• Title/Summary/Keyword: update

Search Result 3,097, Processing Time 0.028 seconds

Flow Holding Time based Advanced Hybrid QoS Routing Link State Update in QoS Routing

  • Cho, Kang Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • In this paper, we propose a AH LSU(Advanced Hybrid QoS Routing Link State Update) Algorithm that improves the performance of Hybrid LSU(Hybrid QoS Link State State Update) Algorithm with statistical information of flow holding time in network. AH LSU algorithm has had both advantages of LSU message control in periodic QoS routing LSU algorithm and QoS routing performance in adaptive LSU algorithm. It has the mechanism that calculate LSU message transmission priority using the flow of statistical request bandwidth and available bandwidth and include MLMR(Meaningless LSU Message Removal) mechanism. MLMR mechanism can remove the meaningless LSU message generating repeatedly in short time. We have evaluated the performance of the MLMR mechanism, the proposed algorithm and the existing algorithms on MCI simulation network. We use the performance metric as the QoS routing blocking rate and the mean update rate per link, it thus appears that we have verified the performance of this algorithm.

A Public Key Traitor Tracing Scheme with Key-update Method (개인키 업데이트가 가능한 공개키 기반 공모자 추적 암호 알고리즘)

  • Lee, Moon-Shik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.46-56
    • /
    • 2012
  • Traitor Tracing schemes are broadcast encryption systems where at least one of the traitors who were implicated in the construction of a pirate decoder can be traced. This traceability is required in various contents delivery system like satellite broadcast, DMB, pay-TV, DVD and so on. In this paper, we propose a public key traitor tracing scheme with key-update method. If the system manager can update a secret key which is stored in an authorized decode, it makes a pirate decoder useless by updating a secret key A pirate decoder which cannot update a secret key does not decrypt contents in next session or during tracing a traitor, this scheme has merits which will make a pirate decoder useless, therefore this scheme raises the security to a higher level.

Reduction of Location Update Cost Using Hierarchical Architecture in PCS Networks

  • Shin, In-Hye;Park, Gyung-Leen;Choo, Hyun-Seung
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1090-1093
    • /
    • 2002
  • Location management schemes dealing with location information of moving terminals play an important role in the personal communications systems (PCS). Since the location management involves heavy signaling traffics to update the location information, reducing the location update cost becomes a critical research issue. This paper proposes a location management scheme which reduces the location update cost by employing the hierarchical structure in PCS environment. The paper also develops analytical models to evaluate the performance of the proposed scheme. The results obtained from the performance evaluation shows that the proposed scheme outperforms the conventional schemes in terms of the location update rates. Also, the difference in the performance becomes larger as the size of the location area (LA) becomes smaller and as the residual time of the mobile user becomes smaller.

  • PDF

Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update

  • Zhang, Xiangsong;Liu, Zhenhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2792-2810
    • /
    • 2017
  • Forward-secure signature is a specific type of signature, which can mitigate the damage caused by the signing key exposure. Most of the existing forward-secure (identity-based) signature schemes can update users' secret keys at each time period, achieve the existential unforgeability, and resist against classical computer attacks. In this paper, we first revisit the framework of forward-secure identity-based signatures, and aim at supporting flexible key update at multi time period. Then we propose a post-quantum forward-secure identity-based signature scheme from lattices and use the basis delegation technique to provide flexible key update. Finally, we prove that the proposed scheme is strongly unforgeable under the short integer solution (SIS) hardness assumption in the random oracle model.

An Enhanced Location-Based Location Update Scheme in Mobile Cellular Networks

  • Baek, Jang-Hyun;Seo, Jae-Young;Lim, Seog-Ku;Sicker, Douglas C.
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.457-460
    • /
    • 2005
  • In this study, we consider a location-based location update (LU) scheme. We propose an enhanced LU (ELU) scheme that can store more cells to reduce the location update cost of the LU scheme and show that the ELU scheme always outperforms the LU scheme. Our scheme can be easily implemented in actual cellular systems.

  • PDF

Performance evaluations of a link state update mechanism considering traffic variation (트래픽 변화를 고려한 링크 상태 업데이트 알고리즘의 성능 분석)

  • Choi Seung-hyuk;Jung Myoung Hee;Chung Min Young;Yang Mijeong;Kim Tae Il;Park Jaehyung
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.11a
    • /
    • pp.13-18
    • /
    • 2005
  • Routers determine routing path considering network topology and link state information for providing QoS (quality of service) guarantee. Therefore, it is important that routers know link state information to calculate routing path. However, if routers generate link state update messages inordinately, their router performance are reduced due to the process of link state update messages. On the other side, in case that link state information is not updated appropriately, route setup requests can be rejected even though there exist routes. In this paper, we propose an algorithm to improve router performance and evaluate the proposed algorithm performance compare with conventional algorithm by simulations.

  • PDF

Energy-Aware Node Selection Scheme for Code Update Protocol (코드 업데이트 프로토콜에서 에너지 잔존량에 따른 노드선정 기법)

  • Lee, Seung-Il;Hong, Won-Kee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.39-45
    • /
    • 2010
  • As wireless sensor network are being deployed in a wide variety of application areas, the number of sensor nodes in a sensor filed becomes larger and larger. In the past, ISP (In-System Programming) method have been generally used for code update but the large number of sensor nodes requires a new code update method called network reprogramming. There are many challenging issues for network reprogramming since it can make an impact on the network lifetime. In this paper, a new sender selection scheme for network reprogramming protocol is proposed to decrease energy consumption for code update by minimizing overlapped area between sender nodes and reducing data contention. Simulation results show that the proposed scheme can reduce the amount of message traffic and the overall data transmission time.

Location Update Scheme for IoT Devices through Opportunistic Fog Node (기회적 포그 노드를 활용한 IoT 기기의 위치 업데이트 방법)

  • Kyung, Yeunwoong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.789-795
    • /
    • 2021
  • In order to provide useful Internet of Things (IoT) services, the locations of IoT devices should be well managed. However, frequent location updates of lots of IoT devices result in signaling overhead in networks. To solve this problem, this paper utilizes the opportunistic fog node (OFN) which is opportunistically available according to the mobility to perform the location updates as a representative of IoT devices. Therefore, the location updates through OFN can reduce the signaling loads of networks. To show the performance of the proposed scheme, we develop an analytic model for the opportunistic location update offloading probability that the location update can be offloaded to OFN from the IoT device. Then, the extensive simulation results are given to validate the analytic model and to assess the performance of the proposed scheme in terms of the opportunistic location update offloading probability.

Predictive Location Management Strategy Using Two Directional Consecutive LAs in a Cellular Network (이동 통신망에서 방향성을 지닌 2개의 연속적 위치영역을 이용한 예측 위치 관리 전략)

  • Chang, I.K.;Hong, J.S.;Kim, J.P.;Lie, C.H.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.33 no.3
    • /
    • pp.43-58
    • /
    • 2008
  • In this paper, we have presented a dynamic, predictive location update scheme that takes into account each user's mobility patterns. A user's past movement history is used to create two-dimensional transition probability matrix which makes use of two directional consecutive location areas. A mobile terminal utilizes the transition probability to develop a predictive path which consists of several predictive nodes and then the location update is saved as long as a mobile user follows the predictive path. Using continuous-time Markov chain, cost functions of location update and paging are derived and it is shown that the number of predictive nodes can be determined optimally. To evaluate the proposed scheme, simulations are designed and the numerical analysis is carried out. The numerical analysis features user's mobility patterns and regularity, call arrival rates, and cost ratio of location update to paging. Results show that the proposed scheme gives lower total location management cost, compared to the other location update schemes.

A Vertical Handover Scheme Using Proxy Binding Update (프록시 바인딩 갱신을 이용한 수직적 핸드오버 기법)

  • Park, Hee-Dong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.15-20
    • /
    • 2010
  • This paper proposes a multihoming-based vertical handover scheme using Proxy binding update to minimize handover delay and packet loss while a mobile node moves to a heterogeneous access network. When a mobile node moves to a heterogeneous access network, the proposed scheme can provide a mobile node with fast and seamless handover by performing layer-3 handover using its new interface while the other interface is still communicating in the old access network. The proposed Proxy binding update is different from the Mobile IP binding update in that it includes home addres (HoA) of the old interface instead of the new interface. The performance analysis shows that the proposed scheme can efficiently reduce vertical handover delay and packet loss.