• Title/Summary/Keyword: topology management

Search Result 247, Processing Time 0.022 seconds

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

Reaching Byzantine Agreement underlying VANET

  • Wang, Shu-Ching;Lin, Ya-Jung;Yan, Kuo-Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3351-3368
    • /
    • 2019
  • The Internet of Things (IoT) enables machines and devices in a global network to connect and provide applications. The Vehicular Ad-hoc NETwork (VANET) allows vehicles in the network to communicate with each other as an application of the IoT. The safety and comfort of passengers can be improved through VANET related applications. In order to be able to provide related applications, there must be a reliable VANET topology. As a result of the Byzantine agreement (BA), fault tolerance can be solved in VANET. In order to improve the reliability of the system, even if some components in the system are damaged, a protocol is needed to assist the system to perform normally. Therefore, the BA problem in VANET with multiple impairments is revisited in this research. The proposed protocol allows all normal processing elements (PEs) to reach agreement using the least amount of information exchange. Moreover, the proposed protocol can tolerate the largest number of damaged PEs in VANET.

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.

Developed an output device for high-frequency cosmetic medical equipment using micro multi-needle (마이크로 멀티니들을 이용한 고주파 피부미용 의료기기를 위한 출력 장치 개발)

  • Kim, Jun-tae;Joo, Kyu-tai;Cha, Eun Jong;Kim, Myung-mi;Jeong, Jin-hyoung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • The entry of an aging society and the extension of human life expectancy, the increasing interest in women's social advancement and men's appearance, and the natural interest in K-culture through media media, while receiving worldwide attention, Focus on K-Bueaty. Recently, looking at the occupation of the medical tourism field, in the case of aesthetic medicine tourism such as molding and dermatology, it has gained popularity not only in Asia such as China and Japan, but also in North America and Europe. The first external confirmation of human aging is the wrinkles on the skin of the face. Clean, wrinkle-free, elastic and healthy skin is a desire of most people. Skin condition and condition such as focused ultrasonic stimulation (HIFU: High Intensity Focused Utrasound) and low frequency, high frequency (RF: Radio Frequency), galvanic therapy using microcurrent, cryotherapy using rapid cooling, etc. Depending on the method of management, the effect of the treatment differs depending on the output and the stimulation site, etc., even in the treatment of medical equipment and beauty equipment using the same mechanism. In this research, in order to develop invasive high-frequency dermatological devices using a large number of beauty medical devices and microneedles of beauty devices, the international standards IEC 60601-2 (standards for individual medical devices) and MFDS (Ministry of) We designed and developed a high-frequency output device in compliance with the high-frequency stimulation standard announced in the Food and Drug Safety (Ministry of Food and Drug Safety). The circuit design consists of an amplifier (AMP: Amplifier) using Class-A Topology and a power supply device using Half-Bridge Topology. As a result of measuring the developed high-frequency output device, an average efficiency of 63.86% was obtained, and the maximum output was measured at 116.7W and 50.67dBm.

Implementation of a P2P-based Data Sharing System using JXTA (JXTA를 이용한 P2P 기반 자료공유시스템(JDSS)의 구현)

  • 양광민;주형렬
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.1-22
    • /
    • 2003
  • P2P systems have been studied by many researchers in universities and commercial firms in recent years. In this study. we design and implement a system that makes UP for shortcomings of currently available P2P systems. Gnutella and Napster. The study also includes an efficiency analysis scheme conducted through a series of experimental data. The data sharing system of the study demonstrated duality of roles(client, service) of peers. But, their roles were separated from the existing client-server systems. Also, the study implements mechanism that shows the redundancy of data to communicate efficiently among peers for transferring data. The results of performance measure of the system shows that the amount of information shared by peers increases as the amount of peers increases but with no significant increase in response time. This constant response time is far more stable and faster than current file sharing systems. such as Gnutella and Napster. Business applications such as knowledge management, enterprise information portal management and transfer of data are done by use of supercomputers. They need to extend their systems to equip with more capacity and throughput as the number of clients increases. Moreover, they will face with more complicated problems if integration with new systems exists. If this JDSS is introduced to these business applications. it would easily augment scalability of the system with high performance at less expense.

  • PDF

Development of Common Database for the Application Programs of Distribution Management System (배전운영시스템용 응용 프로그램을 위한 공통 데이터베이스 구축)

  • Yun, Sang-Yun;Chu, Chul-Min;Kwan, Seong-Chul;Lee, Hak-Ju
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.9
    • /
    • pp.1199-1208
    • /
    • 2013
  • In recent years, the development of application programs for distribution system analysis and control has been essential part for distribution management system (DMS). In this paper, we propose the common database for application programs of distribution management system. The proposed database model has several characteristics as followings. First, the proposed database model is designed for the common use of almost the whole distribution application software. The static equipment model and dynamic type tables are mixed and the parallel table structure is applied. Second, the linked list structure of database are used for the fast processing of applications. The database model includes the hierarchy and non-hierarchy distribution system structure. Third, the reduction method of distribution database is applied. For this, we present the network reduction rules. The basic concept of reduction rules are the electrical unification of successive line section which has not lateral branches and the removal of simple lateral branches which has no devices and other laterals. Proposed database model is tested for the Jeju system of Korea Electric Power Corporation (KEPCO). Through the test, we verified that the proposed database structure can be effectively used to accomplish the distribution system operation.

HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks

  • Jiang, Rong;Luo, Jun;Wang, Xiaoping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2042-2060
    • /
    • 2013
  • In wireless sensor networks (WSNs), energy efficiency is one of the most essential design considerations, since sensor nodes are resource constrained. Group communication can reduce WSNs communication overhead by sending a message to multiple nodes in one packet. In this paper, in order to simultaneously resolve the transmission security and scalability in WSNs group communications, we propose a hierarchical cluster-based secure and scalable group key management scheme, called HRKT, based on logic key tree and route key tree structure. The HRKT scheme divides the group key into cluster head key and cluster key. The cluster head generates a route key tree according to the route topology of the cluster. This hierarchical key structure facilitates local secure communications taking advantage of the fact that the nodes at a contiguous place usually communicate with each other more frequently. In HRKT scheme, the key updates are confined in a cluster, so the cost of the key updates is reduced efficiently, especially in the case of massive membership changes. The security analysis shows that the HRKT scheme meets the requirements of group communication. In addition, performance simulation results also demonstrate its efficiency in terms of low storage and flexibility when membership changes massively.

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

Implementation of Automatic Power Management System using the Arduino and Beacons (아두이노와 비콘을 활용한 자동 전원 관리 시스템의 구현)

  • Kang, Bong-Gu;Yeo, Junki;Shim, Jaechang
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1471-1478
    • /
    • 2016
  • In this study, the system to manage the power automatically was implemented by using Arduino, Raspberry pi, and Beacon technologies. Before the research, pre-research was carried out with the analysis on the existing power management systems in the market in order to find a solution to reduce burdens from standby power and power waste with the increase of electric charges. The system is designed to be able to deliver and receive data through IEEE 802.15.4 wireless protocol, by using Xbee module. Arduino was tested to verify whether it is able to control SSR(Solid State Relay), and it was found that there is no problem. Meanwhile, it was also tested whether it is possible to organize a star topology network through Arduino and Raspberry Pi, and it was confirmed that normal wireless communication is possible through IEEE 802.15.4 wireless protocol. It is designed that the signal from Android smartphone application is to be delivered to Raspberry Pi and then, to be delivered to Arduino through Xbee so that Arduino could control SSR. In addition to this, wireless protocol required to control Arduino with Raspberry Pi is also designed and applied to this research.

Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks

  • Chen, Zhihong;Lin, Hai;Wang, Lusheng;Zhao, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1238-1259
    • /
    • 2019
  • Saving energy is a big challenge for Wireless Sensor Networks (WSNs), which becomes even more critical in large-scale WSNs. Most energy waste is communication related, such as collision, overhearing and idle listening, so the schedule-based access which can avoid these wastes is preferred for WSNs. On the other hand, clustering technique is considered as the most promising solution for topology management in WSNs. Hence, providing interference-free clustering is vital for WSNs, especially for large-scale WSNs. However, schedule management in cluster-based networks is never a trivial work, since it requires inter-cluster cooperation. In this paper, we propose a clustering method, called Interference-Free Clustering Protocol (IFCP), to partition a WSN into interference-free clusters, making timeslot management much easier to achieve. Moreover, we model the clustering problem as a multi-objective optimization issue and use non-dominated sorting genetic algorithm II to solve it. Our proposal is finally compared with two adaptive clustering methods, HEED-CSMA and HEED-BMA, demonstrating that it achieves the good performance in terms of delay, packet delivery ratio, and energy consumption.