Àüü
ÀüÀÚ/Àü±â
Åë½Å
ÄÄÇ»ÅÍ
·Î±×ÀÎ
ȸ¿ø°¡ÀÔ
About Us
ÀÌ¿ë¾È³»
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
Æ÷Ä¿½ºiN
¿¬±¸ÀÚ Á¤º¸
¶óÀÌ¡½ºÅ¸
ÆÄ¿öiNÅͺä
¼¼ÁßÇÑ
¿¬±¸ÀÚ·á
¹®ÀÚ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñÁ¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
´Ý±â
»çÀÌÆ®¸Ê
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±³À°Á¤º¸
¿¬±¸ ù°ÉÀ½
ÇаúÁ¤º¸
°ÀÇÁ¤º¸
µ¿¿µ»óÁ¤º¸
E-Learning
¿Â¶óÀÎ Àú³Î
½ÉÈÁ¤º¸
¿¬±¸ ¹× ±â¼úµ¿Çâ
Áֿ俬±¸ÅäÇÈ
ÁÖ¿ä°úÁ¦ ¹× ±â°ü
Çؿܱâ°ü °ü·ÃÀÚ·á
¹ÙÀÌ¿À Á¤º¸±â¼ú
ÁÖ¿ä Archive Site
ÄÄÇ»ÅÍiN
¿¬±¸ÀÚ Á¤º¸
¿¬±¸ÀÚ·á
¹®ÀÚ DB
Ȧ·Î±×·¥ DB
¿ë¾î»çÀü
¾Ë¸²¸¶´ç
ºÎ½Ç ÇмúÈ°µ¿ ¿¹¹æ
³í¹®¸ðÁý
´ëȸ¾È³»
What's New
¿¬±¸ºñ Á¤º¸
±¸ÀÎÁ¤º¸
°øÁö»çÇ×
IT Daily
CSERIC ±¤Àå
Post-Conference
¿¬±¸ÀÚ Ä«Æä
ÀÚÀ¯°Ô½ÃÆÇ
Q&A
¼ºñ½º ¹Ù·Î°¡±â
¼³¹®Á¶»ç
¿¬±¸À±¸®
°ü·Ã±â°ü
Please wait....
¿¬±¸¹®Çå
±¹³» ³í¹®Áö
¿µ¹® ³í¹®Áö
±¹³» ÇÐȸÁö
Çмú´ëȸ ÇÁ·Î½Ãµù
±¹³» ÇÐÀ§ ³í¹®
³í¹®Á¤º¸
¹é¼
±¹³» ³í¹®Áö
Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö >
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö
>
Á¤º¸°úÇÐȸ ³í¹®Áö I : Á¤º¸Åë½Å
Á¤º¸°úÇÐȸ ³í¹®Áö I : Á¤º¸Åë½Å
Current Result Document :
5
/ 5
ÀÌÀü°Ç
ÇѱÛÁ¦¸ñ(Korean Title)
ȯ°æ ¿äÀο¡ µû¸¥ ħÀÔ Å½Áö ¼¾¼ ³×Æ®¿öÅ©ÀÇ ±¸¼º ÃÖÀûÈ ¹æ¾È
¿µ¹®Á¦¸ñ(English Title)
Optimal Configuration Method of Sensor Network for Intrusion Detection by Considering Environmental Factors
ÀúÀÚ(Author)
Á¤¿¹¿ø
¹Ú±¤ÀÏ
±è°æ¹Î
È«Áؼ®
±èÇÐÁø
±è¿ìÁÖ
Yewon Jeong
Kwang Il Park
Kyungmin Kim
June Seok Hong
Hak-jin Kim
Wooju Kim
¿ø¹®¼ö·Ïó(Citation)
VOL 19 NO. 11 PP. 0581 ~ 0585 (2013. 11)
Çѱ۳»¿ë
(Korean Abstract)
º» ³í¹®Àº °¨½Ã Á¤Âû ±â´ÉÀÇ ¼º°ÝÀ» º¸ÀÌ´Â ¼¾¼ µéÀÇ ÁýÇÕüÀÎ ¡®¼¾¼ ³×Æ®¿öÅ©¡¯ ±â¹ÝÀ¸·Î ¿¬±¸µÇ¾ú´Ù. ±¸Ãà µÈ ¼¾¼ ³×Æ®¿öÅ©¿¡ HMM(Hidden Markov Model)À» Àû¿ëÇÔÀ¸·Î½á ´Ù¼öÀÇ ¼¾¼°¡ ¹ß»ý½ÃÅ°´Â º¹ÇÕ Á¤º¸¸¦ ½Ã/°ø°£ÀûÀ¸·Î À¶ÇÕÇÏ¿´°í, À̸¦ ÅëÇØ ÃÖ»óÀÇ Ä§ÀÔÀÚ Å½Áö °á°ú¸¦ µµÃâÇÏ¿´´Ù. º» ¿¬±¸¿¡¼ÀÇ ¼¾¼ ³×Æ®¿öÅ©´Â ħÀÔÀÚ Å½Áö¸¦ ¸ñÇ¥·Î Çϸç, ¼¾¼ ³×Æ®¿öÅ©ÀÇ Ä§ÀÔÀÚ Å½Áö ¼º°ø È®·üÀ» ¡®Ä§ÀÔÀÚ Å½Áö ¼º°ø·ü¡¯À̶ó Á¤ÀÇÇÏ¿´´Ù. ¶ÇÇÑ, ³¯¾¾, ÁöÇü°ú °°Àº ¿ÜÀû ¿äÀÎÀÌ ¼¾¼ ³×Æ®¿öÅ©ÀÇ Ä§ÀÔÀÚ Å½Áö ¼º°ø·ü¿¡ ¹ÌÄ¡´Â ¿µÇâ°ú ¼¾¼ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â ¼¾¼µéÀÇ ¼¾¼ Á¶ÇÕ º¯°æÀÌ Ä§ÀÔÀÚ Å½Áö ¼º°ø·ü¿¡ ¹ÌÄ¡´Â ¿µÇâÀ» ºÐ¼®Çϱâ À§ÇÏ¿© ´Ù¾çÇÑ ½ÇÇèÀ» ¼öÇàÇÏ¿´´Ù. Áï, ȯ°æÀÌ ´Ù¾çÇÏ°Ô º¯ÈÇÒ ¶§ÀÇ ¼¾¼ ³×Æ®¿öÅ© ¼º´É º¯È ºÐ¼®°ú ¼¾¼ ³×Æ®¿öÅ©¸¦ ±¸¼ºÇÏ´Â ¼¾¼ Á¶ÇÕÀ» º¯°æÇÏ¿´À» ¶§ÀÇ ¼¾¼ ³×Æ®¿öÅ© ¼º´É º¯È¸¦ °üÂûÇÏ¿´´Ù. ³ª¾Æ°¡ À§ ½ÇÇè °á°ú¸¦ Åä´ë·Î Á¶°Ç¿¡ °¡Àå ¾Ë¸ÂÀº ÃÖÀûÀÇ ¼¾¼ ³×Æ®¿öÅ© ±¸¼º ¹æ¾ÈÀ» ¸ð»öÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
This research was conducted based on sensor network which has a surveillance and reconnaissance functions. We applied HMM to the sensor network and fused with temporal and spatial information generated from a large number of sensors in order to derive the best results. The goal of this study is a intruder detection on the sensor network. Thus, we defined an intruder detection probability as ¡®Intruder Detection Success Rate¡¯. To analyze whether or not the intruder detection success rate has an impact on external factors such as weather, terrain and combination alterations of sensors, various experiments(simulations) were conducted. We evaluated performance of sensor network in various environments and combination alterations of sensors. And then, we sought for the optimal sensor network based on experimental results above.
Å°¿öµå(Keyword)
¼¾¼ ³×Æ®¿öÅ©
ȯ°æ ¿äÀÎ
ħÀÔÀÚ Å½Áö
HMM
ȯ°æ
sensor network
environmental factors
intruder detection
HMM
environment
ÆÄÀÏ÷ºÎ
PDF ´Ù¿î·Îµå
¸ñ·Ï
Copyright(c)
Computer Science Engineering Research Information Center
. All rights reserved.