• Title/Summary/Keyword: nodes

Search Result 8,419, Processing Time 0.035 seconds

Detection and Trust Evaluation of the SGN Malicious node

  • Al Yahmadi, Faisal;Ahmed, Muhammad R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.89-100
    • /
    • 2021
  • Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.

Globally Optimal Recommender Group Formation and Maintenance Algorithm using the Fitness Function (적합도 함수를 이용한 최적의 추천자 그룹 생성 및 유지 알고리즘)

  • Kim, Yong-Ku;Lee, Min-Ho;Park, Soo-Hong;Hwang, Cheol-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.50-56
    • /
    • 2009
  • This paper proposes a new algorithm of clustering similar nodes defined as nodes having similar characteristic values in pure P2P environment. To compare similarity between nodes, we introduce a fitness function whose return value depends only on the two nodes' characteristic values. The higher the return value is, the more similar the two nodes are. We propose a GORGFM algorithm newly in conjunction with the fitness function to recommend and exchange nodes' characteristic values for an interest group formation and maintenance. With the GORGFM algorithm, the interest groups are formed dynamically based on the similarity of users, and all nodes will highly satisfy with the information recommended and received from nodes of the interest group. To evaluate of performance of the GORGFM algorithm, we simulated a matching rate by the total number of nodes of network and the number of iterations of the algorithm to find similar nodes accurately. The result shows that the matching rate is highly accurate. The GORGFM algorithm proposed in this paper is highly flexible to be applied for any searching system on the web.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Accuracy of Nodal Staging with Integrated PET/CT Scanning in Non-small Cell Lung Cancer (양전자단층촬영/전산화단층촬영(integrated PET/CT)을 이용한 비소세포폐암의 림프절 병기판정)

  • Kim, Ji-Hoon;Chung, Won-Sang;Kim, Young-Hak;Kim, Hyuck;Jeon, Seok-Chol
    • Journal of Chest Surgery
    • /
    • v.43 no.6
    • /
    • pp.700-704
    • /
    • 2010
  • Background: For staging primary lung cancer, integrated positron emission tomography/computed tomography (PET/CT) imaging is popular. The purpose of this study was to evaluate the accuracy of PET/CT scanning in lymph nodal staging of lung cancer. Material and Method: We studied 48 patients who had received CT, PET/CT and pulmonary resections due to primary non-small cell lung cancer in our hospital between January 2006 and August 2009. Mediastinal lymph nodes were classified as superior mediastinal nodes, aortic nodes, inferior mediastinal nodes, or N1 nodes. We compared the power of CT and PET/CT for diagnosing pulmonary lymph nodes for each of the four types of nodes. Result: PET/CT was more sensitive than CT for all groups except inferior mediastinal nodes. However, the differences were not significant (McNemar's test: superior mediastinal nodes, p=0.109; aortic nodes, p=1.000; inferior mediastinal nodes, p=0.625, N1 nodes, p=0.424). Conclusion: The accuracy of PET/CT is similar to that of CT alone for staging lymph nodes. The two imaging modalities might be used as complementary, cooperative tools. We expect that integrated PET/CT will be found to be significantly mmore sensitive after more trials are done and more data is accumulated.

A Heuristic Buffer Management and Retransmission Control Scheme for Tree-Based Reliable Multicast

  • Baek, Jin-Suk;Paris, Jehan-Francois
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.1-12
    • /
    • 2005
  • We propose a heuristic buffer management scheme that uses both positive and negative acknowledgments to provide scalability and reliability. Under our scheme, most receiver nodes only send negative acknowledgments to their repair nodes to request packet retransmissions while some representative nodes also send positive acknowledgments to indicate which packets can be discarded from the repair node's buffer. Our scheme provides scalability because it significantly reduces the number of feedbacks sent by the receiver nodes. In addition, it provides fast recovery of transmission errors since the packets requested from the receiver nodes are almost always available in their buffers. Our scheme also reduces the number of additional retransmissions from the original sender node or upstream repair nodes. These features satisfy the original goal of treebased protocols since most packet retransmissions are performed within a local group.

  • PDF

The Study of System Security Technique for Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2008
  • Mobile Ad Hoc Network is easy to be attacked because nodes are distributed not network based infrastructure. Intrusion detection system perceives the trust values of neighboring nodes and receives inspection on local security of nodes and observation ability. This study applied clustering mechanism to reduce overhead in intrusion detection. And, in order to measure the trust values, it associates the trust information cluster head received from member nodes with its own value and evaluates the trust of neighboring nodes. Secure data transmission is received by proposed concept because the trust of nodes on network is achieved accurately.

  • PDF

The Number of Maximal Independent sets of the Graph with joining Moon-Moser Graph and Complete Graph (Moon-Moser 그래프와 완전그래프를 결합한 그래프의 극대독립집합의 개수)

  • Chung, S.J.;Lee, C.S.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.20 no.4
    • /
    • pp.65-72
    • /
    • 1994
  • An independent set of nodes is a set of nodes no two of which are joined by an edge. An independent set is called maximal if no more nodes can be added to the set without destroying its independence. The greatest number of maximal independent set is the maximum possible number of maximal independent set of a graph. We consider the greatest number of maximal independent set in connected graphs with fixed numbers of edges and nodes. For arbitrary number of nodes with a certain class of number of edges, we present the connected graphs with the greatest number of maximal independent set. For a given class of number of edges, the structure of graphs with the greatest number of maximal independent set is that the two components are completely joined; one consists of disjoint triangles as many as possible and the other is the complete graph with remaining nodes.

  • PDF

A Clustering Algorithm Using the Ordered Weight of Self-Organizing Feature Maps (자기조직화 신경망의 정렬된 연결강도를 이용한 클러스터링 알고리즘)

  • Lee Jong-Sup;Kang Maing-Kyu
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.31 no.3
    • /
    • pp.41-51
    • /
    • 2006
  • Clustering is to group similar objects into clusters. Until now there are a lot of approaches using Self-Organizing feature Maps (SOFMS) But they have problems with a small output-layer nodes and initial weight. For example, one of them is a one-dimension map of c output-layer nodes, if they want to make c clusters. This approach has problems to classify elaboratively. This Paper suggests one-dimensional output-layer nodes in SOFMs. The number of output-layer nodes is more than those of clusters intended to find and the order of output-layer nodes is ascending in the sum of the output-layer node's weight. We un find input data in SOFMs output node and classify input data in output nodes using Euclidean distance. The proposed algorithm was tested on well-known IRIS data and TSPLIB. The results of this computational study demonstrate the superiority of the proposed algorithm.

Positioning Scheme using Acceleration Factor for Wireless Sensor Networks

  • Park, Na-Yeon;Son, Cheol-Su;Lee, Sung-Jae;Hwang, In-Moon;Kim, Won-Jung
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.459-465
    • /
    • 2008
  • Locations of nodes as well as gathered data from nodes are very important because generally multiple nodes are deployed randomly and data are gathered in wireless sensor network. Since the nodes composing wireless sensor network are low cost and low performance devices, it is very difficult to add specially designed devices for positioning into the nodes. Therefore in wireless sensor network, technology positioning nodes precisely using low cost is very important and valuable. This research proposes Cooperative Positioning System, which raises accuracy of location positioning and also can find positions on multiple sensors within limited times.

Consistent Distributed Lookup Service Architecture for Mobile Ad-hoc Networks

  • Malik Muhammad Ali;Kim Jai-Hoon
    • International Journal of Contents
    • /
    • v.2 no.2
    • /
    • pp.29-31
    • /
    • 2006
  • Mobile Ad hoc network is a self configuring network of mobile nodes. It allows mobile nodes to configure network spontaneously and share their services. In these networks, service discovery is very important because all nodes do not have same resources in term of memory and computing power. Nodes need to use different services offered by different servers. Some service discovery protocols have been proposed in last couple of years but they include significant traffic overhead and for small scale MANETS. In this paper, we present extensible lookup service scheme based on distributed mechanism. In our scheme neighboring nodes of service provider monitor service provider and send notification to lookup server when the service provider terminates its services unexpectedly. Lookup server can find other service provider or other alternative services in advance because of advance notification method and can provide consistent lookup services. In our scheme neighboring nodes also monitor lookup server and send notification to network when lookup server terminates unexpectedly. Simulation results show that our scheme can reduce up to 70% and 30% lookup failure as compare to centralize and simple distributed mechanism respectively.

  • PDF