• Title/Summary/Keyword: 갱신 프로토콜

Search Result 198, Processing Time 0.023 seconds

A Study on Personal Environment Service on the Smartphone (스마트폰 중심의 개인환경서비스 연구)

  • Yun, Ho-Young;Kim, Jong-Ho;Park, Sun-Hwa;Jung, So-Hee;Ro, Kwang-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1169-1172
    • /
    • 2011
  • 본 연구는 고가의 인프라 구축이라는 제약 때문에 현재까지 기초적인 수준에 머물러있는 홈 네트워크의 문제점을 극복하고자 제안된 스마트폰 중심의 개인환경서비스(PES : Personal Environment Service)를 연구하였다. 개인환경서비스는 스마트폰과 무선랜, 블루투스 등의 모듈이 탑재된 가전기기와 근거리 무선통신으로 사용자의 선호도를 저장하고 있는 프로파일을 교환하여 가전기기를 자동으로 설정해 주며 프로파일은 서비스 서버에도 전송되어 지속적으로 갱신, 사용자에게 편리한 생활을 제공해 준다. 본 연구는 이러한 스마트폰 중심의 개인환경서비스의 데모 시스템 구조 및 시연 시스템을 구축하였다. 데모시스템의 스마트폰 플랫폼은 구글 사의 안드로이드 2.2 (Froyo) 버전이며, 지능형 가전기기와는 블루투스 통신을 통해 사용자와 서비스 프로파일을 교환한다. 가전기기는 PC, 난방기기, 가스렌지, TV, 라디오 총 5가지를 구현하였는데 실제 가전기기를 구현할 수 없는 한계로 인해 PC를 제외한 가전기기는 블루투스 임베디드 보드에 LCD 디스플레이를 설치한 모의(pseudo) 가전기기로 대체하였다. 스마트폰에 저장되어 있는 사용자 프로파일은 각각의 가전기기별 선호도를 환경설정을 통해 설정할 수 있게 하였고, 선호도를 설정하면 가전기기는 블루투스 통신으로 스마트폰의 사용자 프로파일을 전송받아 자동 설정해 준다. 서비스 서버는 스마트폰과 가전기기의 모든 로그를 전송받아 패턴분석 과정을 거쳐 사용자의 프로파일을 자동으로 설정해주어서 사용자는 개인에게 최적화된 생활환경을 제공받게 된다. 개인환경서비스는 현재 표준화 규격 개발을 위해 제조업체, 이동통신사, 연구소, 대학교 등에서 활발히 연구 중에 있으며, 향후에는 현재까지 개발된 데모 시스템을 토대로 프로토콜을 연구, 수립하여 표준화 규격 개발에 기여할 예정이다.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.

A Novel Integration Mechanism of FMIPv6 and HMIPv6 to Reduce Loss and Out-of-Sequence Problem (패킷 손실과 순서 어긋남 문제를 해결할 수 있는 새로운 FMIPv6와 HMIPv6 통합 메커니즘)

  • Lee, Jae-Hwoon;Lim, Yu-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.110-119
    • /
    • 2007
  • Mobile IPv6 (MIPv6) enables a mobile node (MN) to maintain its connectivity with a correspondent node (CN) while changing its point of attachment. In MIPv6, packets sent from a CN to a MN during handover are lost. Several mechanisms including FMIPv6 and HMIPv6 have been proposed in order to minimize packet loss. However, such mechanisms still suffer from performance degradation due to not only packet loss but also out-of-sequence packets. In this paper, we propose I-FHMIPv6 to resolve packet loss as well as the out-of-sequence packet problem. In I-FHMIPv6, the flush message is newly defined in order to notify a home agent (HA) or CN of the fact that the binding cache entry of a MN is about to be updated. A MN receiving the flush message can know that there is no more packets transmitted via the previous route, which resolve the out-of-sequence packet problem. Moreover, with the proposed mechanism, we can minimize packet loss by integrating FMIPv6 and HMIPv6 efficiently. I-FHMIPv6 is evaluated by performing simulations, and the simulation results show that I-FHMIPv6 outperforms FMIPv6 and HMIPv6.

Identity-Based Secure Many-to-Many Multicast in Wireless Mesh Networks (무선 메쉬 네트워크에서의 아이디 기반 프록시 암호화를 이용한 안전한 다대다 멀티캐스트 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.72-83
    • /
    • 2010
  • Group communication in a wireless mesh network is complicated due to dynamic intermediate mesh points, access control for communications between different administrative domains, and the absence of a centralized network controller. Especially, many-to-many multicasting in a dynamic mesh network can be modeled by a decentralized framework where several subgroup managers control their members independently and coordinate the inter-subgroup communication. In this study, we propose a topology-matching decentralized group key management scheme that allows service providers to update and deliver their group keys to valid members even if the members are located in other network domains. The group keys of multicast services are delivered in a distributed manner using the identity-based encryption scheme. Identity-based encryption facilitates the dynamic changes of the intermediate relaying nodes as well as the group members efficiently. The analysis result indicates that the proposed scheme has the advantages of low rekeying cost and storage overhead for a member and a data relaying node in many-to-many multicast environment. The proposed scheme is best suited to the settings of a large-scale dynamic mesh network where there is no central network controller and lots of service providers control the access to their group communications independently.

Enhanced Cross-Layering Mobile IPv6 Fast Handover over IEEE 802.16e Networks in Mobile Cloud Computing Environment (모바일 클라우드 컴퓨팅 환경에서 IEEE 802.16e 네트워크에서의 향상된 교차계층 Mobile IPv6 빠른 핸드오버 기법)

  • Lee, Kyu-Jin;Seo, Dae-Hee;Nah, Jae-Hoon;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.45-51
    • /
    • 2010
  • The main issue in mobile cloud computing is how to support a seamless service to a mobile mode. Mobile IPv6 (MIPv6) is a mobility supporting protocol which is standardized by the Internet Engineering Task Force (IETF). Mobile IPv6 fast handovers (FMIPv6) is the extension of MIPv6 which is proposed to overcome shortcomings of MIPv6. Recently, fast handovers for Mobile IPv6 over IEEE 802.16e which is one of broadband wireless access systems has been proposed by the IETF. It was designed for supporting cross-layer fast handover. In this paper, we propose an enhanced cross-layering mobile IPv6 fast handover over IEEE 802.16e networks. In our scheme, a new access router generates a new address for the mobile node by using a layer 2 trigger. We utilize a layer 2 message which is sent from a new base station to the new access router in order to inform the new access router of information of the mobile node. A previous access router sends a binding update message to the mobile node's home agent when it acquires the new address of the mobile node. We evaluate the performance of the proposed scheme compared with the existing schemes in terms of the signaling cost and the handover latency. From the results, we observe that the proposed scheme can support fast handover effectively over IEEE 802.16e networks than existing schemes.

An Efficient Group Key Distribution Mechanism for the Secure Multicast Communication in Mobile Ad Hoc Networks (이동 애드혹 네트워크에서 안전한 멀티캐스트 통신을 위한 효율적인 그룹 키 분배 방식)

  • Lim Yu-Jin;Ahn Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.339-344
    • /
    • 2006
  • Secure delivery of multicast data can be achieved with the use of a group key for data encryption in mobile ad hoc network (MANET) applications based on the group communication. However, for the support of dynamic group membership, the group key has to be updated for each member joining/leaving and, consequently, a mechanism distributing an updated group key to members is required. The two major categories of the group key distribution mechanisms proposed for wired networks are the naive and the tree-based approaches. The naive approach is based on unicast, so it is not appropriate for large group communication environment. On the other hand, the tree-based approach is scalable in terms of the group size, but requires the reliable multicast mechanism for the group key distribution. In the sense that the reliable multicast mechanism requires a large amount of computing resources from mobile nodes, the tree-based approach is not desirable for the small-sized MANET environment. Therefore, in this paper, we propose a new key distribution protocol, called the proxy-based key management protocol (PROMPT), which is based on the naive approach in the small-sized MANET environment. PROMPT reduces the message overhead of the naive through the first-hop grouping from a source node and the last-hop grouping from proxy nodes using the characteristics of a wireless channel.

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.