• Title/Summary/Keyword: 네트워크 접속

Search Result 1,300, Processing Time 0.022 seconds

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

A Study on the High Performance TCP over Various Communication Links (다양한 통신 링크에서 고성능 TCP에 관한 연구)

  • Kim, Sang-Mi;Choe, Seon-Wan;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.197-212
    • /
    • 2002
  • Transmission Control Protocol (TCP) [1] has been tuned as a reliable transfer protocol for traditional networks comprising wired links and stationary hosts with same link characteristics. TCP assumes that congestion in the network be a primary cause for packet losses and unusual delays. TCP performs welt over such networks adapting to end-to-end delays and congestion losses, by standard congestion control mechanisms, such as slow-start, congestion avoidance, fast retransmit and recovery. However, networks with wireless and other lossy links suffer from significant losses due to bit errors and handoffs. An asymmetry network such as ADSL has different bandwidth for both directions. As a result, TCP's standard mechanisms incur end-to-end performance degradation in various links. In this paper, we analyze the TCP problems in wireless, satellite, and asymmetry links, and measure the new TCP mechanisms that are recommended by IETF Performance Implications of Link Characteristics (PILC) WG[2], by using Network Simulator 2 (NS-2).

A Design of Resource Reservation Mechanism with Micro Host Mobility (단말의 마이크로 이동성을 고려한 자원예약 메커니즘의 설계)

  • Koh, Kwang-Sin;Cha, Woo-Suk;Ahn, Jae-Young;Cho, Gi-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.733-742
    • /
    • 2002
  • It has been known that the host mobility feature has very significant impact on the QoS (Quality of Service), which is usually required to a real-time multimedia application. The existing QoS support mechanisms to provide the real-time services to fixed network environment, like as RSVP, are inadequate to accommodate the mobile hosts which can frequently change their point of attachments to the fixed network. So, MRSVP (Mobile RSVP) protocol has been proposed to reduce the impacts of host mobility on QoS guarantees, in which a mobile host needs to make advance resource reservations at multiple locations it may possibly visit during the lifetime of the connection. This paper proposes a dynamic dual anchor node (DDAN) architecture which integrates the MRSVP and RSVP tunnel, in addition to the Mobile IP Regional Registration protocol. By limiting the resource reserved in local area, it preserves the lower level of resource reservation, but provides approximately the same degree of QoS support as the existing MRSVP.

Global Wireless LAN Roaming Status in Korea and Its Development Methods (국내 글로벌 무선랜 로밍 구축 현황 및 발전 방안)

  • Wang, Gicheol;Cho, Jinoh;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.15-21
    • /
    • 2015
  • Due to the appearance of various mobile terminals like smartphone, smartpad, and smartwatch and tremendous development of WiFi technology, data utilization rate on WiFi network is significantly increasing. As a result, users are wanting to use WiFi network using only a simple identification at a visited place as if they are at their home institute. In this paper, we review the domestic status of eduroam service which supports global extension of wireless network access environment and present the future development perspective of the service in Korea. Besides, we shed light on the current status of WiFi sharing service between domestic universities and propose some methods to facilitate the join of domestic universities in eduroam service.

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

Implementation Access Control System Based on CAN Communication (CAN통신 기반 출입통제 시스템 구현)

  • Song, Chong-kwan;Park, Jang-sik;Kim, Hyun-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.467-470
    • /
    • 2009
  • CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic braking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control, etc. for large ship. In this paper, cabin access control system can be implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system can carry CAN frames to server, so it can be used as gateway.

  • PDF

A Study of Evaluation Certification on Electronic Power u-IT Convergence Equipment (전력 u-IT 융복합화 기기의 평가와 인증 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo;Bae, Suk-Myong;Kim, Eung-Sik;Kim, Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.499-502
    • /
    • 2009
  • Supply of electric power and electricity safety for whole system and network are essential element. Electricity safety technology need rating for product and research about certification as product development that is done cotton flannel mixed with development of u-IT technology consists. Study on serve to develop electricity safety integration supervision system to apply product to u-City electric power appliance and cotton flannel mixed of u-IT appliance, Connection badness sensing instrument made device built-in electric power IT cotton flannel mixed in outlet that is used most in electric power appliance terminal. Using sensor on ZigBee, RFID performance estimation of communication and module for remote safety check of electricity safety integration supervision system. A performance experiment and estimation in PD, Arc detection diagnosis system and certification KS, electricity safety about product that get fitness finding.

  • PDF

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office (스마트 모바일 오피스 보안을 위한 CERT와 ISAC의 역할)

  • Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.109-127
    • /
    • 2011
  • Mobile Office is a new type of working method in the workplace that can be used at any time or anywhere by connecting to the network with mobile devices. This allows people to do their jobs without their physical presence in their offices to use computers. The elements in mobile office environment are advancing. They include the widespread distribution of the smart phones, the network enhancing strategy in a ubiquitous environment and expansion of the wireless internet; however, there are not enough security guidelines or policies against these threats on the new environment, the mobile office, although there is the revitalization policy of smart work supported by the government. CERT and ISAC, the known security system as of now, could be used for the secure mobile office, In this paper, suggestions are to be provided for strengthening the security of smart mobile office by analysing the functions of CERT and ISAC.