Abstract:
A method and a system for distributing a key using an N dimension lattice of a sensor network are provided to reduce overhead for calculating a shared key and a pass key by distributing shared keys corresponding to a position on each axis in a sensor node. A distributing server performs one-to-one correspondence about positions inside an N dimension lattice and all sensor nodes, and performs one-to-one correspondence about positions on each axis of the N dimension lattice and a plurality of shared keys. The distributing server distributes the shared keys corresponding to the positions on each axis of a position inside the lattice of each sensor node(S10). The sensor node finds a shared key having a position on the same axis as the other sensor node, generates a symmetric key by the shared key, and transmits data to the other sensor node(S20). The sensor node transmits a pass key to the other sensor node via a direct middle node having a position on the same axis about the sensor node and the other sensor node(S30). The other sensor node decodes the data encrypted by the pass key and the symmetric key(S50).
Abstract:
A clustering routing method for energy and distance of a wireless sensor network and a device thereof are provided to make a size of a cluster small by increasing selection probability of a cluster head according to a distance to a data collecting device, thereby realizing uniform energy consumption of the cluster head. Each sensor node determines whether it is selected as a cluster head by probability having a bigger value as it is farther from a collecting device(S11). A sensor node which is not selected as a cluster head selects one among the selected cluster heads(S12). The sensor node transmits sensing information by the selected cluster head and the cluster head merges the sensing information and transmits it to a data collection device(S13).
Abstract:
A context aware integrated security system for user authentication and access control appropriate for ubiquitous computing environment is provided to manage all the context information appropriate for ubiquitous sensor network environment within a security management domain. A context aware integrated security system for user authentication and access control comprises a context aware security service manager, a context manager, and a security policy manager. The context aware security service manager manages policy, provides a security service and manages user authentication for the user authentication and the access control in a context aware system. The context manager, connected to the context aware security service manager, collects and manages the context needed for performing context-role based access control of the context aware security service manager. The security policy manager controls context aware security policy and manages a security policy database for managing the security policy of the context aware security service manager and the context manager.
Abstract:
PURPOSE: A wireless sensor network and a clustering method thereof are provided to minimize energy consumed for transferring data collected by sensor nodes to a base station. CONSTITUTION: A sensor field(400) includes a plurality of sensor nodes. The sensor field is divided into a plurality of clusters. The plurality of sensor nodes operates and is composed of one of a cluster head and a cluster node and the plurality of clusters. A base station(420) connects the sensor field and an external network. The base station receives data collected through the sensor field from the cluster head.
Abstract:
PURPOSE: A routing method and system of sensing data in a large-scale sensor network are provided to set up a cluster in order to arrange the uniform number of sensor nodes in each cluster. CONSTITUTION: In order to uniformly set up the number of sensor nodes that constitute each cluster, a concentric cluster is set up. According to the number of the preset clusters and the entire number of sensor nodes included in a wireless sensor network, the number of the sensor nodes is uniformly set up. The sensor nodes constituting the each cluster are formed in one chain. A head node merging the data transmitted form the sensor nodes connected in the chain is selected. The merged data are transmitted to the final data collection node.
Abstract:
A wireless sensor network and a clustering method therefor are provided to minimize the energy required for transmitting data, which is collected by sensor nodes, to a base station. A sensor field(400) comprises a plurality of sensor nodes. The sensor nodes operate as one among a cluster head and a cluster node. A base station(420) connects a sensor field to an external network, and receives data which is collected from the sensor field, from the cluster head.
Abstract:
A high performance web-based system for measuring and diagnosing end-to-end network performance and a method thereof are provided to measure end-to-end performance of a high performance network and transmission capacity per an interval that a user designates, thereby diagnosing a configuration state of a terminal device and an interval state of the network. A web client(10) provides network measurement and diagnosis information. A diagnosis client(20) collects a configuration state of a terminal device. The diagnosis client sets a measuring environment as a high performance network transmission environment. The diagnosis client transceives a test packet to measure end-to-end performance. A diagnosis manager(30) receives the configuration information and performance information collected and diagnosed from the diagnosis client. The diagnosis manager diagnoses a configuration state of a network and a configuration state of the terminal device.
Abstract:
The clustering base dynamic key managing method at the sensor network and the recording medium recording the same are provided to maximize the energy efficiency in the key redistribution process. The clustering base dynamic key management sensor network includes a plurality of sensor node(10) and sink node(20). The sensor node senses the information. The sink node collects the sensed information in the sensor node. Each sensor node has the only identifier. The sensor node stores the first secret key and pseudo random function as the secret information. The first secret key is used between the sink node and sensor node. The pseudo random function produces the random function by using ID and the first secret key of the sensor node. The sensor node distributes the key to the cluster unit.
Abstract:
A dual authentication method in a mobile network is provided to prevent a fail of the authentication in a ping-pong state and perform authentication of a mobile node in AAA(Authentication, Authorization, and Accounting) environment by preventing performing dual authentication when the mobile node reaches the ping-pong state. A dual authentication method in a mobile network includes the steps of: performing authentication for a mobile node by re-using authentication information used in a previous access router without requesting necessary information for the authentication to an AAA server. The dual authentication method is performed by using an IBE(Identifier Based Encryption) scheme. The dual authentication method is performed under mobile IPv6 environment. When the mobile node is under a ping-pong state which the mobile node moves to an overlapped space of a previous access router and a new access router, the mobile node generates a registration message based on a router advertisement message received from new access router.
Abstract:
A method for evaluating risk based on an asset analysis focused on a business process for security of an information system is provided to realize strict risk management by enabling an organization to expect a practical and correct risk analysis result value in consideration of business characteristics of the organization and an environment of the information system. A qualitative asset price is converted into a qualitative asset price(S100). A reference for weight of a secondary classification factor is determined in relation to a business process(S200). An asset is evaluated based on the qualitative asset price and the weight(S300). The reference for the risk and the security is determined(S400). The risk of the asset evaluated based on the reference for the risk and the security is evaluated(S500). The qualitative asset price is converted into the quantitative asset price based on a purchase cost, an annual operation expense, or a substitution cost.