• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.034 seconds

Energy-Efficient Routing for Data Collection in Sensor Networks (센서 네트워크에서의 데이타 수집을 위한 라우팅 기법)

  • Song, In-Chul;Roh, Yo-Han;Hyun, Dong-Joon;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.2
    • /
    • pp.188-200
    • /
    • 2006
  • Once a continuous query, which is commonly used in sensor networks, is issued, the query is executed many times with a certain interval and the results of those query executions are collected to the base station. Since this comes many communication messages continuously, it is important to reduce communication cost for collecting data to the base station. In sensor networks, in-network processing reduces the number of message transmissions by partially aggregating results of an aggregate query in intermediate nodes, or merging the results in one message, resulting in reduction of communication cost. In this paper, we propose a routing tree for sensor nodes that qualify the given query predicate, called the query specific routing tree(QSRT). The idea of the QSRT is to maximize in-network processing opportunity. A QSRT is created seperately for each query during dissemination of the query. It is constructed in such a way that during the collection of query results partial aggregation and packet merging of intermediate results can be fully utilized. Our experimental results show that our proposed method can reduce message transmissions more than 18% compared to the existing one.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

Evaluation of functional wireless sensor node based Ad-hoc network for indoor healthcare monitoring (실내 건강모니터링을 위한 Ad-hoc기반의 기능성 무선센서노드 평가)

  • Lee, Dae-Seok;Do, Kyeong-Hoon;Lee, Hun-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.313-316
    • /
    • 2009
  • A novel approach for electrocardiogram (ECG) analysis within a functional sensor node has been developed and evaluated. The main aim is to reduce data collision, traffic over loads and power consumption in healthcare applications of wireless sensor networks (WSN). The sensor node attached on the patient's bodysurface around the heart can perform ECG analysis based on a QRS detection algorithm to detect abnormal condition of the patient. Data transfer is activated only after detected abnormality in the ECG. This system can reduce packet loss during transmission by reducing traffic overload. In addition, it saves power supply energy leading to more reliable, cheap and user-friendly operation in the WSN based ubiquitous health monitoring.

  • PDF

A Study on the Support of Intermediate Node Mobility by Double Paths in CCN Real-Time Services (CCN 실시간 서비스 간 이중 경로에 의한 중간노드 이동성 지원에 관한 연구)

  • Keum, Suk-Ju;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.825-834
    • /
    • 2021
  • With the development of various devices and Internet platforms, production and demand for content are increasing rapidly. However, effective response to exponentially increasing data usage is difficult in current TCP/IP schemes. As a result, with the emergence of an alternative called CCN, data can be transmitted and received from the host-centered to the content-oriented, and large-capacity content can be handled with more mitigated network resources. In this paper, we will address intermediate node mobility, which is one of the areas studied in CCN. In CCN, real-time services are a very important factor for information providers as well as requestors. However, when a node departure situation occurs, packet transmission and transmission speed decreases. Therefore, to ensure these numbers, even if the intermediate node deviates using a dual path, it provides a complete QoS (Quality of Service) using an alternative path.

Design and Implementation of Vehicle Control Network Using WiFi Network System (WiFi 네트워크 시스템을 활용한 차량 관제용 네트워크의 설계 및 구현)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.632-637
    • /
    • 2019
  • Recent researches on autonomous driving of vehicles are becoming very active, and it is a trend to assist safe driving and improve driver's convenience. Autonomous vehicles are required to combine artificial intelligence, image recognition capability, and Internet communication between objects. Because mobile telecommunication networks have limitations in their processing, they can be easily implemented and scale using an easily expandable Wi-Fi network. We propose a wireless design method to construct such a vehicle control network. We propose the arrangement of AP and the software configuration method to minimize loss of data transmission / reception of mobile terminal. Through the design of the proposed network system, the communication performance of the moving vehicle can be dramatically increased. We also verify the packet structure of GPS, video, voice, and data communication that can be used for the vehicle through experiments on the movement of various terminal devices. This wireless design technology can be extended to various general purpose wireless networks such as 2.4GHz, 5GHz and 10GHz Wi-Fi. It is also possible to link wireless intelligent road network with autonomous driving.

Hematologic and Serological Investigation of Effect on Gyeongokgo in Healthy Individuals : a Randomized, Subject-assessor-blind, Placebo-controlled, Single-center Pilot Study

  • Sunwoo, Yun-Young;Kim, Hye Jung;Kim, Ja Young;Yang, Na Rae;Lee, Jin Hyun;Park, Tae Yong
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.33 no.4
    • /
    • pp.239-248
    • /
    • 2019
  • There are no published data on Gyeongokgo (GOK) safety or efficacy despite being commonly use. The Gyeongokgo (GOK) is commonly used in traditional Korean medicine to promote a health qi and blood, but their objective data was not sufficient in clinical field. To investigate the safety and efficacy of GOK with hematologic and serologic testing and the change of the quality of life in healthy individuals. Randomized, subject-assessor-blind, placebo-controlled, single-center pilot study Participants and Interventions 29 healthy volunteer subjects were randomly placed into the GOK group (n = 20) or placebo control group (n = 9) and instructed to take one treatment packet (GOK or placebo) twice daily for 4 weeks. Subjects were assessed using the Fatigue Severity Scale (FSS) and Short Form 36 Health Survey (SF-36) and underwent hematologic and serologic tests and body composition analysis. The FSS total score (p = 0.093) and SF-36 general health index (p = 0.002) were improved following treatment in the GOK group. Post-treatment thyroid-stimulating hormone levels were increased in the GOK group compared with pre-treatment levels (p = 0.0042). C-reactive protein levels decreased (p = 0.0256) in the GOK group compared with that the placebo group. In time-series tests, GOK did not affect post-prandial serum triglycerides, glucose, insulin, or C-peptide levels. Notably, elevations in serum fasting triglycerides at 2- (p = 0.0333) and 4-hours (p = 0.0414) post-prandial were lower than those in the placebo group. GOK reduced fatigue levels and did not significantly affect laboratory test results performed to measure safety, serum glucose, and lipid profiles. Post-meal triglyceride levels were effectively reduced with treatment.

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.

Underwater mobile communication scheme based on the direct sequence spread spectrum transmission using Doppler estimation and its sea trial results with the pseudo-moving transmission (도플러 추정을 적용한 직접수열 대역확산 전송 기반 수중 이동통신 방법 및 가상 이동신호를 이용한 해상시험 결과)

  • Kim, Seung-Geun
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.1
    • /
    • pp.16-29
    • /
    • 2022
  • This paper presents a Doppler shift estimation method and signal processing schemes for Direct Sequence Spread Spectrum (DSSS) transmission to overcome the Doppler shift due to the moving of the underwater communication unit. The proposed method estimates a Doppler shift via 2 step procedures using the preamble with the two 64-length Frank sequences which has a good self-correlation characteristic and is insensitive to the Doppler shift. Furthermore, a packet of DSSS underwater mobile communication and a RAKE receiver are designed using the proposed Doppler shift estimation method. Due to the modulation scheme of the designed DSSS underwater mobile communication using Differential-Quadrature Phase Shift Keying (DQPSK) for the data symbol transmission, the RAKE receiver dose not need a phase tracking and easily makes coherent signals among the combining RAKE branches. The designed RAKE receiving scheme including the proposed Doppler shift estimation method successfully decides information data using the DSSS signal transmitted from the pseudo-moving transmitter with velocity upto about 17.5 m/s.

Proactive Virtual Network Function Live Migration using Machine Learning (머신러닝을 이용한 선제적 VNF Live Migration)

  • Jeong, Seyeon;Yoo, Jae-Hyoung;Hong, James Won-Ki
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • VM (Virtual Machine) live migration is a server virtualization technique for deploying a running VM to another server node while minimizing downtime of a service the VM provides. Currently, in cloud data centers, VM live migration is widely used to apply load balancing on CPU workload and network traffic, to reduce electricity consumption by consolidating active VMs into specific location groups of servers, and to provide uninterrupted service during the maintenance of hardware and software update on servers. It is critical to use VMlive migration as a prevention or mitigation measure for possible failure when its indications are detected or predicted. In this paper, we propose two VNF live migration methods; one for predictive load balancing and the other for a proactive measure in failure. Both need machine learning models that learn periodic monitoring data of resource usage and logs from servers and VMs/VNFs. We apply the second method to a vEPC (Virtual Evolved Pakcet Core) failure scenario to provide a detailed case study.