Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Dmitry Korzun is active.

Publication


Featured researches published by Dmitry Korzun.


NEW2AN | 2013

Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges

Dmitry Korzun; Sergey Balandin; Andrei V. Gurtov

The smart spaces paradigm and the M3 concept have already showed their potential for constructing advanced service infrastructures. The Internet of Things (IoT) provides the possibility to make any “thing” a user or component of such a service infrastructure. In this paper, we consider the crucial design challenges that smart spaces meet for deploying in IoT: (1) interoperability, (2) information processing, (3) security and privacy. The paper makes a step toward a systematized view on smart spaces as a computing paradigm for IoT applications. We summarize the groundwork from pilot M3 implementations and discuss solutions to cope with the challenges. The considered solutions can be already used in advanced service infrastructures.


NEW2AN'11/ruSMART'11 Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networking | 2011

Integration of smart-M3 applications: blogging in smart conference

Dmitry Korzun; Ivan V. Galov; Alexey M. Kashevnik; Nikolay Shilov; Kirill Krinkin; Yury Korolev

Smart spaces provide a shared view of dynamic resources and context-aware services within a distributed application. There is, however, no standard scheme for integration of several independent applications. In this paper we analyze two particular smart space-based applications: Smart Conference system that assists conferencing process online and SmartScribo system that provides advanced access to the blogosphere. For this reference use case we propose a scheme of their integration that employs an agent to share knowledge between the origin applications. The initial implementation was demonstrated in the 9th FRUCT Conference and indicates the applicability of our approach.


Proceedings of 16th Conference of Open Innovations Association FRUCT | 2014

Fault tolerance support of smart-M3 application on the software infrastructure level

Ivan V. Galov; Dmitry Korzun

The Smart-M3 platform allows constructing software applications consisting of agents that interact by sharing information in a smart space. An important problem is achieving the dependability of applications in case of failures, a common situation for existing networked environments. The most sensitive operation is subscription-a persistent networked query. In this paper, we consider a generic software infrastructure for a Smart-M3 application and propose infrastructure-level solutions to support the application fault tolerance. Our first solution augments the infrastructure with a content service. It improves safety (preservation) and integrity of volumetric data due to the delegation of storage functions to a separate element of the application infrastructure. The service employs the wellknown matured web technology. The second solution consists of mechanisms for the fault tolerance support to detect failures of subscription and to recover effectively. For case study, we use an existing Smart-M3 application-the SmartRoom system. Our evaluation confirms that our solutions lead to better dependability without essential degradation of the performance.


world of wireless mobile and multimedia networks | 2014

Security for medical sensor networks in mobile health systems

Ilya Nikolaevskiy; Dmitry Korzun; Andrei V. Gurtov

Emerging Internet of Things (IoT) technologies and mobile health scenarios provide opportunities for enhancing traditional healthcare systems. Yet current development meets the challenge of sensing patients health data with strong security guarantees in mobile and resource-constrained settings as well as in emergency situations. This paper presents a generic IoT-aware system architecture that enables security of personal mobile data and their transfer to healthcare services. Our security solutions apply the Host Identity Protocol. We validate the efficiency using a prototype implementation.


International Conference on Next Generation Wired/Wireless Networking | 2014

A Notification Model for Smart-M3 Applications

Ivan V. Galov; Dmitry Korzun

Smart-M3 platform supports development of applications consisting of autonomous knowledge processors that interact by sharing information in a smart space. In this paper, we introduce a notification model for ontology-based design and programming of interactions in such applications. Our model is based on the two Smart-M3 fundamentals: subscription operation and RDF representation. The applicability is demonstrated on the case study of SmartScribo system for multi-blogging and on simulation experiments for performance evaluation.


Archive | 2013

Structured Peer-to-Peer Systems

Dmitry Korzun; Andrei V. Gurtov

The aim of this chapter is to introduce first the basic concepts, terminology, and notation we use throughout this book. Although the term “structure” is central in our discussion on structured P2P networks, its definition is quite fuzzy in recent P2P literature. Secondly, the chapter aims at common understanding about intuition and reasons behind this term. The description is assisted with introduction to a set of challenging problems that the P2P networking faces today.


Computer Communications | 2006

On scalability properties of the Hi3 control plane

Dmitry Korzun; Andrei V. Gurtov

The Host Identity Indirection Infrastructure (Hi3) is a general-purpose networking architecture, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP). Hi3 combines efficient and secure end-to-end data plane transmission of HIP with robustness and resilience of i3. The architecture is well-suited for mobile hosts given the support for simultaneous host mobility, rendezvous and multi-homing. Although an Hi3 prototype is implemented and tested on PlanetLab, scalability properties of Hi3 for a large number of hosts are unknown. In this paper, we propose a simple model for bounds of size and latency of the Hi3 control plane for a large number of clients and in the presence of DoS attacks. The model can be used for a first approximation study of a large-scale Internet control plane before its deployment. We apply the model to quantify the performance of the Hi3 control plane. Our results show that the Hi3 control plane can support a large number of mobile hosts with acceptable latency.


Proceedings of 16th Conference of Open Innovations Association FRUCT | 2014

User presence detection based on tracking network activity in smartroom

Sergey A. Marchenkov; Dmitry Korzun

The SmartRoom system provides a set of services for assisting collaborative activity when many participants are physically present in the same room. The SmartRoom service intelligence is due to the use of diverse sources of information on ongoing activity. One promising source is information on user presence and network activity of the participants. In this paper, we consider the problem of utilizing such an information source for smart spaces based on the Smart-M3 platform. We employ the Innorange technology, which is one of the many examples for passive radio detection in WLAN. We define scenarios with this information source for use in SmartRoom services. We propose an integration solution oriented to Smart- M3 applications. Our software prototype is integrated into the SmartRoom system. Experimental study confirms the feasibility and reasonable performance of the proposed solution.


Computer Networks | 2011

CR-Chord: Improving lookup availability in the presence of malicious DHT nodes

Boris Nechaev; Dmitry Korzun; Andrei V. Gurtov

Distributed Hash Tables (DHTs) provide a useful key-to-value lookup service for many Internet applications. However, without additional mechanisms DHTs are vulnerable to attacks. In particular, previous research showed that Chord is not well resistant to malicious nodes that joined the DHT. We introduce the cyclic routing algorithm as an extension of Chord (CR-Chord). Using simulations we compare the lookup availability of Chord and CR-Chord. The results suggest that CR-Chord improves the lookup availability on the average by 1.4 times. When the number of malicious nodes is small, such as 5%, CR-Chord has almost twice lower lookup failure rate.


Proceedings of 16th Conference of Open Innovations Association FRUCT | 2014

Active control by a mobile client of subscription notifications in smart space

Andrey S. Vdovenko; Dmitry Korzun

Smart space supports interaction of multiple participants though information sharing. This kind of interaction is indirect and networked. For detection of changes, which come in parallel from other participants, a participant applies the subscription operation. It allows receiving notifications passively on a regular basis. Absolutely dependable delivery of notifications cannot be guaranteed in modern computing environments. In particular, wireless networks are subject of frequent faults, making the subscription operation less reliable for mobile clients in smart spaces. In this paper, we study the problem of active control by a client in receiving subscription notifications. We introduce a simple mathematical model for control the check interval for subscription notifications, which ensures client adaptation to the notification loss rate.

Collaboration


Dive into the Dmitry Korzun's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ivan V. Galov

Petrozavodsk State University

View shared research outputs
Top Co-Authors

Avatar

Andrey S. Vdovenko

Petrozavodsk State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nikolay Shilov

Saint Petersburg State University

View shared research outputs
Top Co-Authors

Avatar

Sergey A. Marchenkov

Petrozavodsk State University

View shared research outputs
Top Co-Authors

Avatar

Boris Nechaev

Helsinki Institute for Information Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge