• Title/Summary/Keyword: status information protocol

Search Result 281, Processing Time 0.023 seconds

Energy Detection Based Sensing for Secure Cognitive Spectrum Sharing in the Presence of Primary User Emulation Attack

  • Salem, Fatty M.;Ibrahim, Maged H.;Ibrahim, I.I.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.6
    • /
    • pp.357-366
    • /
    • 2013
  • Spectrum sensing, as a fundamental functionality of Cognitive Radio (CR), enables Secondary Users (SUs) to monitor the spectrum and detect spectrum holes that could be used. Recently, the security issues of Cognitive Radio Networks (CRNs) have attracted increasing research attention. As one of the attacks against CRNs, a Primary User Emulation (PUE) attack compromises the spectrum sensing of CR, where an attacker monopolizes the spectrum holes by impersonating the Primary User (PU) to prevent SUs from accessing the idle frequency bands. Energy detection is often used to sense the spectrum in CRNs, but the presence of PUE attack has not been considered. This study examined the effect of PUE attack on the performance of energy detection-based spectrum sensing technique. In the proposed protocol, the stationary helper nodes (HNs) are deployed in multiple stages and distributed over the coverage area of the PUs to deliver spectrum status information to the next stage of HNs and to SUs. On the other hand, the first stage of HNs is also responsible for inferring the existence of the PU based on the energy detection technique. In addition, this system provides the detection threshold under the constraints imposed on the probabilities of a miss detection and false alarm.

  • PDF

Access Control Protocol for Bursty Traffic in TDMA/TDD-based Wireless ATM Networks (TDMA/TDD 기반 무선 ATM망에서 버스트 트래픽을 위한 접속 제어 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.4
    • /
    • pp.684-690
    • /
    • 2003
  • In this paper, a contention-based reservation access control algorithm and a slot allocation algorithm are proposed for non-real-time bursty traffic services in the wireless ATM networks. In order to reduce the collisions of the reservation request packets, the base station scheduler calculates the transmission probability using the number of RAS minislots and the estimated load of the reservation request packets. And it broadcasts the calculated transmission probability over the downlink control channel. Mobile terminals, which have traffic burst, select randomly a RAS minislot and transmit the reservation request packet by the received transmission probability. The reservation request packet contains the number of packets in the buffer. The slot allocation is based on the buffer status of the received reservation request packets. The base station scheduler allocates slots in proportion to the total number of slots that are requested by each terminal.

Design and Implementation of an Electrocardiogram Measurement System Using Sensor Network (센서네트워크를 이용한 심전도 측정시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.186-194
    • /
    • 2008
  • This paper has implemented a ubiquitous healthcare system that can measure and check the electrocardiogram of a human body in anytime and anywhere. The implemented prototype is composed of electrocardiogram measurement terminal, data gathering base node, and medical information server. The implemented node constructs a sensor network using the Zigbee protocol and the TinyOS is installed on each node. The data gathering base node is linux-based node that can transfer sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through experiment, we confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.

A study on OID Resolution System for RFID, USN (RFID, USN에서의 OID 해석시스템에 관한 연구)

  • Yi, Seung-Jai;Jin, Chung-Hee;Kim, In-Hye;Noh, Enu-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.210-214
    • /
    • 2010
  • Standard about OID(Object Identifier) to implement on Internet is discussed at ITU-T, ISO/IEC. The OID should be stored and searched for object on Internet, which is called 'ORS(OID Resolution System)'. The ORS is made by international standard for identifying RFID code types, and in the future would be discussed for USN, u-Health, etc. Therefore, this paper describes the current status of the international standard discussing ORS concept, system structure and protocol, the present issue of the ORS used for RFID and the method for USN services.

Qos Enhancement in PCF of IEEE 802.11 through Simulation (시뮬레이션을 통한 IEEE 802.11 PCF의 QoS 향상에 관한 연구)

  • Kim Joong-jae;Kim Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1676-1682
    • /
    • 2005
  • PCF(Point Coordination Function) of IEEE 802.11 MAC protocol is an access method oat generally has better performance under high offered load conditions. And it is also appropriate for sending data of time-limited applications. In this paper we consider the QoS(Quality of Service) enhancement method according to the change of nodes in the IEEE 802.11 WLAN. We assume that the un consists or QoS nodes and non-QoS nodes. The QoS nodes has a mechanism to support QoS. we can find the appropriate network parameters by many simulations. And the changes of network status are considered according to the number of nodes.

Design of resource efficient network reprogramming protocol (자원 효율적인 네트워크 리프로그래밍 프로토콜 설계)

  • Choi, Rock-Hyun;Hong, Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.67-75
    • /
    • 2010
  • Network reprogramming is a technology that allows several sensor nodes deployed in sensor field to be repaired remotely. Unlike general communication in sensor network where small amount of data is transferred, network reprogramming requires reliable transfer of large amount of data. The existing network reprogramming techniques suffers high cost and large energy consumption to recover data loss in node communication. In this paper, a cluster based network reporgramming scheme is proposed for sensor network. It divides sensor field into several clusters and chooses a cluster header in charge of data relay to minimize duplicated transmission and unnecessary competition. It increases reliability by effective error recovery through status table.

Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection (실차기반 LIN-CAN 연계 통합 분석 테스트베드 개발과 초음파센서 물리적 오류주입 및 분석을 통한 효용성 검증)

  • Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.325-336
    • /
    • 2023
  • With the development of autonomous driving technology, the number of external contact sensors mounted on vehicles is increasing, and the importance is also rising. The vehicular ultrasonic sensor uses the LIN protocol in the form of a bus topology and reports a status message about its surroundings through the vehicle's internal network. Since ultrasonic sensors are vulnerable to various threats due to poor security protocols, physical testing on actual vehicle is needed. Therefore, this paper developed a LIN-CAN co-analysis testbed with a jig for location-specific distance test to examine the operational relation between LIN and CAN caused by ultrasonic sensors.

A Study on System of OCSP server for Services (OCSP서버의 지속적인 서비스를 위한 시스템 연구)

  • Shin, Jaehoon;Choi, Haelahng;Shin, Donghwi;Won, Dongho;Kim, Seungjoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1270-1273
    • /
    • 2007
  • 최근 인터넷의 급속한 발달은 온라인 뱅킹, 인터넷 쇼핑몰 등에서의 실물 경제행위를 온라인상으로 처리할 수 있는 환경을 제공하지만 온라인상의 업무처리는 개인정보유출, 개인정보의 위조 및 변조 등의 문제를 가지고 있다. 사용자가 CA에게서 받은 인증서의 공개키로 전자서명 함으로써 개인정보유출, 정보의 위조 및 변조 등의 문제를 해결한 PKI(Public Key Infrastructure)기반의 인증서 검증시스템이 제안되어 사용되고 있다. 인증서 상태검증 방법에는 CRL(Certificate Revocation List)기반의 검증방식, OCSP(Online Certificate Status Protocol)기반의 검증방식 등이 있다. CRL기반의 인증서 검증방식은 인증서 취소목록을 검색해서 인증서의 유효성 여부를 응답하는 방식으로 시간이 지남에 따라 크기 증가와 오프라인 방식으로 인해서 목록을 다운받는 시간의 부담으로 인해서 OCSP방식이 제안되었다. 하지만 OCSP 방식 역시 서비스의 요청이 집중될 경우 문제가 발생될 수 있다. 그래서 분산된 OCSP를 구축하고 각 서버의 부하의 균형을 유지하기 위해 로드밸런싱 기법을 사용하고 있지만 그 방법 역시 지속적인 서비스 제공이 불가한 문제를 가지고 있다. 본 논문에서는 서비스 요청의 집중으로 인한 시스템 마비나 각 응답서버의 부하가 불균형적임으로써 생길 수 있는 문제를 해결할 수 있는 방법을 제안한다.

  • PDF

A Study on the Legal Status of North Korean Defectors (북한 탈북자의 법적지위에 관한 고찰 - 난민인정과 보호를 중심으로 -)

  • Son, Hyun-Jin
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.109-147
    • /
    • 2017
  • North Korean defectors had left North Korea often to escape from food shortages in the mid-1990s. Since the 2000s, the reasons of their flee from North Korea have more resulted from their exposure to external information, and a desire for democracy and freedom. However, North Korean defectors living in China are not recognized as refugees and thus subject to various human rights violations including forced repatriation. It needs to be thought that wether North Korean defectors who escape from North Korea are political refugees under international law. If they are not recognized as refugees in their new countries, it is imperative to consider a possible way to protect their human rights under international law. The problem of recognition of the refugee status of a person is a matter of involving the sovereignty of individual countries, however, the Convention Relating to the Status of Refugees should provide protection of their unique rights, as recognizes by the UNHCR, and their status should be treated as a refugees issue in a broad sense. In the future, it is a necessary to establish international solidarity among individual countries, the UN General Assembly, the decisions of the Human Rights Council and support of UNHCR, to anticipate the need for the refugee recognition and the protection of International Human Rights in preparation for possible mass defections and refugees from North Korea.

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.