• Title/Summary/Keyword: 이동 무선망

Search Result 919, Processing Time 0.024 seconds

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

Efficient Computing Method for Location-Based Density of Mobile Node (효과적인 위치 기반 이동 노드 밀집도 계산방법)

  • Kim, In-bum;Seo, Choon-weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2196-2204
    • /
    • 2015
  • Location-based density information of mobile node could be used well in various, new and expanding areas such as location-based services, internet of things, smart grid technologies, and intelligent building. In general, receiving mobile nodes of a wireless mobile node depend on the maximum communication range of transmitting mobile node. In this paper, efficient computing method for mobile node using Delaunay triangulation is proposed, which is irrespective of mobile node's maximum communication range and reflect relative location in a given situation. Proposed method may be good used to find out the density of network constructed by various max communication range devices as Internet of Things. This method suggested in this paper could work well for location-based services, internet of things, smart grid technologies, and intelligent building.

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

A Low-weight Authentication Protocol using RFID for IPTV Users (RFID를 이용한 IPTV 사용자의 경량화 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.105-115
    • /
    • 2009
  • At the most recent, IPTV service is increasing, which isa communicative broadcasting fusion service that provides various multimedia contents interactively followed by user's request through super high-speed internet. For IPTV user service with high mobility, IPTV user's enrollment is essential. However, IPTV service provided to mobile users can't provide the certification of mobile user securely. This paper proposes light user certification protocol which can certificate mobile users by attaching RFID to IPTV STB for secure awareness of mobile users who get IPTV service. The proposed protocol prevent reply attack and man-in-the-middle attack from happening oftenin a wireless section by transmitting the result value hashed by hash function with both its' ID and random number received from tag after tag transmits random number which generated randomly in the process of certification of mobile user to IPTV STB.

Performance of Cellular Ethernet System with Fast Handovers for WiBro Networks (고속 핸드오버를 지원하는 휴대 인터넷용 셀룰라 이더넷 시스템의 성능 분석)

  • Jung, Han-Gyun;Yoon, Chong-Ho;Cho, Jae-Hun;Oh, Yun-Je;Hwang, Seong-Taek
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.25-34
    • /
    • 2006
  • In this paper, we propose the new Cellular Ethernet System that supports faster handovers than IP layer handover scheme for WiBro Networks and analyze the performance of the proposed scheme. In WiBro Networks, it is very important for service providers that supports fast handovers for mobile users who want superior service. But in case of Mobile IPv6, which supports IP layer handovers, there exists very long latency for detecting movement and duplicated IP address. And besides, handovers in wired area must be carried out after completing handovers in wireless area. So, Mobile IPv6 cannot provide superior service to mobile users. To remedy these problems, we here propose the new Cellular Ethernet System that consists of MAC layer bridges for WiBro Networks and analyze the performance of Cellular Ethernet System handover scheme and show that it has better performance than Mobile IPv6.

A Study on the Cell Planning Simulation of Mobile Radio Communication Networks Using a Propagation Prediction Model (전파예측모델에 의한 이동통신 무선망 셀 계획의 시뮬레이션 연구)

  • 최정민;오용선
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.204-209
    • /
    • 2003
  • In an urban area telecommunication using wireless system, the accurate prediction and analysis of wave propagation characteristics are very important to determine the service area, optimized selection of base station, and cell design, etc. In the stage of these analyses, we have to present the propagation prediction model which is varied with the type of antenna, directional angle, and configuration of the ground in our urban area. In addition we need to perform an analysis of the conventional model which is similar to ours and dig out the parameters to evaluate the wave environment before the cell design for the selected area. In this paper, we propose a wave propagation prediction model concerning the topography and obstacles in our urban area. We extract the parameters and apply them to the proposed wave environment for the simulation analyzing the propagation characteristics. Throughout these analyzing procedure, we extracted the essential parameters such as the position of the base station, the height of topography, and adequate type and height of the antenna with our preferable correctness.

  • PDF

A Study on the Cell Planning Simulation of Mobile Radio Communication Networks Using a Propagation Prediction Model (전파예측모델에 의한 이동통신 무선망 셀 계획의 시뮬레이션 연구)

  • 최정민;오용선
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.2
    • /
    • pp.21-27
    • /
    • 2004
  • In an urban area telecommunication using wireless system, the accurate prediction and analysis of wave propagation characteristics are very important to determine the service area optimized selection of base station, and eel design, etc. In the stage of these analyses, we have to present the propagation prediction mood which is varied with the type of antenna, directional angle, and configuration of the ground in our urban area in addition we need to perform an analysis of the conventional mode which is similar to ours and dig out the parameters to evaluate the wave environment before the cell design for the selected area. In this paper, we propose a wave propagation prediction model concerning the topography and obstacles in our urban area. We extract the parameters and apply them to the proposed wave environment for the simulation analyzing the propagation characteristics. Throughout these analyzing procedure, we extracted the essential parameters such as the position of the base station, the height of topography, and adequate type and height of the antenna with our preferable cuteness.

  • PDF

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.