• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.03 seconds

Mtigating the IGMP Flooding Attacks for the IPTV Access Network (IPTV 접속망에서의 IGMP 플러딩 공격 효과 감소 기법)

  • Kim, Sung-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.998-1002
    • /
    • 2009
  • In IPTV multicast architecture, the IGMP(Internet Group Management Protocol) is used for access networks. This protocol supports the functionality of join or leave for a specific multicast channel group. But, malicious attackers can disturb legitimate users being served appropriately. By using spoofed IGMP messages, attackers can hi-jack the premium channel, wasting bandwidth and exhausting the IGMP router's resources. To prevent the message spoofing, we can introduce the packet-level authentication methods. But, it causes the additional processing overhead to an IGMP processing router, so that the router is more susceptible to the flooding attacks. In this paper, we propose the two-level authentication scheme in order to mitigate the IGMP flooding attack.

A QoS Adaption Model on the Policy-Based Network Management in the IMS (IMS에서 정책 기반 네트워크 관리 QoS 적용 모델)

  • Han, Seok-Jun;Lee, Jae-Oh;Kang, Seung-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.7
    • /
    • pp.3175-3181
    • /
    • 2012
  • The need of multimedia based application service is increasing as the number of smart mobile devices such as smart phone, tablet PC, and netbook is increasing rapidly and the development of application service like IPTV. There are various proposed policies to control the limited network resources. The IMS is used to control wired and wireless aggregation network to support multimedia services that are suitable to the user's need and the policy based models using the PDF of the IMS have emerged. In this paper, we propose the QoS adaption model using various protocols with the PDF of the IMS and the user scenario.

A study on the variation of severity adjusted LOS on Injry inpatient in Korea (손상입원환자의 중증도 보정 재원일수의 변이에 관한 연구)

  • Kim, Sung-Soo;Kim, Won-Joong;Kang, Sung-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2668-2676
    • /
    • 2011
  • In order to analyze the variation in length of stay(LOS) of injury inpatients, we developed severity-adjusted LOS model using Korean National Discharge In-depth Injury Survey data of Center for Disease Control. Appling this model, we calculated predicted values and, after standardizing LOS using the differences from the actual values, analyzed the variation in LOS. Major factors affecting severity-adjusted LOS of injury inpatients were found to be severity, surgery(or no surgery), age, injury mechanism and channel of hospitalization. Result of analysis of the differences between the actual values and predicted values adjusted by decision tree model suggested that there were statistically significant differences by hospital size(number of beds), type of insurance and location of institution. In order to reduce the variation in LOS, efforts should be exerted in developing nationwide treatment protocol, inducing medical institutions to utilize it, and furthermore systematically evaluating it to reduce the variation continually.

An Improved Route Recovery using Bidirectional Searching Method for Ad hoc Networks (Ad hoc 네트워크에서의 양방향 경로탐색을 이용한 경로복구 개선 방안)

  • Han, Ho-Yeon;Nam, Doo-Hee;Kim, Seung-Cheon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.1
    • /
    • pp.35-41
    • /
    • 2010
  • Since the ad-hoc network allow nodes to communicate each other without infrastructure system and predefined configuration, it comes into the spotlight that is suitable to ubiquitous society. In ad-hoc network, route recovery mechanism is considered important. Normally route recovery is needed to solve the link failure problem because there is no route maintaining system like a router in ad-hoc networks. In this paper we propose BS-AODV(Bidirectional Searching-AODV) route recovery method. The proposed method is a local repair method that can be applied in all of the network area. Unlike a limited local repair method in AODV. the proposed method adopts the bidirectional searching method where the upstream/downstream nodes can send the route maintenance messages. Restricting the flooding of route request messages, the proposed scheme attempts to minimize the costs of local repair, the performance of the proposed scheme is evaluated through the simulations. In two scenarios which variate the node numbers and node speed, the comparison among the proposed scheme, AODV and AOMDV is shown in terms of the control traffic and data delivery ratio.

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Development of Simulation System For Real-Time Location Tracking In Global Shipping Logistics (글로벌 해운물류 실시간 위치 추적 시뮬레이션 시스템 개발)

  • Park, Byung-Kwon;Choi, Hyung-Rim;Kim, Chae-Soo;Lee, Kang-bae;Park, Min-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1235-1242
    • /
    • 2015
  • In global shipping logistics, it is important for users to keep track of the location of their continuously moving cargos. Analyzing the GPS data stream coming from the tag which is attached to the cargo, we are able to keep track of the cargo location in terms of going into or out of a certain logistics area using the information of the spatial relationship change between the tag and the logistics area. In this paper, we propose a simulation system for measuring the precision and false alarm rate of the cargo location tracking algorithm which generates spatial events over the global logistics areas. Due to the difficulty of experiment with a real tag, we developed a tag emulator to create a virtual tag which operates exactly like a real tag. We show the cargo location tracking system works correctly with the tag emulator which communicates with it using the same protocol as the real tag.

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Restoration Method for Improving Fault Recovery in MPLS Networks Routing Protocol (패킷망에서 NGN을 위한 라우팅 프로토콜MPLS망에서 장애 개선을 위한 복구 기법)

  • In Chi-Hyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.956-966
    • /
    • 2004
  • Nowadays, NGN(Next Generation Network) is evolving into network with packet based QoS.\ulcorner This paper presents the recovery method as a selecting way of more efficient path in MPLS network that reduces the service interruption time. In order to increase the efficiency of usage of recovering resource which is one of major functions of disorder recovering, it opens the state information of each Node both to fault detector and bandwidth broker so that it reduces message transmission time for recovery when functional disorder occurs. in addition, by effective management and adjustment of required bandwidth of entire network depending on the changes of traffic load, it improves the efficiency of bandwidth usage. and in MPLS network supporting priority selection function, it allocates domains depending on the traffic relating to priority order to the entire network so that\ulcorner it efficiently allocates proper resources to the restoring process between the entry and the end for the traffic of high priority and for low priority traffic, it restores path oかy inside disordered domain. by doing this, it reduces resetting time and unnecessary massage transmission.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.