• Title/Summary/Keyword: 보안 멀티캐스트

Search Result 88, Processing Time 0.039 seconds

Efficient Offered Contents Using Broadcast Encryption (브로드캐스트 암호화를 이용한 효율적인 컨텐츠 제공)

  • 이덕규;이임영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.65-70
    • /
    • 2004
  • The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriber. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

  • PDF

Open IPTV Platform using Overlay Multicast and Content Delivery Network (오버레이 멀티캐스트 및 콘텐츠 전달 네트워크를 적용한 개방형 IPTV 플랫폼)

  • Jung, Seung-Moon;Kang, Im-Chul;Jeon, Jin-Han
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.528-536
    • /
    • 2009
  • Recently, the importance of IPTV providing multimedia service over IP based networks managed to provide the required level of quality of service and experience, security, interactivity and reliability has been gradually increasing by the commercialization of its service. However, the original purposes of IPTV service - contents are produced and consumed anytime, anywhere, and over any device at the same time - have not been satisfied by service providers because most services offered by service providers depend on closed IPTV platform. In this paper, we propose an open IPTV service platform that an individual or small company can easily produce contents and offer IPTV service independently from the existing closed IPTV platform.. The proposed IPTV platform exploits overlay multicast scheme to offer reasonable service under the environment where network bandwidth and processor resource are limited. It also uses CDN-like scheme to ensure the quality of transmitted contents. The performance evaluation shows that the proposed IPTV platform has the possibility of being an open IPTV platform considering its results such as the quality of transmitted contents, the transmission rate, the channel zapping time, and so on. It also shows that proposed IPTV platform could be applied to real IPTV service with continuous enhancement of its functions and user interfaces.

The Efficient Group Key Management Blocking Collusion Attack (공모공격을 차단하는 효율적인 그룹 키 관리)

  • Kim, Tae-Gyun;Chung, Jong-In
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.409-418
    • /
    • 2004
  • Multicast services are provided on the Internet in fast increasing . Therefore it is important to keep security for multicast communication. Member leaving is deeply associated with scalability problem for group key management. If one member of the group is removed, new group key has to be generated and distributed to all remaining members of group. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme since generation and distribution of new keys for rekeying require expensive operation. Batch removal can reduce these important parameters rather than removing members sequentially In fashion one after another. In this paper, Hamming distance is calculated between eve교 members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm In the case of removing several members simultaneously, our model has advantages of reducing the number of message and operation cost for generation of the composite keys and eliminating possibility of collusion attack for rekeying.

Group Key Management with Low Cost Rekey (저비용 rekey를 갖는 그룹키 관리)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • The Internet today provides group communication model, multicast service. It is important to keep security for multicast communication. Member leaving is associated with scalability problem for group key management. If one member of the group is removed, new group key has to be changed and communicated to all remaining members of group. Modification and distribution of new group keys for rekeying is an expensive operation. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme. Periodic rekey helps reducing these important parameters rather than removing members sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm, our model has advantages of reducing the number of message and operation cost for generation of the composite keys for rekeying.

  • PDF

Development of High quality Video Conferencing Tool by using IPv6 multicast (IPv6 멀티캐스트를 이용한 고품질 화상회의 응용 개발)

  • 이병욱;조호식;유태완;최양희;인민교;이승윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.724-726
    • /
    • 2004
  • IPv6 기술은 IPv4의 문제점인 주소고갈, 보안문제 등을 해결하기 위해 제시된 차세대 인터넷 기술이다. IPv6 기술은 현재 프로토콜의 정의가 완료된 상황이지만 사업자들의 이해관계로 인해 아직까지 널리 보급되지 못하고 6Bone 과 같은 시험 망에서만 사용되고 있는 실정이다. 그러나 IPv6는 가까운 미래에 Ipv4를 대체할 것으로 보이며 기존에 있던 IPv4를 기반으로 하는 응용 프로그램들도 IPv6 용으로 새로이 바뀌게 될 것이다. 이러한 배경 하에 본 연구팀은 IPv6 multicast를 기반으로 하는 화상회의 응용프로그램을 개발하였으며 본 논문은 그 개발에 대한 내용을 담고 있다. 본 논문에서는 화상회의 응용프로그램의 전체적인 구조와 구현 시 사용된 기술과 화상회의 플랫폼기술에 대해서 살펴보고 응용프로그램을 바탕으로 측정한 사용 bandwidth 와 delay를 분석해 보도록 하겠다.

  • PDF

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Scenarios and Considerations of IPv6 in IEEE 802.16/WiBro Networks (IEEE 802.16/와이브로 망에서의 IPv6 적용 시나리오 및 네트워크 기술 이슈 분석)

  • Shin, M.K.;Lee, J.C.;Kim, H.J.;Moon, J.M.;Han, Y.H.
    • Electronics and Telecommunications Trends
    • /
    • v.21 no.2 s.98
    • /
    • pp.192-199
    • /
    • 2006
  • 본 고에서는 IEEE 802.16/와이브로 망에서의 IPv6 적용에 따른 시나리오 및 기존IPv6 프로토콜에 대한 네트워크 이슈들을 기술한다. 이를 위해 먼저 IEEE 802.16 망의 특성 및 IPv6 적용에 따른 문제점들을 분석하고, IPv6 적용 가능한 시나리오를 서비스 방법, 시스템 구조, CS 적용 방법, 프리픽스(prefix) 할당 방법에 따라 구분하여 제안한다. 이를 기준으로 IPv6 이웃 탐색(neighbor discovery), IPv6 패킷 전송, 이동성, 멀티캐스트, 보안 프로토콜 등이 어떠한 제한 및 수정이 요구되는지에 대해 기술한다.

A Study on Efficient Group Member Authentication and Key Management Scheme for Multicast Security in MANET (MANET에서 멀티캐스트 보안을 위한 효율적인 그룹 멤버 인증 및 키 관리 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.115-123
    • /
    • 2017
  • The mutual cooperation among nodes is very important because mobile nodes participating in MANET communicate with limited resources and wireless environment. This characteristic is important especially in environment that supports group communication. In order to support the secure multicast environment, it is important enough to affect performance to provide accurate authentication method for multicast group members and increase the integrity of transmitted data. Therefore, we propose a technique to provide the multicast secure communication by providing efficient authentication and group key management for multicast member nodes in this paper. The cluster structure is used for authentication of nodes in the proposed technique. In order to efficient authentication of nodes, the reliability is measured using a combination of local trust information and global trust information measured by neighboring nodes. And issuing process of the group key has two steps. The issued security group key increases the integrity of the transmitted data. The superiority of the proposed technique was confirmed by comparative experiments.

2-Layered Group Key Management Structure and Protocols using Multi-Core Based Tree (다중 코어 기반 트리를 이용한 2계층 그룹키 관리 구조 및 프로토콜)

  • Cho, Tac-Nam;Kim, Sang-Hee;Eun, Sang-A;Lee, Sang-Ho;Chae, Ki-Joon;Park, Won-Joo;Nah, Jae-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.583-594
    • /
    • 2002
  • Assuring the security of group communications such as tole-conference and software distribution requires a common group key be shared among the legal members in a secure manner. Especially for large groups with frequent membership change, efficient rekey mechanism is essential for scalability. One of the most popular ways to provide sealable rekey is to partition the group into several subgroups. In this paper, we propose a two-layered key management scheme which combines DEP and CBT, a protocol in which subgroup manager cannot access the multicast data and another that has a multi-core, respectively. We also select sub-group key management protocols suitable for our structure and design new rekey protocols to exclude the subgroup managers from the multicast data. Compared to previous protocols based on CBT, our scheme provides forward secrecy, backward secrecy and scalability. This would reduce the number of encryption and decryption for a rekey message and would improve the efficiency number of rekey messages and the amount of information related to group members that group managers must maintain compared to DEP.

2007 주목할 10대 기술

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.184
    • /
    • pp.28-39
    • /
    • 2007
  • IT산업은 항상 끊임없는 '혁신'을 통해서만 성장의 자양분을 얻는다. 기술적 또는 개념적 진보가 없다면 IT산업은 당연히 산업으로서의 존재가치가 없다. 그렇다면 2007년, 한국의 IT시장을 주도할 '10대 핵심 IT기술'들은 어떤 것들일까. 국내 통신 및 네트워크, 솔루션 업계가 가장 관심 있게 지켜보는 IT기술등 중 10개를 선별했다. 10대 IT기술에 포함된 것들 중에는 개념적으로는 10년전부터 출현해 알려져 있지만, 그동안 단순히 개념에 머물렀을 뿐 아직 상용화가 안 된 것들도 일부 포함돼 있다. 참신성보다는 실질적인 의미와 중요성에 무게들 둔 때문이다. 2007년에 주목할 만한 10대 IT기술로는 먼저 'IP 멀티미디어 서브시스템(IMS)이 꼽힌다. 유무선을 비롯한 다양한 네트워크를 자연스럽게 연결해주고 여러 서비스들의 다양한 조합이 가능해 고객맞춤형서비스를 가능하게 하는 '멀티미디어 멀티캐스트 컨트롤(MMC)도 10대 IT기술에 포함됐다. 이와 함께 100Mbps 초고속 인터넷 서비스를 가능하게 하는 ETTH (Ethernet To The Home), 차세대 보안이슈인 네트워크접근제어(NAC), 금융회사나 이동통신회사의 상품개발을 신속하게 지원하는 '프로덕트 팩토리', 하드웨어시스템의 최적화를 보장한 가상화 및 ILM, 컴퓨팅산업을 한 단계 이상 진화시킬 쿼드코어 CPU, 소프트웨어 시장의 새로운 패러다임인 SOA(서비스지향아키텍처), 본격적인 시장 확산이 기대되는 전자태그(RFID), IT거버넌스의 열기로 급부상하고 있는 ITAM(IT자산관리) 등도 올해 주목할 10대 IT기술 반열에 올랐다.

  • PDF