• 제목/요약/키워드: node capture

검색결과 43건 처리시간 0.029초

다중 레이어를 이용한 모션캡쳐 수정에 관한 연구 (The Revision of Motion Capture Data using Multiple Layers)

  • 김기홍;최철영;채일진
    • 한국멀티미디어학회논문지
    • /
    • 제12권7호
    • /
    • pp.903-912
    • /
    • 2009
  • 모션캡쳐 데이터의 떨림 현상 수정이나 변형을 위한 기술 개발이나 애니메이션 타이밍 시트에 맞게 모션 캡쳐 데이터를 수정하는 것은 어려운 문제가 산적해 있다. 기존의 모션캡쳐 데이터 수정 방식은 능숙한 애니메이터의 키프레임 애니메이팅 작업과 같은 시간이 소요거나 혹은 더 많은 수정 시간이 걸리는 문제점이 있었다. 이런 문제점은 키 애니메이션 데이터 노드와 직접적인 블렌드 레이어와 대치 레이어 노드 생성을 통해 보다 효과적인 해결 방식을 만들 수 있다. 본 논문에서는 애니메이션 노드에 직접적인 연결을 위한 새로운 애니메이션 레이어 노드 생성으로 진행된 애니메이션 데이터 수정 없이 비선형 방식으로 애니메이션 데이터의 수정을 가능케 하는 방식으로 제시한다. 기술의 구현은 'Haya' API를 활용할 것이고 연구범위는 영화 VFX와 애니메이션 제작에 사용되는 'Maya' 3D 소프트웨어로 제한하였다. 본 연구 결과물은 기존의 비선형 방식보다 직관적이며, 애니메이션 클립을 만들 선행 작업이 필요 없고, 떨림 수정과 키프레임 추출이 가능하며, 특히 타 프로그램과의 호환이 직접적인 레이어 노드를 생성하여 모션캡쳐 데이터의 수정을 가능하게 한다. 마지막으로 기존의 애니메이션 수정방식들을 살펴보고 비교, 분석해 본다.

  • PDF

SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks

  • Sujihelen, L.;Jayakumar, C.;Senthilsingh, C.
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권6호
    • /
    • pp.2447-2455
    • /
    • 2018
  • Security is more important in many sensor applications. The node replication attack is a major issue on sensor networks. The replicated node can capture all node details. Node Replication attacks use its secret cryptographic key to successfully produce the networks with clone nodes and also it creates duplicate nodes to build up various attacks. The replication attacks will affect in routing, more energy consumption, packet loss, misbehavior detection, etc. In this paper, a Secure-Efficient Centralized approach is proposed for detecting a Node Replication Attacks in Wireless Sensor Networks for Static Networks. The proposed system easily detects the replication attacks in an effective manner. In this approach Secure Cluster Election is used to prevent from node replication attack and Secure Efficient Centralized Approach is used to detect if any replicated node present in the network. When comparing with the existing approach the detection ratio, energy consumption performs better.

A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA

  • Park, Dong-Gook
    • Journal of information and communication convergence engineering
    • /
    • 제7권2호
    • /
    • pp.98-106
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Finding Top-k Answers in Node Proximity Search Using Distribution State Transition Graph

  • Park, Jaehui;Lee, Sang-Goo
    • ETRI Journal
    • /
    • 제38권4호
    • /
    • pp.714-723
    • /
    • 2016
  • Considerable attention has been given to processing graph data in recent years. An efficient method for computing the node proximity is one of the most challenging problems for many applications such as recommendation systems and social networks. Regarding large-scale, mutable datasets and user queries, top-k query processing has gained significant interest. This paper presents a novel method to find top-k answers in a node proximity search based on the well-known measure, Personalized PageRank (PPR). First, we introduce a distribution state transition graph (DSTG) to depict iterative steps for solving the PPR equation. Second, we propose a weight distribution model of a DSTG to capture the states of intermediate PPR scores and their distribution. Using a DSTG, we can selectively follow and compare multiple random paths with different lengths to find the most promising nodes. Moreover, we prove that the results of our method are equivalent to the PPR results. Comparative performance studies using two real datasets clearly show that our method is practical and accurate.

K-Hop Community Search Based On Local Distance Dynamics

  • Meng, Tao;Cai, Lijun;He, Tingqin;Chen, Lei;Deng, Ziyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권7호
    • /
    • pp.3041-3063
    • /
    • 2018
  • Community search aims at finding a meaningful community that contains the query node and also maximizes (minimizes) a goodness metric. This problem has recently drawn intense research interest. However, most metric-based algorithms tend to include irrelevant subgraphs in the identified community. Apart from the user-defined metric algorithm, how can we search the natural community that the query node belongs to? In this paper, we propose a novel community search algorithm based on the concept of the k-hop and local distance dynamics model, which can naturally capture a community that contains the query node. The basic idea is to envision the nodes that k-hop away from the query node as an adaptive local dynamical system, where each node only interacts with its local topological structure. Relying on a proposed local distance dynamics model, the distances among nodes change over time, where the nodes sharing the same community with the query node tend to gradually move together, while other nodes stay far away from each other. Such interplay eventually leads to a steady distribution of distances, and a meaningful community is naturally found. Extensive experiments show that our community search algorithm has good performance relative to several state-of-the-art algorithms.

Behavior based Routing Misbehavior Detection in Wireless Sensor Networks

  • Terence, Sebastian;Purushothaman, Geethanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권11호
    • /
    • pp.5354-5369
    • /
    • 2019
  • Sensor networks are deployed in unheeded environment to monitor the situation. In view of the unheeded environment and by the nature of their communication channel sensor nodes are vulnerable to various attacks most commonly malicious packet dropping attacks namely blackhole, grayhole attack and sinkhole attack. In each of these attacks, the attackers capture the sensor nodes to inject fake details, to deceive other sensor nodes and to interrupt the network traffic by packet dropping. In all such attacks, the compromised node advertises itself with fake routing facts to draw its neighbor traffic and to plunge the data packets. False routing advertisement play vital role in deceiving genuine node in network. In this paper, behavior based routing misbehavior detection (BRMD) is designed in wireless sensor networks to detect false advertiser node in the network. Herein the sensor nodes are monitored by its neighbor. The node which attracts more neighbor traffic by fake routing advertisement and involves the malicious activities such as packet dropping, selective packet dropping and tampering data are detected by its various behaviors and isolated from the network. To estimate the effectiveness of the proposed technique, Network Simulator 2.34 is used. In addition packet delivery ratio, throughput and end-to-end delay of BRMD are compared with other existing routing protocols and as a consequence it is shown that BRMD performs better. The outcome also demonstrates that BRMD yields lesser false positive (less than 6%) and false negative (less than 4%) encountered in various attack detection.

Analysis of Properties Influencing CO2 Transport Using a Pipeline and Visualization of the Pipeline Connection Network Design: Korean Case Study

  • Lee, Ji-Yong
    • International Journal of Contents
    • /
    • 제13권1호
    • /
    • pp.45-52
    • /
    • 2017
  • Carbon Capture and Storage (CCS) technologies involve three major stages, i.e., capture, transport, and storage. The transportation stage of CCS technologies has received relatively little attention because the requirements for $CO_2$ transport differ based on the industry-related conditions, geological, and demographical characteristics of each country. In this study, we analyzed the properties of $CO_2$ transport using a pipeline. This study has important implications for ensuring the stability of a long-term CCS as well as the large cost savings, as compared to the small cost ratio as a percentage of the entire CCS system. The state of $CO_2$, network topologies, and node distribution are among the major factors that influence $CO_2$ transport via pipelines. For the analysis of the properties of $CO_2$ transport using a pipeline, the $CO_2$ pipeline connections were visualized by the simulator developed by Lee [11] based on the network topologies in $CO_2$ transport. The case of Korean CCS technologies was applied to the simulation.

무선 센서 네트워크 환경에서 안전한 통신을 위한 그룹 해싱 기법 (Group hashing for Secure Communications m Wireless Sensor Network)

  • 이희만;강정호;김정호;전문석
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.470-472
    • /
    • 2014
  • 무선 센서 네트워크에서 무선 전송 매체를 통한 통신으로 유선 네트워크에 비해 보안이 매우 취약하며 Sensor Node는 매우 제한된 통신, 계산 능력으로 기존에 다양한 암호화 방식 적용이 어렵기 때문에 데이터의 eavesdropping와 capture가 발생할 수 있다. 본 논문은 이러한 환경에서 지역적으로 같은 보안방식을 사용하여 한 지역 패킷이 노출되면 그룹 전체에 노출로 이어지는 취약점을 방지하기 위해서 BaseStation은 각 그룹의 ClusterHeader가 사용할 서로 다른 해시 알고리즘을 주기적으로 갱신하여 악의적인 사용자의 노드 eavesdropping 및 capture를 방지하고 안전한 통신을 수행하고자 한다. 제안된 기법은 기존 논문들의 비해 프로토콜의 효율성과 안전성을 보였다.

Novel Two-Level Randomized Sector-based Routing to Maintain Source Location Privacy in WSN for IoT

  • Jainulabudeen, A.;Surputheen, M. Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.285-291
    • /
    • 2022
  • WSN is the major component for information transfer in IoT environments. Source Location Privacy (SLP) has attracted attention in WSN environments. Effective SLP can avoid adversaries to backtrack and capture source nodes. This work presents a Two-Level Randomized Sector-based Routing (TLRSR) model to ensure SLP in wireless environments. Sector creation is the initial process, where the nodes in the network are grouped into defined sectors. The first level routing process identifies sector-based route to the destination node, which is performed by Ant Colony Optimization (ACO). The second level performs route extraction, which identifies the actual nodes for transmission. The route extraction is randomized and is performed using Simulated Annealing. This process is distributed between the nodes, hence ensures even charge depletion across the network. Randomized node selection process ensures SLP and also avoids depletion of certain specific nodes, resulting in increased network lifetime. Experiments and comparisons indicate faster route detection and optimal paths by the TLRSR model.

A Secure Key Predistribution Scheme for WSN Using Elliptic Curve Cryptography

  • Rajendiran, Kishore;Sankararajan, Radha;Palaniappan, Ramasamy
    • ETRI Journal
    • /
    • 제33권5호
    • /
    • pp.791-801
    • /
    • 2011
  • Security in wireless sensor networks (WSNs) is an upcoming research field which is quite different from traditional network security mechanisms. Many applications are dependent on the secure operation of a WSN, and have serious effects if the network is disrupted. Therefore, it is necessary to protect communication between sensor nodes. Key management plays an essential role in achieving security in WSNs. To achieve security, various key predistribution schemes have been proposed in the literature. A secure key management technique in WSN is a real challenging task. In this paper, a novel approach to the above problem by making use of elliptic curve cryptography (ECC) is presented. In the proposed scheme, a seed key, which is a distinct point in an elliptic curve, is assigned to each sensor node prior to its deployment. The private key ring for each sensor node is generated using the point doubling mathematical operation over the seed key. When two nodes share a common private key, then a link is established between these two nodes. By suitably choosing the value of the prime field and key ring size, the probability of two nodes sharing the same private key could be increased. The performance is evaluated in terms of connectivity and resilience against node capture. The results show that the performance is better for the proposed scheme with ECC compared to the other basic schemes.