• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.025 seconds

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

A Fast Global Mobility Supporting Scheme for IPv6 Using Global Mobility Agent (GMA) (Global Mobility Agent (GMA) 기반의 신속한 IPv6 전역 이동성 지원 방안)

  • Ahn, Jin-Su;Seo, Won-Kyeong;Choi, Jae-In;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1105-1114
    • /
    • 2010
  • The Proxy Mobile IPv6 (PMIPv6) has been standardized by the IETF NETLMM WG for network-based mobility management. The PMIPv6 can provide IP mobility for Mobile Nodes (MNs) with low handover latency and less wireless resource usage. But, since the PMIPv6 is basically designed for local mobility management, it cannot support directly global mobility management between different PMIPv6 domains. In the PMIPv6, since all traffic is routed through a Local Mobility Anchor (LMA), it causes a long end-to-end delay and triangular routing problem. Therefore, in this paper, we propose a fast network-based global mobility management scheme and route optimization scheme with a new network entity, called Global Mobility Agent (GMA). Numerical analysis and simulation results show that the proposed scheme is able to support global mobility between different public domains with low handover latency and low end-to-end delay, compared with the PMIPv6.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

The Algorithm for an Energy-efficient Particle Sensor Applied LEACH Routing Protocol in Wireless Sensor Networks (무선센서네트워크에서 LEACH 라우팅 프로토콜을 적용한 파티클 센서의 에너지 효율적인 알고리즘)

  • Hong, Sung-Hwa;Kim, Hoon-Ki
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.13-21
    • /
    • 2009
  • The sensor nodes that form a wireless sensor network must perform both routing and sensing roles, since each sensor node always has a regular energy drain. The majority of sensors being used in wireless sensor networks are either unmanned or operated in environments that make them difficult for humans to approach. Furthermore, since many wireless sensor networks contain large numbers of sensors, thus requiring the sensor nodes to be small in size and cheap in price, the amount of power that can be supplied to the nodes and their data processing capacity are both limited. In this paper, we proposes the WSN(Wireless Sensor Network) algorithm which is applied sensor node that has low power consumption and efficiency measurement. Moreover, the efficiency routing protocol is proposed in this paper. The proposed algorithm reduces power consumption of sensor node data communication. It has not researched in LEACH(Low-Energy Adaptive Clustering Hierarchy) routing protocol. As controlling the active/sleep mode based on the measured data by sensor node, the energy consumption is able to be managed. In the event, the data is transferred to the local cluster head already set. The other side, this algorithm send the data as dependent on the information such as initial and present energy, and the number of rounds that are transformed into cluster header and then transferred. In this situation, the assignment of each node to cluster head evenly is very important. We selected cluster head efficiently and uniformly distributed the energy to each cluster node through the proposed algorithm. Consequently, this caused the extension of the WSN life time.

Cost-aware Optimal Transmission Scheme for Shared Subscription in MQTT-based IoT Networks (MQTT 기반 IoT 네트워크에서 공유 구독을 위한 비용 관리 최적 전송 방식)

  • Seonbin Lee;Younghoon Kim;Youngeun Kim;Jaeyoon Choi;Yeunwoong Kyung
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.4
    • /
    • pp.1-8
    • /
    • 2024
  • As technology advances, Internet of Things (IoT) technology is rapidly evolving as well. Various protocols, including Message Queuing Telemetry Transport (MQTT), are being used in IoT technology. MQTT, a lightweight messaging protocol, is considered a de-facto standard in the IoT field due to its efficiency in transmitting data even in environments with limited bandwidth and power. In this paper, we propose a method to improve the message transmission method in MQTT 5.0, specifically focusing on the shared subscription feature. The widely used round-robin method in shared subscriptions has the drawback of not considering the current state of the clients. To address this limitation, we propose a method to select the optimal transmission method by considering the current state. We model this problem based on Markov decision process (MDP) and utilize Q-Learning to select the optimal transmission method. Through simulation results, we compare our proposed method with existing methods in various environments and conduct performance analysis. We confirm that our proposed method outperforms existing methods in terms of performance and conclude by suggesting future research directions.

A Study on Designing Method of VoIP QoS Management Framework Model under NGN Infrastructure Environment (NGN 기반환경 에서의 VoIP QoS 관리체계 모델 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.85-94
    • /
    • 2011
  • QoS(Quality of Service) is defined as "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. While the use of VoIP(Voice Over Internet Protocol) has been widely implemented, persistent problems with QoS are a very important sue which needs to be solved. This research is finding the assignment of VoIP QoS to deduct how to manage the control system and presenting the QoS control process and framework under NGN(Next Generation Network) environment. The trial framework is the modeling of the QoS measurement metrics, instrument, equipment, method of measurement, the series of cycle & the methodology about analysis of the result of measurement. This research underlines that the vulnerability of the VoIP protocol in relation to its QoS can be guaranteed when the product quality and management are controlled and measured systematically. Especially it's very important time to maintain the research about VoIP QoS measurement and control because the big conversion of new network technology paradigm is now spreading. In addition, when the proposed method is applied, it can reduce an overall delay and can contribute to improved service quality, in relation to signal, voice processing, filtering more effectively.

XML Key Information Service Modeling for Secure Electronic Commerce (안전한 전자상거래를 위한 XML 키 정보 서비스 모델링)

  • 박남제;문기영;송유진
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.241-257
    • /
    • 2003
  • XML is a global standard for the Internet and e-business, and its use is growing in proportion to the spreading speed of e-Commerce. Thus, a policy for providing more safe security service for exchanging e-documents within e-Commerce is necessary. XKMS, one of XML security specification, defines the protocol for distributing and registering public keys for verifying electronic signatures and enciphering e-documents of e-Commerce applications with various and complicate functions. In this paper, we propose X-KISS service reference model and implement service component based on standard specification. Also describes the analysis and security of XML key information service for safe e-Commerce, paying attention to the features of XML based security service. This reference model supported include public key location by given identifier information, the binding of such keys to identifier information. The client service component controls the number of locate threads and validate threads to analyze the minimum requirements of real-time key retrievals. This service modeling offers the security construction guideline for future domestic e-business frameworks.

  • PDF

Design of Fast Handover Mechanism in Proxy Mobile IPv6 Networks (Proxy Mobile IPv6 네트워크에서 Fast Handover 기법 설계)

  • Park, Byung-Joo;Han, Youn-Hee;Kim, Bong-Ki
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.301-310
    • /
    • 2008
  • In the existing literature, the handover process reveals numerous problems manifested by high movement detection latency. FMIPv6 can reduce packet loss using a tunnel-based handover mechanism. However, this mechanism may cause performance degradation due to the out-of-sequence packets. Recently. Proxy Mobile IPv6 is proposed for network-based mobility management to reduce overhead in mobile node. PMIPv6 can decrease handover latency which related overhead in MN by using network agent. In this paper, we proposed optimized fast handover scheme called Fast Proxy Mobile IPv6 (EF-PMIPv6). The proposed EF-PMIPv6 can support fast handover using fast IAPP and ND schemes. Further, a mathematical analysis is provided to show the benefits of our scheme. In the analysis, various parameters are used to compare our scheme with the current procedures, while our approach focuses on the reduction of handover latency.

Device Adapter Model based on Dynamic Management Module for u-Health gateway (u-헬스 게이트웨이를 위한 동적 관리 모듈 기반의 디바이스 어댑터 모델)

  • Kim, Jong-Tak;Song, Si-Yun;Hwang, Hee-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.41-48
    • /
    • 2010
  • It is essential to guarantee a smooth communication and data exchange in a PHD(Personal Healthcare Device) network for applications providing U-health services. In spite of that, most of PHDs are heterogeneous, so the heterogeneity of their protocols makes it difficult to develop an integrated gateway sending sensed healthcare data to U-health service providers. To solve this problem, we suggest the design and implementation of a device adapter model based on dynamic managed module in this paper. Our model were implemented to work on the OSGi-based gateway middleware and to have interoperability in connection with the HL7 system that is the standard of the Healthcare Information systems. In addition, our model has an architecture supporting a communication based on the object serialization in order to provide extensibility in the functional aspect of applications. Through the experiment on a test-bed which is an implementation of the device adapter module for electrocardiogram and blood-pressure/blood-sugar device having one channel, we have confirmed the accuracy of sensing and sending data.

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.