• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.033 seconds

Intelligent Hierarchical Mobility Support Scheme in F-PMIPv6 Networks (F-PMIPv6 네트워크에서 지능적인 계층적 이동성 지원 기법)

  • Han, Sunghee;Jeong, Jongpil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.337-349
    • /
    • 2013
  • In this paper, we propose a new mobility management scheme, called i-FP(intelligent Fast PMIPv6). Our proposed i-FP scheme is addressed for solving the existing local mobility management problems from legacy frameworks. To move MN(Mobile Node) to other networks in one domain, i-FP employs three network entities which are extended from PMIPv6(Proxy Mobile IPv6), LMA(Local Mobility Anchor), MAG(Mobile Access Gateway) and MN. In i-FP, the three network entities can reduce the handover delay time of MNs. Also, i-FP uses an IP header swapping mechanism to avoid the traffic overhead and improve the throughput of network. To evaluate the performance of i-FP, we analyze our i-FP, HMIPv6(Hierarchical Mobile IPv6) and PMIPv6 which are legacy protocols of local mobility management in terms of various parameters. Finally, our i-FP scheme shows good performance(reduction of routing hops 10.2%, signaling costs 58.5% and handover delay 16.3%) than other network schemes for the total cost.

Design and Implementation of XCAP Server (XCAP 서버 기능 설계 및 구현)

  • Hyun, Wook;Park, Sun-Ok;Lee, Il-Jin;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.571-574
    • /
    • 2005
  • XCAP(XML Configuration Access Protocol) which has been proposed in IETF is based on both XML and HTTP protocol. XCAP server maintains user's configuration information for specific application which is described by XML. This protocol can be applied to many application servers for adapting user's preferences. There can be many way to interwork with other application servers. In this paper, we will talk about the experience of designing and implementation of XCAP server and the way of interwork with application servers.

  • PDF

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

An Experimental Study on the Application of NTCIP to Korean Traffic Signal Control System (교통신호제어시스템 NTCIP 통신규약 적용성 실험 연구)

  • Go, Gwang-Yong;Jeong, Jun-Ha;Lee, Seung-Hwan;An, Gye-Hyeong
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.5 s.91
    • /
    • pp.19-33
    • /
    • 2006
  • This paper presents the results of an experimental study on the application of NTCIP protocol to Korean traffic signal control system. For this study the communication Protocol of the existing traffic signal control system was adjusted to meet NTCIP standard. Management information base for Korea real-time traffic signal control system, message library of OER, traffic control center management software supporting SNMP/SFMP Protocol, and agent softwares for local controllers were developed during the experimental study. The applicability test of the adjusted system by NTCIP standard was performed. Fifty eight Percent of communication packets were lost at 2.400bps communication speed, which made the operation impossible. The experimentations with communication speeds 4,800bps and 9,600bps did not cause problems. In conclusion, to apply the NTCIP standard to domestic real-time traffic control system, communication environments need to be upgraded to 4,800bps or higher.

A Research on the Development of a GIS-based Real-time Urban Water Management System (GIS기반 실시간 도시용수 관리시스템 구현에 관한 연구)

  • Kim, Seong-Hoon;Kim, Eui-Myoung;Lim, Yong-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5290-5299
    • /
    • 2011
  • The ultimate purpose of this research is to propose a method to improve water supply management efficiency. As an effort to solve this comprehensive problem, the purposes of this paper are summarized into the following two main subjects. One is the development of a series of demand forecasting models targeting for each theme of urban water such as residential, commercial, industrial water. The other is the suggestion on the development and utilization plan of a GIS-based information system where the developed models are incorporated. For these, a series of efforts were performed such as evaluating and choosing of the candidate field areas, selecting a proper sensor and an installation point for each theme. Installed are sensors, a wireless communication infrastructure, and a field data acquisition and management server. Developed are a protocol for the wireless communication and a real-time data monitoring system. Nextly, the urban water facility-related and other necessary data were handled to make those into a series of GIS-ready databases. Finally, a GIS-based management system was designed and a blueprint for the implementation is suggested.

A Study on the Secure Plan of Security in SCADA Systems (SCADA 시스템의 안전성 확보방안에 관한 연구)

  • Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.145-152
    • /
    • 2009
  • SCADA(Supervisory Control And Data Acquisition) systems are widely used for control and monitoring of critical infrastructures including electricity, gas and transportation. Any compromise in the security of SCADA systems could result in massive chaos and disaster at a national level if a malicious attacker takes the control of the system. Therefore, sound countermeasures must be provided when the SCADA systems are being developed as well as when they are being operated. Unlike general information processing system, SCADA systems have different service responses, communication protocols and network architectures and therefore a different approach should be applied to each SCADA systems that takes into consideration of each system's security characteristics and architectures. In addition, legal basis should be established to ensure the nationwide management of the systems security. This paper examines the vulnerabilites of SCADA systems and proposes action plans to protect the systems against cyber attacks.

A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System (IPTV 시스템에서의 효과적인 콘텐츠 보호를 위한 일회성 암호와 수신제한시스템을 사용한 보안 모델)

  • Seo, Ki-Taek;Kim, Tae-Hun;Kim, Jung-Je;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2010
  • The evolution of internet have opened the world of IPTV. With internet protocol, IPTV broadcasts contents stream. The IP protocol doesn't provide secure service due to IP characteristics. So, it is important to provide both connect and secure service. Conditional Access System and/or Digital Right Management are being used to protect IPTV contents. However, there exist restrictions in the view of security. In this paper, we analyse existing security technologies for IPTV and propose a novel method to enforce security efficiently. In the proposed method, OTP is used for encryption/decryption contents and CAS controls key for encryption/decryption and the right of user. With this scheme, it reduces the load of the system and provides more security.

A Study of Virtual IoT System using Edge Computing (엣지 컴퓨팅 기반 가상 IoT 시스템 연구)

  • Kim, Min-A;Seok, Seung-Joon
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.51-62
    • /
    • 2020
  • Open IoT platform that shares communication infrastructure and provides cloud resources can flexibly reduce development period and cost of smart service. In this paper, as an open IoT platform, we propose a virtual IoT system based on edge computing that implements a virtual IoT device for a physical IoT device and allows service developers to interact with the virtual device. A management server in the edge cloud, near the IoT physical device, manages the creation, movement, and removal of virtual IoT devices corresponding to the physical IoT devices. This paper define the operations of the management server, the physical IoT device, and the virtual IoT device, which are major components of the virtual IoT system, and design the communication protocol required to perform the operations. Finally, through simulations, this paper evaluate the performance of the edge computing based virtual IoT system by confirming that each component performs the defined states and operations as designed.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

Key Update Protocols in Hierarchical Sensor Networks (계층적 센서 네트워크에서 안전한 통신을 위한 키 갱신 프로토콜)

  • Lee, Joo-Young;Park, So-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.541-548
    • /
    • 2006
  • Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.