• Title/Summary/Keyword: 서버 ON/OFF

Search Result 94, Processing Time 0.028 seconds

One-Pass Identification Processing Password (한 단계로 신원확인을 위한 패스워드)

  • Kim Yong-Hun;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.627-632
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/ server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root problem, and we would like to suggest OPI(One Pass Identification), enhancing the stability for all of the well-known attacks by now including Free-playing attack, off-line Literal attack, Server and so on. OPI does not need to create the special key to read the password. OPI is very excellent in identifying the approved person within a very short time.

A Dynamic Programming for Solving Resource Allocation Problems in Video-on-Demand Service Networks (Video-on-Demand 서비스망의 자원 할당 문제를 위한 동적계획법)

  • Cho, Myeong-Rai
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3182-3194
    • /
    • 2000
  • It is strongly beliefed that Video on Demand(VOD) will become one of the most promising services in Broadband Integrated Services Digital Network(B-ISDN) for the nest generation VOD service can be classified into two types of services 'Near VOD(NVOD) and Interactive VOD(IVOD). For both services, some video servers should be installed at some nodes(especially, at the root node for NVOD service) in the tree structued VOD network,so that each node with video server stores video programs and distribules stored programs to customers. We consider thre kinds of cost.a program transmission cost, a program storage cost, and a video server installation cost. There exists a trade-off relationship among those three costs according to locationsl of video servers and the kinds of programs stord at each video server. Given a tree structured VOD network, and the total number of programs being served in the network, the resource allocation problem in a VOD network providing both IVOD and NVOD services is to determine where to install video servers for IVOD service, which and how many programs should be stored at each video server for both IVOD and NVOD services, so as to minunize the total cost which is the sum of three costs for both IVOD and NVOD services. In this paper we develop an efficient cynamic programming algorithm for solving the problem. We also implement the algorithm based on a service policy assumed in this paper.

  • PDF

Development and Field Test of a Smart-home Gas Safety Management System (스마트 홈 가스안전관리 시스템 개발 및 현장시험)

  • Park, Gyou-Tae;Kim, Eun-Jung;Kim, In-Chan;Kim, Hie-Sik
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.6
    • /
    • pp.128-135
    • /
    • 2012
  • In this paper, we proposed a system and a scenario to raise efficiency of gas safety management by developing wireless ZigBee communication modules, smart-home gas safety appliances and the system suitable for gas safety. Our designed system consists of a micom gas meter, an automatic extinguisher, sensors, and a wall-pad. A micom-gas-meter monitors gas flow, gas pressure, and earthquake. An automatic fire extinguisher checks combustible gas leaks and temperature of $100^{\circ}C$(cut off) and $130^{\circ}C$(fire). Sensors measure smoke and CO gas. In our novel system, a micom-gas meter cut off inner valve with warnings, an automatic fire extinguisher cut off middle valve and spray extinguishing materials, and sensors generate signals when detecting smoke and CO and then take a next action. Gas safety appliances and sensors automatically takes measures, and transmit those information to a wall-pad. The wall-pad again transmits real time information to server. Users can check and manage gas safety situations by connecting BcN server through web or mobile application. We hereby devised scenarios for gas safety and risk management based on the smart, and demonstrated their efficiency through test applied to filed.

A Study on System for Environmental Control in the Greenhouse using Internet (인터넷 기반의 온실 환경 제어 시스템에 관한 연구)

  • Kim, Dae-Eop;Park, Heung-Bok
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.427-438
    • /
    • 2001
  • Recently, Environmental Control Devices of Green House for Protected Cultivation is composed of on/off-type Controller to control each device using timer in equipment of intensive Labor. In case of system, it is difficult to grasp condition of the greenhouse about errors when this system has defect of a hardware, and it operates in the remote place or at night. In this paper, we developed a system that capable of replacing the existing control method of on/off with display panel in the greenhouse, monitoring data aquisition and status in the greenhouse using client computer based on internet. Also this system can communicate with each local greenhouse, and send alarm message about error. And we constructed web server to manage efficient informations for environmental control and corps cultivation in the greenhouse.

  • PDF

A Comparative Study on Off-Path Content Access Schemes in NDN (NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구)

  • Lee, Junseok;Kim, Dohyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.319-328
    • /
    • 2021
  • With popularization of services for massive content, the fundamental limitations of TCP/IP networking were discussed and a new paradigm called Information-centric networking (ICN) was presented. In ICN, content is addressed by the content identifier (content name) instead of the location identifier such as IP address, and network nodes can use the cache to store content in transit to directly service subsequent user requests. As the user request can be serviced from nearby network caches rather than from far-located content servers, advantages such as reduced service latency, efficient usage of network bandwidth, and service scalability have been introduced. However, these advantages are determined by how actively content stored in the cache can be utilized. In this paper, we 1) introduce content access schemes in Named-data networking, one of the representative ICN architectures; 2) in particular, review the schemes that allow access to cached content away from routing paths; 3) conduct comparative study on the performance of the schemes using the ndnSIM simulator.

Design and Implement of Power-Data Processing System with Optimal Sharding Method in Ethereum Blockchain Environments

  • Lee, Taeyoung;Park, Jaehyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.143-150
    • /
    • 2021
  • In the recent power industry, a change is taking place from manual meter reading to remote meter reading using AMI(Advanced Metering Infrastructure). If such the power data generated from the AMI is recorded on the blockchain, integrity is guaranteed by preventing forgery and tampering. As data sharing becomes transparent, new business can be created. However, Ethereum blockchain is not suitable for processing large amounts of transactions due to the limitation of processing speed. As a solution to overcome such the limitation, various On/Off-Chain methods are being investigated. In this paper, we propose a interface server using data sharding as a solution for storing large amounts of power data in Etherium blockchain environments. Experimental results show that our power-data processing system with sharding method lessen the data omission rate to 0% that occurs when the transactions are transmitted to Ethereum and enhance the processing speed approximately 9 times.

Design of New Smart Switch with Remote Power Control and Standby Power Management Function (원격 전력제어 및 대기전력 관리 기능을 갖는 새로운 스마트 스위치 설계)

  • Lee, Yong-An;Kim, Kang-Chul;Han, Seok-Bung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2343-2350
    • /
    • 2010
  • In this paper, new smart switch that can monitor and control the power consumption and standby power in real-time by implementing an embedded web-server is proposed. The proposed switch can perform the following functions: measuring the electric power like commercial smart meter product, monitoring the power consumption in real-time in distant places through wire and wireless devices, and finally controlling ON/OFF of each switch. In addition, it also contains auto power-shutoff functions for standy power, overvoltage and overcurrent just like existing power-saving outlet and mulitap. Finally, the proposed smart switch has lower hardware and power consumption than the existing products and can be commercialized as a small-sized product by using exclusive embedded web-server of its own, rather than using PC for monitoring and remote control.

Improvements of the Hsiang-Shih's remote user authentication scheme using the smart cards (스마트카드를 이용한 Hsiang-Shih의 원격 사용자 인증 스킴의 개선에 관한 연구)

  • An, Young-Hwa
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.119-125
    • /
    • 2010
  • Recently Hsiang-Shih proposed the user authentication scheme to improve Yoon et al's scheme. But the proposed scheme has not been satisfied security requirements considering in the user authentication scheme using the password based smart card. In this paper, we proved that Hsiang-Shih's scheme is vulnerable to the off-line password guessing attack. In other words, the attacker can get the user's password using the off-line password guessing attack on the scheme when the attacker steals the user's smart card and extracts the information in the smart card. Also, the improved scheme based on the hash function and random number was introduced, thus preventing the attacks, such as password guessing attack, forgery attack and impersonation attack etc. And we suggested the effective mutual authentication scheme that can authenticate each other at the same time between the user and server.

Analysis on Security Vulnerability of Password-based key Exchange and Authentication Protocols (패스워드 기반 키 교환 및 인증 프로토콜의 안전성에 관한 분석)

  • Park, Choon-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1403-1408
    • /
    • 2008
  • A number of three party key exchange protocols using smart card in effort to reduce server side workload and two party password based key exchange authentication protocols has been proposed. In this paper, we introduce the survey and analysis on security vulnerability of smart card based three party authenticated key exchange protocols. Furthermore, we analyze Kwak et al's password based key exchange and authentication protocols which have shown security weakness such as Shim et al's off-line password guessing attack and propose the countermeasure to deter such attack.

  • PDF

Analysis of MPLS Traffic Engineering on Internet (인터넷망의 MPLS 트래픽 엔지니어링 기술 동향)

  • Chung, M.Y.;Yang, S.H.;Lee, Y.K.
    • Electronics and Telecommunications Trends
    • /
    • v.15 no.5 s.65
    • /
    • pp.115-124
    • /
    • 2000
  • 본 논문에서 차세대 인터넷에서 고품질 서비스를 제공할 수 있는 MPLS 트래픽 엔지니어링의 핵심기술 및 MPLS 시스템의 개발 동향에 대하여 살펴본다. MPLS 트래픽 엔지니어링을 위한 주요 기능으로는 QoS Path 계산/MPLS 신호 프로토콜/QoS 패킷 분류와 분배 기능 등이 있다. QoS Path 계산은 Off-line과 On-line 방식을 통하여 최적의 QoS 경로를 선택하는 기능으로 상호 보완적인 관계에 있으며, MPLS 신호 프로토콜은 LDP에 기반한 CR-LDP와 RSVP에 기반한 RSVP-TE의 두 가지 프로토콜이 IETF에서 표준화 진행중에 있으나 지속적인 보완으로 기술적 우열을 가리기 어려운 상태에 있다. 향후 중점 연구 및 개발 사항으로 네트워크 장애시의 빠른 경로 복구와 부하 분산 등을 통해 네트워크 운용 및 서비스 신뢰도 향상시킬 수 있는 ER-LSP Protection 방법에 대한 연구 및 MPLS 트래픽 엔지니어링을 통한 인터넷망의 고속화 및 안정화를 위해서는 트래픽 엔지니어링 서버에 대한 개발이 요구된다. 또한, QoS 패킷의 분류 및 다양한 응용 서비스 제공을 위해서는 네트워크 프로세스를 이용한 고성능 전달 엔진에 대한 연구가 절실히 요구된다.