• Title/Summary/Keyword: node capture

Search Result 43, Processing Time 0.025 seconds

The Revision of Motion Capture Data using Multiple Layers (다중 레이어를 이용한 모션캡쳐 수정에 관한 연구)

  • Kim, Ki-Hong;Choi, Chul-Young;Chae, Eel-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.903-912
    • /
    • 2009
  • There are still many difficulties in developing techniques for modifying or transforming the flickering of motion capture data or in modifying motion capture data in such a way that suits the animation timing sheet. There is a problem in the existing method of modifying motion capture data. It requires almost same time as in the key frame animation work by a very skilled animator or even more time in modifying. It is believed that this kind of problem can be a basis for a more effective problem-solving method through creating the key animation data node and direct blend layer and replacement layer nodes. This study presents a new method which enables to modify animation data in a nonlinear way without modifying the existing animation data by creating an animation layer node for a direct connection to the animation node. 'Maya' API will be utilized in order to realize this method and the research range will be limited to 'Maya' 3D software which is generally used in motion picture and animation films. According to the results of this study, the new method is much more intuitive than the nonlinear one and does not require the preceding working of making animation clips. In addition, it has enabled to modify flickering and to extract key frames, and due to the compatibility with other programs, it has been possible to modify motion capture data by creating a direct layer node. Finally, in this study, the existing method of modifying animation will be examined, compared and analyzed.

  • PDF

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Finding Top-k Answers in Node Proximity Search Using Distribution State Transition Graph

  • Park, Jaehui;Lee, Sang-Goo
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.714-723
    • /
    • 2016
  • Considerable attention has been given to processing graph data in recent years. An efficient method for computing the node proximity is one of the most challenging problems for many applications such as recommendation systems and social networks. Regarding large-scale, mutable datasets and user queries, top-k query processing has gained significant interest. This paper presents a novel method to find top-k answers in a node proximity search based on the well-known measure, Personalized PageRank (PPR). First, we introduce a distribution state transition graph (DSTG) to depict iterative steps for solving the PPR equation. Second, we propose a weight distribution model of a DSTG to capture the states of intermediate PPR scores and their distribution. Using a DSTG, we can selectively follow and compare multiple random paths with different lengths to find the most promising nodes. Moreover, we prove that the results of our method are equivalent to the PPR results. Comparative performance studies using two real datasets clearly show that our method is practical and accurate.

K-Hop Community Search Based On Local Distance Dynamics

  • Meng, Tao;Cai, Lijun;He, Tingqin;Chen, Lei;Deng, Ziyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3041-3063
    • /
    • 2018
  • Community search aims at finding a meaningful community that contains the query node and also maximizes (minimizes) a goodness metric. This problem has recently drawn intense research interest. However, most metric-based algorithms tend to include irrelevant subgraphs in the identified community. Apart from the user-defined metric algorithm, how can we search the natural community that the query node belongs to? In this paper, we propose a novel community search algorithm based on the concept of the k-hop and local distance dynamics model, which can naturally capture a community that contains the query node. The basic idea is to envision the nodes that k-hop away from the query node as an adaptive local dynamical system, where each node only interacts with its local topological structure. Relying on a proposed local distance dynamics model, the distances among nodes change over time, where the nodes sharing the same community with the query node tend to gradually move together, while other nodes stay far away from each other. Such interplay eventually leads to a steady distribution of distances, and a meaningful community is naturally found. Extensive experiments show that our community search algorithm has good performance relative to several state-of-the-art algorithms.

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

Analysis of Properties Influencing CO2 Transport Using a Pipeline and Visualization of the Pipeline Connection Network Design: Korean Case Study

  • Lee, Ji-Yong
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2017
  • Carbon Capture and Storage (CCS) technologies involve three major stages, i.e., capture, transport, and storage. The transportation stage of CCS technologies has received relatively little attention because the requirements for $CO_2$ transport differ based on the industry-related conditions, geological, and demographical characteristics of each country. In this study, we analyzed the properties of $CO_2$ transport using a pipeline. This study has important implications for ensuring the stability of a long-term CCS as well as the large cost savings, as compared to the small cost ratio as a percentage of the entire CCS system. The state of $CO_2$, network topologies, and node distribution are among the major factors that influence $CO_2$ transport via pipelines. For the analysis of the properties of $CO_2$ transport using a pipeline, the $CO_2$ pipeline connections were visualized by the simulator developed by Lee [11] based on the network topologies in $CO_2$ transport. The case of Korean CCS technologies was applied to the simulation.

Group hashing for Secure Communications m Wireless Sensor Network (무선 센서 네트워크 환경에서 안전한 통신을 위한 그룹 해싱 기법)

  • Lee, Hee-man;Kang, Jung-Ho;Kim, Jung-ho;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.470-472
    • /
    • 2014
  • 무선 센서 네트워크에서 무선 전송 매체를 통한 통신으로 유선 네트워크에 비해 보안이 매우 취약하며 Sensor Node는 매우 제한된 통신, 계산 능력으로 기존에 다양한 암호화 방식 적용이 어렵기 때문에 데이터의 eavesdropping와 capture가 발생할 수 있다. 본 논문은 이러한 환경에서 지역적으로 같은 보안방식을 사용하여 한 지역 패킷이 노출되면 그룹 전체에 노출로 이어지는 취약점을 방지하기 위해서 BaseStation은 각 그룹의 ClusterHeader가 사용할 서로 다른 해시 알고리즘을 주기적으로 갱신하여 악의적인 사용자의 노드 eavesdropping 및 capture를 방지하고 안전한 통신을 수행하고자 한다. 제안된 기법은 기존 논문들의 비해 프로토콜의 효율성과 안전성을 보였다.

Novel Two-Level Randomized Sector-based Routing to Maintain Source Location Privacy in WSN for IoT

  • Jainulabudeen, A.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.285-291
    • /
    • 2022
  • WSN is the major component for information transfer in IoT environments. Source Location Privacy (SLP) has attracted attention in WSN environments. Effective SLP can avoid adversaries to backtrack and capture source nodes. This work presents a Two-Level Randomized Sector-based Routing (TLRSR) model to ensure SLP in wireless environments. Sector creation is the initial process, where the nodes in the network are grouped into defined sectors. The first level routing process identifies sector-based route to the destination node, which is performed by Ant Colony Optimization (ACO). The second level performs route extraction, which identifies the actual nodes for transmission. The route extraction is randomized and is performed using Simulated Annealing. This process is distributed between the nodes, hence ensures even charge depletion across the network. Randomized node selection process ensures SLP and also avoids depletion of certain specific nodes, resulting in increased network lifetime. Experiments and comparisons indicate faster route detection and optimal paths by the TLRSR model.

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.