Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 35, Issue 12C - Dec 2010
Volume 35, Issue 12B - Dec 2010
Volume 35, Issue 12A - Dec 2010
Volume 35, Issue 11C - Nov 2010
Volume 35, Issue 11B - Nov 2010
Volume 35, Issue 11A - Nov 2010
Volume 35, Issue 10C - Oct 2010
Volume 35, Issue 10B - Oct 2010
Volume 35, Issue 10A - Oct 2010
Volume 35, Issue 9C - Sep 2010
Volume 35, Issue 9B - Sep 2010
Volume 35, Issue 9A - Sep 2010
Volume 35, Issue 8C - Aug 2010
Volume 35, Issue 8B - Aug 2010
Volume 35, Issue 8A - Aug 2010
Volume 35, Issue 7C - Jul 2010
Volume 35, Issue 7B - Jul 2010
Volume 35, Issue 7A - Jul 2010
Volume 35, Issue 6C - Jun 2010
Volume 35, Issue 6B - Jun 2010
Volume 35, Issue 6A - Jun 2010
Volume 35, Issue 5C - May 2010
Volume 35, Issue 5B - May 2010
Volume 35, Issue 5A - May 2010
Volume 35, Issue 4C - Apr 2010
Volume 35, Issue 4B - Apr 2010
Volume 35, Issue 4A - Apr 2010
Volume 35, Issue 3C - Mar 2010
Volume 35, Issue 3B - Mar 2010
Volume 35, Issue 3A - Mar 2010
Volume 35, Issue 2C - Feb 2010
Volume 35, Issue 2B - Feb 2010
Volume 35, Issue 2A - Feb 2010
Volume 35, Issue 1C - Jan 2010
Volume 35, Issue 1B - Jan 2010
Volume 35, Issue 1A - Jan 2010
Selecting the target year
The Design of Blog Network Analysis System using Map/Reduce Programming Model
Joe, In-Whee ; Park, Jae-Kyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1259~1265
Recently, on-line social network has been increasing according to development of internet. The most representative service is blog. A Blog is a type of personal web site, usually maintained by an individual with regular entries of commentary. These blogs are related to each other, and it is called Blog Network in this paper. In a blog network, posts in a blog can be diffused to other blogs. Analyzing information diffusion in a blog world is a very useful research issue, which can be used for predicting information diffusion, abnormally detection, marketing, and revitalizing the blog world. Existing studies on network analysis have no consideration for the passage of time and these approaches can only measure network activity for a node by the number of direct connections that a given node has. As one solution, this paper suggests the new method of measuring the blog network activity using logistic curve model and Cosine-similarity in key words by the Map/Reduce programming model.
A Proposal and Evaluation of a Novel Binding Scheme in the NEMO Support in PMIPv6 Networks
Na, Yoo-Cheol ; Min, Sang-Won ; Kim, Bok-Ki ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1266~1271
In this paper, we describe overhead problems which result from the supporting NEMO in PMIPv6 networks, and propose a novel binding scheme for the network-based mobility management with new network-layer message which solves the problems of the additional tunnel. Our proposed binding scheme can reduce handover latency without mobility-related procedure by the hosts. A performance evaluation shows that the proposed scheme works more efficiently than the scheme which is proposed by the IETF NETLMM WG in terms of packet loss, handover latency and average packet throughput.
A Weighted Fair Packet Scheduling Method Allowing Packet Loss
Kim, Tae-Joon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1272~1280
WFQ (Weighted Fair Queuing) provides not only fairness among traffic flows in using bandwidth but also guarantees the Quality of Service (QoS) that individual flow requires, which is why it has been applied to the resource reservation protocol (RSVP)-capable router. The RSVP allocates an enough resource to satisfy both the rate and end-to-end delay requirements of the flow in condition of no packet loss, and the WFQ guarantees those QoS requirements with the allocated resource. In a practice, however, most QoS-guaranteed services, specially the Voice of IP, allow a few percent of packet loss, so it is strongly desired that the RSVP and WFQ make the best use of this allowable packet loss. This paper enhances the WFQ to allow packet loss and investigates its performance. The performance evaluation showed that allowing the packet loss of 0.4% can improve the flow admission capability by around 40 percent.
An Ant-based Routing Method using Enhanced Path Maintenance for MANETs
Woo, Mi-Ae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1281~1286
Ant-based routing methods belong to a class of ant colony optimization algorithms which apply the behavior of ants in nature to routing mechanism. Since the topology of mobile ad-hoc network(MANET) changes dynamically, it is needed to establish paths based on the local information. Subsequently, it is known that routing in MANET is one of applications of ant colony optimization. In this paper, we propose a routing method, namely EPMAR, which enhances SIR in terms of route selection method and the process upon link failure. The performance of the proposed method is compared with those of AntHocNet and SIR. Based on he analysis, it is proved that the proposed method provided higher packet delivery ratio and less critical link failure than AntHocNet and SIR.
Performance Improvement of the Payload Signature based Traffic Classification System
Park, Jun-Sang ; Yoon, Sung-Ho ; Park, Jin-Wan ; Lee, Hyun-Shin ; Lee, Sang-Woo ; Kim, Myung-Sup ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1287~1294
The traffic classification is a preliminary and essential step for stable network service provision and efficient network resource management. While a number of classification methods have been introduced in literature, the payload signature-based classification method shows the highest performance in terms of accuracy, completeness, and practicality. However, the payload signature-based method has a significant drawback in high-speed network environment that the processing speed is much slower than other classification method such as header-based and statistical methods. In this paper, We describes various design options to improve the processing speed of traffic classification in design of a payload signature based classification system and describes our selections on the development of our traffic classification system. Also the feasibility of our selection was proved through experimental evaluation on our campus traffic trace.
Fault Tolerant Data Aggregation for Reliable Data Gathering in Wireless Sensor Networks
Baek, Jang-Woon ; Nam, Young-Jin ; Jung, Seung-Wan ; Seo, Dae-Wha ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1295~1304
This paper proposes a fault-tolerant data aggregation which provides energy efficient and reliable data collection in wireless sensor networks. The traditional aggregation scheme does not provide the countermeasure to packet loss or the countermeasure scheme requires a large amount of energy. The proposed scheme applies caching and re-transmission based on the track topology to the adaptive timeout scheduling. The proposed scheme uses a single-path routing based on the traditional tree topology at normal, which reduces the dissipated energy in sensor nodes without any countermeasure against packet loss. The proposed scheme, however, retransmits the lost packet using track topology under event occurrences in order to fulfill more accurate data aggregation. Extensive simulation work under various workloads has revealed that the proposed scheme decrease by 8% in terms of the dissipated energy and enhances data accuracy 41% when the potential of event occurrence exists as compared with TAG data aggregation. And the proposed scheme decrease by 53% in terms of the dissipated energy and shows a similar performance in data accuracy when the potential of event occurrence exists as compared with PERLA data aggregation.
Hybrid Priority Medium Access Control Scheme for Wireless Body Area Networks
Lee, In-Hwan ; Lee, Gun-Woo ; Cho, Sung-Ho ; Choo, Sung-Rae ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1305~1313
Last few years, wireless personal area network (WPAN) has been widely researched for various healthcare applications. Due to restriction of device hardware (e.g., energy and memory), we need to design a highly-versatile MAC layer protocol for WBAN (Wireless Body Area Network). In addition, when an emergency occurs to a patient, a priority mechanism is necessitated for a urgent message to get through to the final destination. This paper presents a priority mechanism referred to as hybrid priority MAC for WBAN. Through extensive simulation, we show the proposed MAC protocol can minimize the average packet latency for urgent data. Thus, when patients have an emergency situation, our MAC allows adequate assistance time and medical treatment for patients. The simulation based on NS-2 shows that our Hybrid Priority MAC has the good performance and usability.
Implementation of Testbed of Guidance System for Docking of Ship Using Location Based UWB Sensor
Shin, Do-Sung ; Lee, Seong-Ro ; Oh, Il-Hwan ; Jung, Min-A ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1314~1321
This system configures a position Sensor as installing on the ship and a guidance system docking of ship what distinguish of the ship about the use and size. The maintain system is received the result of distinction via UWB reader. This system send a information of ship of docking position to user. Thus it suggests the safety to prevent from crash among ships and saves energy and stop waste. The proposed system periodically updates the information of docking position of the ship and monitors in real-time according to the user's request from personal mobile devices. In this paper, we implement of a guidance system Testbed for docking of the ship using position UWB sensor. And user is provided convenience to find easily user's ship in docking area through user interface with Java. Addedly it is possible to prevent ship theft.
Power Efficient Classification Method for Sensor Nodes in BSN Based ECG Monitoring System
Zeng, Min ; Lee, Jeong-A ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1322~1329
As body sensor network (BSN) research becomes mature, the need for managing power consumption of sensor nodes has become evident since most of the applications are designed for continuous monitoring. Real time Electrocardiograph (ECG) analysis on sensor nodes is proposed as an optimal choice for saving power consumption by reducing data transmission overhead. Smart sensor nodes with the ability to categorize lately detected ECG cycles communicate with base station only when ECG cycles are classified as abnormal. In this paper, ECG classification algorithms are described, which categorize detected ECG cycles as normal or abnormal, or even more specific cardiac diseases. Our Euclidean distance (ED) based classification method is validated to be most power efficient and very accurate in determining normal or abnormal ECG cycles. A close comparison of power efficiency and classification accuracy between our ED classification algorithm and generalized linear model (GLM) based classification algorithm is provided. Through experiments we show that, CPU cycle power consumption of ED based classification algorithm can be reduced by 31.21% and overall power consumption can be reduced by 13.63% at most when compared with GLM based method. The accuracy of detecting NSR, APC, PVC, SVT, VT, and VF using GLM based method range from 55% to 99% meanwhile, we show that the accuracy of detecting normal and abnormal ECG cycles using our ED based method is higher than 86%.
Performance Improvement of Power Analysis Attacks based on Wavelet De-noising
Kim, Wan-Jin ; Song, Kyoung-Won ; Lee, Yu-Ri ; Kim, Ho-Won ; Kim, Hyoung-Nam ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1330~1341
Power analysis (PA) is known as a powerful physical attack method in the field of information security. This method uses the statistical characteristics of leaked power consumption signals measured from security devices to reveal the secret keys. However, when measuring a leakage power signal, it may be easily distorted by the noise due to its low magnitude values, and thus the PA attack shows different performances depending on the noise level of the measured signal. To overcome this vulnerability of the PA attack, we propose a noise-reduction method based on wavelet de-noising. Experimental results show that the proposed de-noising method improves the attack efficiency in terms of the number of signals required for the successful attack as well as the reliability on the guessing key.
IPSec based Network Design for the Mobile and Secure Military Communications
Jung, Youn-Chan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1342~1349
Full-mesh IPSec tunnels, which constitute a black network, are required so that the dynamically changing PT (Plain Text) networks can be reachable across the black network in military environments. In the secure and mobile black networks, dynamically re-configuring IPSec tunnels and security policy database (SPD) is very difficult to manage. In this paper, for the purpose of solving mobility and security issues in military networks, we suggest the relating main technologies in association with DMIDP (Dynamic Multicast-based IPSec Discovery Protocol) based on existing IPSec ESP (Encapsulating Security Payload) tunnels and IPSec key managements. We investigate the main parameters of the proposed DMIDP techniques and their operational schemes which have effects on mobility and analyze operational effectivemess of the DMIDP with proposed parameters.
A Storage and Computation Efficient RFID Distance Bounding Protocol
Ahn, Hae-Soon ; Yoon, Eun-Jun ; Bu, Ki-Dong ; Nam, In-Gil ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1350~1359
Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by
Design and Implementation of RFID based Tree History Information System for Cultural Heritage Restoration
Kim, Sam-Geun ; Moon, Il-Hwan ; Park, Jae-Pyo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1360~1368
Recently, as the development of Radio Frequency Identification (RFID) technology becomes active, the demand for services which can electronically manage the history and location information of major trees, including trees for cultural heritage restoration and nurse trees, has been increased. This information has been managed by separated drawings and documents or storing its information into PDAs and then structuring data files through input and computation. But, these methods imply limitations in terms of its extensibility and scalability. This paper has designed and implemented an RFID based Tree History Information System (THIS) for cultural heritage restoration. The purpose of the proposed system is to support to be able to effectively and consistently manage historical information of major trees and improve working processes by implementing mobile RFID services through wireless Internet or Local Area Network (LAN) as mobile communication networks. Through implementation, it is confirmed that the proposed system can manage the historical information of major trees more effectively than conventional methods and also improve previous field working conditions.
New Pre-processing Method for Second-Order CPA on the IT Convergence Device
Lee, Chul-Hee ; Hwang, Ah-Reum ; Lee, Dong-Geon ; Kim, Hyoung-Nam ; Kim, Ho-Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1369~1380
In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.
Magnetic Induction Communication System for Electric Vehicle on Smart Grid
Lee, Jong-Min ; Chang, Woo-Hyuk ; Jung, Bang-Chul ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1381~1389
The smart grid technology is expected to significantly improve energy efficiency by dynamic power supply. One of its application is the Vehicle-to-Grid(V2G) that utilizes an electric vehicle's battery as a household storage battery. Meanwhile, a lot of researches are recently investigated in the area of wireless energy transfer technology because of its convenience and safety in charging a battery. With the wireless energy transfer infrastructure a wireless magnetic induction communication technique can help the dynamic power supply of the smart grid more efficient. In this paper, we propose a wireless magnetic induction communication sion cowhich includes data transmission and location-aware functions. We expect the sion cohelp the smart grid to control power supply more efficiently. We also developed its test-bed and evaluated the performance.
IEEE 802.11s based Wireless Mesh Networks for Smart Grid
Jung, Ji-Sun ; Kim, Jae-Beom ; Ko, Young-Bae ; Lee, Sang-Youm ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1390~1398
We present the concept of applying Wireless Mesh Networking (WMN) technology into Smart Grid, which is recently rising as a potential technology in various areas thanks to its advantages such as low installation costs, high scalability, and high flexibility. Smart Grid is an intelligent, next-generation electrical power network that can maximize energy efficiency by monitoring utility information in real-time and controlling the flow of electricity with IT communications technology converged to the existing power grid. WMNs must be designed for Smart Grid communication systems considering not only the high level of reliability, QoS support and mass-data treatment but also the properties of the traditional power grid. In addition, it is essential to design techniques based on international standards to support interoperability and scalability. In this paper, we evaluate the performance of IEEE 802.11s based Smart Grid Mesh Networks by conducting preliminary simulation studies with the ns-3 simulator. We also outline some challenging issues that should be reviewed when considering WMNs as the candidate for Smart Grid communication infrastructure.
Customer Willingness to Use Smart Grid Services in Home
Kim, Young-Myoung ; Lee, Young-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1399~1406
Customers can monitor electricity use in real time in smart grid(ICT is grafted onto current grid), so various beneficial services can be provided to customer. We did a qualitative survey, HV(Home Visit) and FGD(Focus Group Discussion), in order to derive customer's cognition of using electricity in home and values that customers consider significantly and a quantitative survey in order to know willingness to use. Customers consider electricity indispensible for using home appliances, want to use safely far from electromagnetic waves, short circuit and electronic shock. Also, customers want to save energy conveniently with no stress. Customers want 'a function', 'information', 'motivation' for energy saving, and 'electromagnetic waves cutting', 'to prevent electronic shock', 'to prevent short circuit' for safe electricity use. In this study, we derived 4 services - energy monitoring, standby power cutting, remote control, energy consulting - based on customer values and unmet needs, which is connected to home network that customers can monitor total and each appliance's electricity usage in real time and control home appliances. The willingness to use of services is over 60% and especially energy monitoring and standby power cutting service have high willingness to use rate, about 80%.
Optimization of Home Loads scheduling in Demand Response
Kim, Tae-Wan ; Lee, Sung-Jin ; Lee, Sang-Hoon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1407~1415
In recent years, the smart grid technique for maximizing the energy efficiency of power networks has received a great deal of attentions. In particular, the Demand Response is a core technology differentiated from the present power network under the smart grid paradigm. To minimize the electric cost and maximize users' satisfaction, this paper proposes a unique scheduling algorithm derived by using optimization where the characteristics of various home appliances are taken into account. For this goal, we represent mathematical consumption patterns of the electric loads and propose the optimal scheduling scheme based on the importance factor of each device during one day. In the simulation results, we demonstrate the effectiveness of the proposed algorithm in the viewpoint of the minimal electric costs utilizing real statistical figures.
A Study on the Prospective IT R&D Fields in the Smart Grid Area
Sim, Jin-Bo ; Ha, Young-Wook ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 9B, 2010, Pages 1416~1427
Except for some fields, Smart Grid-related technology in Korea is considered to be below the level of developed countries. Under this situation, this study is conducted to look into IT technology related to Smart Grid and draw prospective IT R&D fields in the Smart Grid Industry. To seek out prospective IT R&D fields, the two-stage process evaluating economics, political property, and technical validity. According to the result, four fields of (1) sensor, (2) information protection, (3) AMI middleware, (4) electricity management are selected as prospective fields. The sensor and AMI middleware fields focus on development of key technology, so the strategy that launches leading products in global market faster than other countries(Focusing & First Mover Strategy). The information protection felid is divided into the safety technology for the felid electricity network and the personal & corporate information protection technology, and therefore the R&D Sharing strategy is efficient. For the electricity management filed, a strategic alliance for developing component technology of Grid is desirable.