• Title/Summary/Keyword: 세션화

Search Result 223, Processing Time 0.029 seconds

Dynamic Allocation Algorithm for enhancement of transmission performance on a radio encryption system (무선암호시스템에서 전송성능 개선을 위한 동적할당 알고리듬)

  • 홍진근;윤장홍;장병화;황찬식
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.3-12
    • /
    • 2001
  • In this paper, a synchronized stream encryption system for secure link layer communication in a radio channel is designed. Interleaving scheme which is used to enhance the transmission performance over a fading channel is applied to the encrypted information. A designed synchronous scream cipher system consists of a keystream generator, a synchronization pattern generator and a session key generator. The structure of a synchronous stream cipher system with periodic synchronization is composed of the encrypted information which consists of a synchronization pattern, an error correcting coded session key, an encrypted data in a period of synchronization. In this paper, interleaving scheme using dynamic allocation a1gorithm(DAA) is applied the encrypted information. The BER of the DAA has been slightly higher than that of the SAA(static allocation algorithm).

A Case Study of Synchronization-Based Group Music Therapy for Promoting Peer Interaction of Children With Autism Spectrum Disorder (자폐범주성장애 아동의 또래 간 상호작용 촉진을 위한 동기화 기반 그룹 음악치료 사례)

  • Kim, Jiyun
    • Journal of Music and Human Behavior
    • /
    • v.17 no.1
    • /
    • pp.97-125
    • /
    • 2020
  • This case study examined the effects of synchronization-based group music therapy for improving peer interaction of children with autism spectrum disorder (ASD). The participants were five children between the ages of 6 and 10 with ASD. A total of eight 30-minute music therapy sessions were conducted two times a week. During sessions, target behaviors (i.e., engagement in joint action, synchronized movements, eye contact, and initiation of social interaction) were observed and analyzed. Also, the PIPPS-P was completed by parents to identify behavioral changes in real-life environments from pretest to posttest. Following the intervention, all of the participants showed increases in synchronized movements with peers and attempts to initiate social interaction. In addition, parents rated their children's play behavior as being improved in their everyday living environment. These results support that synchronous movements between children with ASD, which were facilitated with rhythmic cueing, led to enhanced engagement in joint action. Considering that those movements are the basis for further social skills (e.g., play behavior), this study also indicates that synchronization-based group music therapy could be an effective therapeutic approach for improving the peer interaction of this population.

The Effects of Rhythmic Auditory Stimulation (RAS) on Hemiplegia Patient' Gait (리듬적 청각자극이 편마비환자들의 보행에 미치는 영향)

  • Kim, Tae Youn
    • Journal of Music and Human Behavior
    • /
    • v.5 no.1
    • /
    • pp.1-17
    • /
    • 2008
  • The purpose of this study is to examine how rhythmic auditory stimulation (RAS), one of music therapy techniques for neurological rehabilitation, affects the factors of hemiplegia patients' turning gait and straight gait. This study is designed to compare elimination and intervention of music therapy for 4 weeks with repeated measure plan and measure factors are classified into 21 sub-factors. The subjects of this study were 4 patients who need walking training and they were requested by physical therapist a march and a lied were used to cure them by a researcher. Each session was composed of warming up, RAS gait training, ending. The music used for RAS gait training was provided with speed which was set to patient's own gait speed measured before music therapy. The speed was provided fast gradually and each session was proceeded for 50 minutes. The results of this study showed that walking abilities increase in the segments with music therapy (B) compared to those in the segment without music therapy (A), and this supports the previous report that the application of music therapy together with other treatments has a positive effect on improvement in the patient's walking abilities. In addition, this study is meaningful in that it demonstrated that RAS music therapy is helpful to improve walking abilities not only in straight gait but also in turning gait.

  • PDF

A Design of Framework for Thin-Client by using X Protocol based Application (X 프로토콜 기반의 애플리케이션을 통한 씬-클라이언트 프레임워크 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.509-520
    • /
    • 2009
  • The advancement of network & application technology causes a major change for the use of IT(Information Technology) equipment, including computer and mobile system. In the process from beginning with main frame in the 1960s and 70's, through the server-client paradigm in the 1980s and toward the development of network computer since 90's, computer systems are now evolutioning from isolated physical system to complementary network based virtual system[1][2]. In network based computer system, application and data required for operation are stored at not client as local system, but at server[1]. User can use application & data on a server as if those are on a local client, and a client is now toward a developing thin and network friendly system. In this paper, we discuss possible ways for the efficient implementation of thin-client. For the use of remote application & data as if in local environment, we make use of X protocol. Unlike formal simple Client - Server paradigm, we design a Proxy for middle-tier server for the improvement of QoS and session persistence. X server, Xvfb(X virtual frame buffer) are implemented on thin client and Server, respectively and we applied XSMP(X Session Management Protocol) to our framework for session management. In the end, beyond simple transfer of server display, we suggest thin client framework for the transfter of remote server application over internet.

  • PDF

Design and Implementation of a Real-time Bio-signal Obtaining, Transmitting, Compressing and Storing System for Telemedicine (원격 진료를 위한 실시간 생체 신호 취득, 전송 및 압축, 저장 시스템의 설계 및 구현)

  • Jung, In-Kyo;Kim, Young-Joon;Park, In-Su;Lee, In-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.4
    • /
    • pp.42-50
    • /
    • 2008
  • The real-time bio-signal monitoring system based on the ZigBee and SIP/RTP has proposed and implemented for telemedicine but that has some problems at the stabilities to transmit bio-signal from the sensors to the other sides. In this paper, we designed and implemented a real-time bio-signal monitoring system that is focused on the reliability and efficiency for transmitting bio-signal at real-time. We designed the system to have enhanced architecture and performance in the ubiquitous sensor network, SIP/RTP real-time transmission and management of the database. The Bluetooth network is combined with ZigBee network to distribute traffic of the ECG and the other bio-signal. The modified and multiplied RTP session is used to ensure real-time transmission of ECG, other bio-signals and speech information on the internet. The modified ECG compression method based on DWLT and MSVQ is used to reduce data rate for storing ECG to the database. Finally we implemented a system that has improved performance for transmitting bio-signal from the sensors to the monitoring console and database. This implemented system makes possible to make various applications to serve U-health care services.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Design and Implementation of a Framework for Collaboration Systems in the Shipbuilding and Marine Industry (조선해양 설계분야에서 협업시스템을 위한 프레임워크의 설계 및 구현)

  • Yun, Moon-Kyeong;Kim, Hyun-Ju;Park, Min-Gil;Han, Myeong-Ki;Kim, Wan-Kyoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.270-273
    • /
    • 2015
  • In shipbuilding and marine industry, engineering and design software solutions have upgraded from the original 2D schematic data based CAD system to a modern 3D drawing-based system. Due to the fact that the massive amount of data usage in real time and data volumes of various engineering models including graphic data have increased, several problems such as lack of server resources and improper handling of 3D drawings have been raised. Besides, increasing the number of session connections per server can cause deterioration of server performance. Recently, increasing the yard's sophisticated design capabilities highlighted the need to develop engineering and design system which would not only overcome the network performance issues, but would provide efficient collaborative design environment. This paper presents an overview of the framework for collaborative engineering design system based on the virtual application (Citrix XenApp 6.5)and acceleration hardware technology of 3D graphics (NVIDIA GRID K2 solution).

  • PDF