string processing applications and science data analysis applications.

Self-Identification of Boundary's Nodes in Wireless Sensor Networks

  • Moustafa, Kouider Elouahed;Hafid, Haffaf
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.128-140
    • /
    • 2017
  • The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.

Impedance-based generalized and phenomenon-reflective simulation model of Li-ion battery for railway traction applications

  • Abbas, Mazhar;Cho, Inho;Kim, Jonghoon
    • Proceedings of the KIPE Conference
    • /
    • 2019.07a
    • /
    • pp.459-460
    • /
    • 2019
  • The performance dynamics of battery is very sensitive to operating conditions (i.e temperature, load current, and state of charge). A model developed based on certain conditions may perform well under the similar conditions but can not accurately predict the performance for changing conditions. Thus, a generalized model is needed which can accurately emulate the battery dynamic behavior under all conditions. In addition, the components of the model should relate to the physicochemical processes that occur inside the battery. Electrochemical impedance curve shows better visible reflection of the processes inside battery as compared to voltage curve. The model trained for parameterization using neural network has better generalization than simple curve fitting. Thus, this study proposes recurrent neural network based parameterization of the Lithium ion battery model followed by impedance based identification.

  • PDF

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.

A study of keep the Secret information of Random Sized Images from using Indestructible Security

  • Woo, Seon-mi;Lee, Malrey;Lee, Hyang Ran
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.23-29
    • /
    • 2016
  • The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.