• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.031 seconds

Wireless Certificate Management Protocol for Mobile Phone Security (휴대폰에서의 무선 인증서 관리 프로토콜)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.90-98
    • /
    • 2008
  • PKI (Public Key Infrastructure) which is used for the security of E-commerce (Electronic-commerce) in wired internet is not suitable for the mobile phone because of the fundamental limitation of performance such as less memory and less powerful CPU. Therefore, we need to develop a wireless PKI (WPKI) that provides the similar security level as the wired PKI supporting mobile phone. In this paper, we propose a lightweight and secure Wireless Certificate Management Protocol (WCMP) that is executable to the mobile phone that has a constrained communication environment and limitation of performance, and show the implementation results of the scheme based on the mobile phone. We minimize data sizes processed in mobile phone, and optimize protocols for the certificate management. This results in the reduced module sizes to be able to install in mobile phone and shows as the same level as the wired CMP.

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.

A RTSP/RTP Stream Control Mechanism for Streaming Cache Server (스트리밍 미디어 캐쉬 서버를 위한 RTSP/RTP 스트림 제어 기법)

  • 오재학;차호정;최영근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.254-265
    • /
    • 2003
  • This paper presents the design and implementation of stream control mechanisms which are necessary for the development of an efficient streaming cache server. The streaming protocols used in our implementation are the RTSP/RTP/RTCP standards. The mechanisms support both the on-demand media caching and real-time media splitting applications. The core of the stream control includes the session management, which handles the RTSP/RTCP control session and the RTP transport session, and the cache block management which efficiently manages the RTP-based cache blocks stored in the cache server. The streaming cache server with the proposed stream control mechanism has successfully been implemented on a Linux platform and it works well with the Apple's QTSS server and the QuickTime player for both on-demand and splitting media services.

Protocol-independent Information Modeling and Web Services Implementation for Resource Management in NGN Transport Stratum (NGN 전송 층의 자원 관리를 위한 프로토콜 중립적인 정보 모델링과 웹 서비스 구현)

  • Yim, Young-Eun;Kwon, Tae-Hyun;Kim, Choon-Hee;Han, Tae-Man;Jeong, You-Hyeon;Cha, Young-Wook
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.453-462
    • /
    • 2007
  • NGN is a packet-based converged network to support session and non-session based services in QoS-enabled broadband transport technologies. Resource and admission control functions(RACF) of NGN have been considering COPS and SNMP as resource management protocols to collect network topology and resource status information of transport network. This paper defines requirements of resource management in NGN transport network, and proposes protocol independent information model to keep consistency of data models of each resource management protocol. Based on this information model described with UML class diagram, we designed and implemented NGN resource management system on Web Services.

Mobile Agent Location Management Protocol for Spatial Replication-based Approach in Mobile Agent Computing Environments (이동 에이전트 컴퓨팅 환경에서 공간적 복제 기반 기법을 위한 이동 에이전트 위치관리 프로토콜)

  • Yoon, Jun-Weon;Choi, Sung-Jin;Ahn, Jin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.455-464
    • /
    • 2006
  • In multi-regional mobile agent computing environments, spatial replication-based approach may be used as a representative mobile agent fault-tolerance technique because it allows agent execution to make progress without blocking even in case of agent failures. However, to apply this approach to real mobile agent-based computing systems, it is essential to minimize the overhead of locating and managing mobile agents replicated on each stage. This paper presents a new mobile agent location management protocol SRLM to solve this problem. The proposed protocol allows only the primary among all the replicated workers of each stage to register with its regional server and then, significantly reduces its location updating and message delivery overheads compared with the previous protocols. Also, the protocol addresses the location management problem incurred by electing the new primary among the remaining workers at a stage in case of the primary worker's failure.

Network Management PROTOCOL using RING Interconnection (링 접속을 이용한 네트워크 관리 프로토콜)

  • 윤동식;이병관
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.320-322
    • /
    • 1998
  • TCP/IP 네트워크상의 네트워크 관리에서는 SNMP가 업계의 표준으로 자리 잡고 있다. 또한 각 업계에서는 독자적으로 어플리케이션을 개발해 가지고 있다. 네트워크와 시스템은 관리 시스템의 구축에 있어 가장 중요한 점은 표준화된 관리 정보의 제공에 있다. 이를 위해 관리 시스템간에 교환되는 모든 관리 정보를 위한 개념적인 저장 장소를 에이젼트라 한다. 이에는 관리정보와 구조에 대한 정의로 MIB가 사용된다. 이에 SNMP와 MIB는 네트워크를 관리하기 위해 고안된 프로토콜이며 상호간에 같은 시스템 내에 존재하여야만 한다.이로인해서 SNMP나 시스템을 지원하지 않는 중요 장비에 대한 관리가 어렵다. 이는 관리를 위한 정보가 독립된 패킷으로 구성되어 네트워크 내부로 투입되며 일반 사용자 트래픽과 관리 트래픽이 네트워크 자원을 공유하기 때문이다. 일반 사용자 트래픽과 관리 트래픽 사이의 발생 빈도 균형적으로 유지 할 수 있다면 보다 나은 네트워크 관리가 될 것이다. 이에 본 논문에서는 네트워크간의 상호접속을 균형적인 링 접속 방식을 이용하며 개선하고자 한다. 이로 인하여 시스템의 안정적인 접속과 신뢰성 및 가용성을 증가시킬 수 있다.

  • PDF

A Protocol Interface for Energy-efficient Network Management in Ubiquitous Sensor Networks (유비쿼터스 센서네트워크에서 에너지 효율적인 망관리 프로토콜 인터페이스)

  • Kim, Byoung-Kug;Hur, Kyeong;Eom, Doo-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1221-1234
    • /
    • 2010
  • MANET(Mobile Ad-hoc Network)s have been researched primary at routing protocols and at the guarantees of QoS(Quality of Service) for mobile environments. Otherwise the Ubiquitous Sensor Networks (USNs) have some limitations in power energies and in processing of sensing data, as well as their network topologies are frequently changed by fading off and node failures. Thus we should redesign network protocols with concerning to energy efficiency for the USNs above all. In this paper, we focus on the protocol interface for managing for USNs based on the surveys. And then we figure the topology of USNs out and design the network protocol interface to make power saved, with data gathering and processing more efficient using our designed packet structures.

RFID Tag Ownership Transfer Protocol Using Lightweight Computing Operators (간단한 연산을 사용한 RFID 태그 소유권 이전 프로토콜)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1413-1426
    • /
    • 2013
  • RFID thecnology has been widely adopted by industries for supply chain management. When a product item is manufactured RFID tag is attached to the product item and supply chain management among factories, distributors, retailers and customers needs to handle ownership transfer for the product item carefully. With RFID technology, the secure and efficient ownership transfer protocol is an important issue for the identification of product items and the overall system efficiency on supply chain. Many ownership transfer protocols have been proposed now. They have security problems and use complex operations such as encryption operation and hash function. Lo et al. proposed a protocol using lightweight operations such as shift, addition, XOR, and random number generation[1]. However, this protocol has a security problem in which the secret key between the tag and the new owner is disclosed to the attackers, and it is also weak against the Fraud attack[2]. In this paper, we propose a new ownership transfer protocol using lightweight operations such as shift, addition, and random number generation. This protocol is the modified version of Lo et al.'s protocol and is secure against the security attacks.

Performance Evaluation of control and management protocol for Dynamic lightpath setup based GMPLS network (GMPLS 기반의 동적 경로 설정을 위한 제어 및 관리 프로토콜 성능 평가)

  • Kim Kyoung-Mok;Oh Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.12
    • /
    • pp.9-14
    • /
    • 2004
  • As the internet traffic type and size have bun diversified in recent years, the GMPLS-based distributed control and management protocol have surfaced as a serious issue for dynamic optical lightpath setup. In this reason, we investigated and analyzed network performance and protocols using global information-based link state approach and local information based link state approach. We calculated connection setup time, required control bandwidth and setup blocking probability that made from network update period and threshold metrics according to traffic arrival rate. The evaluated results will be used in broadband network and adopted for high speed network in the future widely.

MIPv6 Binding Update scheme to improve performance and security (성능과 보안성을 함께 개선한 MIPv6 바인딩 갱신)

  • Won, You-Seuk;Cho, Kyung-San
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.81-91
    • /
    • 2007
  • Binding update for the routing optimization in MIPv6 can make the involved nodes vulnerable to various attacks. Therefore, secure binding update becomes an important research issue in MIPv6, and several protocols have been proposed for this purpose. In this paper, we compare several existing binding update protocols such as RR, SUCV and OMIPv6 and analyze the vulnerability of nodes to the possible attacks and drawbacks of address management and scalability and overhead of encryption operations. Then, we suggest the design requirements for the secure binding update and propose an advanced protocol based on the design principle. Through the analysis, we show that our protocol can achieve a higher level of security against the various attacks and enable better management of address, provide the location privacy and reduce the computational overhead of mobile nodes with constraint computational power.

  • PDF