• Title/Summary/Keyword: 인터넷프로토콜

Search Result 2,042, Processing Time 0.028 seconds

Research on the Feasibility of DAP-NAD for Wideband Tactical Ad-hoc Network (광대역 전술 Ad-hoc Network를 위한 DAP-NAD 가용성에 대한 연구)

  • Han, Se-Won;Kim, Byung-Seo;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.199-204
    • /
    • 2011
  • This paper evaluates on the feasibility of MIL-STD-188-220 protocol as a medium access protocol over WNW(Wideband Network Waveform) by simulating and comparing with IEEE 802.11e-based protocol. WNW is newly designed waveform for next-generation broadband tactical communication system. This paper shows the feasibility of using the MIL-STD-188-220 protocol that shows better performance than IEEE 802.11e-based protocol on the particular environment.

A Research on Gender Analysis of BGP Security (BGP의 보안성에 대한 기존 연구 분석)

  • Sun, Jae-Hoon;Kim, Yong-Ho;Sun, Yong-Bin
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.35-41
    • /
    • 2009
  • Internet routing protocols currently in use in the typical protocol of the existing BGP protocol to strengthen the security of the BGP protocol by comparison with research on emerging issues of the AS-Path, IP Fake, DRDoS BGP protocol must be used when such the information you need, but due to malicious attack, or an incorrect setting can prevent the global Internet network operating in an security to threat information are analyzed.

  • PDF

Secure Credit Card based Micro-Payment Protocol in Wireless Internet (무선인터넷에서의 안전한 신용카드기반의 소액 지불 프로토콜)

  • JIN, Shi-Mei;Li, Yong-Zhen;Lee, Hyun-Ju;Rhee, Chung-se
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.461-464
    • /
    • 2004
  • 무선 환경에서의 전자상거래가 빠르게 성장함에 따라 종단간 보안이 필요하다. 기존 WTLS를 사용하는 WPP 프로토콜에서는 종단간 사용자 안전성을 보장하고 있지 않다. 이 논문에서는 AIP프로토콜에서 사용자와 서비스 제공자간에 종단간 안전성이 제공되는 무선 인터넷 플랫폼에 독립적인 소액지불 프로토콜을 제안한다. 또한 인증기관이 인증과정에 참여할 경우 ID 기반 공개키 암호 시스템을 적용한 세션키를 생성하여 제안 프로토콜의 안전성 및 효율성을 분석한다

  • PDF

Contents-based Application Layer Routing Protocol for Wireless Internet Services (무선 인터넷 서비스를 위한 컨텐츠 기반의 응용 계층 라우팅 프로토콜)

  • Park, HaeYong;Lee, JiHyun;Lim, Kyungshik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1525-1528
    • /
    • 2004
  • 현재의 무선 인터넷 환경에서는 유선 환경에서의 다양한 컨텐츠 및 프로토콜을 무선 단말에 맞도록 전용 서비스 게이트웨이를 이용하여 변환 처리함으로써 사용자 증가에 따른 부하 집중과 이로 인한 서비스 질의 저하를 초래하고 있다. 이러한 문제를 해결하기 위하여 본 논문에서는 오버레이 네트워크 상에서 부하를 동적으로 분산 처리할 수 있는 컨텐츠 기반의 응용 계층 라우팅 프로토콜을 제안한다. 이 프로토콜은 단말기로부터의 기능(capability) 정보, 오버레이 노드로부터의 시스템 부하 및 네트워크 상태 정보, 응용으로부터의 컨텐츠 정보를 종합하여, 서버로부터 컨텐츠를 요구한 단말기까지 최적의 응용계층 경로를 선택한다. 컨텐츠는 서버로부터 단말까지 선택된 경로를 따라 전송되면서 하나 이상의 중간 노드에서 단말기의 기능에 맞도록 최적화된다. ns-2 네트워크 시뮬레이터로 프로토콜을 구현하고 성능을 측정한 결과, 전용 서비스 게이트웨이를 사용한 경우보다 더욱 많은 부하에서도 훨씬 짧은 서비스 반응 시간을 얻을 수 있었다. 향후, 본 논문에서 제안한 프레임워크 내에서 다양한 경로 선택 알고리즘에 대한 연구를 추진할 예정이다.

  • PDF

Implementation of 3GPP RLC Testbed for Protocol Verification and Evaluation (3GPP RLC 프로토콜의 검증 및 평가 테스트베드의 구축)

  • Sung, Junghwan;Suh, Hyo-Joong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.111-118
    • /
    • 2013
  • The connection based TCP protocol provides reliable packet delivery, but it takes certain overhead compare to the connection-less UDP protocol. Thus, 3GPP devise the upper-layer RLC protocol which provides reliability based upon the UDP protocol. Consequently, each implement of a base station and/or mobile terminal require the development of the RLC protocol, and it must qualify various interoperable tests. In this paper, we implement a testbed which verifies the RLC protocol under various packet losses/inversion circumstances of networks. Finally, we propose our testbed as the RLC protocol tester for the developments.

Energy Improvement of WSN Using The Stochastic Cluster Head Selection (확률적 클러스터 헤드 선출 방법을 이용한 WSN 에너지 개선)

  • Lee, Jong-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.125-129
    • /
    • 2015
  • The most important factor within the wireless sensor network is to have effective network usage and increase the lifetime of the individual nodes in order to operate the wireless network more efficiently. Therefore, many routing protocols have been developed. The LEACH protocol presented by Wendi Heinzelman, especially well known as a simple and efficient clustering based routing protocol. However, because LEACH protocol in an irregular network is the total data throughput efficiency dropped, the stability of the cluster is declined. Therefore, to increase the stability of the cluster head, in this paper, it proposes a stochastic cluster head selection method for improving the LEACH protocol. To this end, it proposes a SH-LEACH(Stochastic Cluster Head Selection Method-LEACH) that it is combined to the HEED and LEACH protocol and the proposed algorithm is verified through the simulation.

An Enhancement of Simple Authenticated Key Agreement Protocol (개선된 '간단한 인증키 동의 (Simple Authenticated Key Agreement)'프로토콜)

  • Kim Young-Sin;Kim Yoon-Jeong;Hwang Jun
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.95-102
    • /
    • 2003
  • The Diffle-Hellman Key Exchange scheme can produce a common session key between the two communicators, but its problem is that it makes a man-in-the middle attack possible. To solve problems like these, several protocols have been put forward, and the Simple Authenticated Key Agreement (SAKA) Protocol is among them. This protocol has been suggested by Seo-Sweeney, Tseng, and Ku-Wang, respectively, In this paper, we will put forward a new protocol that has been improved from all the original protocols mentioned above, but is still safe and quick to use, While the existing protocol divides the common session key production stage and the verification stage, the protocol suggested in this paper takes care of both of those stages simultaneously, therefore improving the processing performance.

  • PDF

A New and Flexible Mdlti-signcryption Protocol (유연성을 가진 새로운 멀티-사인크립션 프로토콜)

  • Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.288-295
    • /
    • 2005
  • Multi-signcryption scheme is an extension of signcryption scheme for multi-signers performing together the signcryption operation on messages, and it provides useful cryptographic functions such as confidentiality and authenticity for the sound circulation of messages through the Internet. In this paper, we show the weaknesses of the previous multi-signcryption schemes. And then we propose a new multi-signcryption scheme that improves the weaknesses and the efficiency of the previous schemes. Our scheme efficiently provides message flexibility, order flexibility, message verifiability, order verifiability, message confidentiality, message unforgeability, non-repudiation and robustness. Therefore, it is suitable for protecting messages and multi-signers from malicious attacks in the Internet.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Interconnection Architecture of Cross-Layer Protocols to Provide Internet Services in VSAT Based Satellite Communication Systems (VSAT 기반 위성통신 시스템에서 인터넷 서비스 제공을 위한 계층 간 프로토콜 연동 구조)

  • Kim, Jeehyeong;Noh, Jaewon;Cho, Sunghyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1190-1196
    • /
    • 2016
  • In this paper, a cross-layer interworking scheme for different protocols is proposed to provide an efficient internet services in very small aperture terminal (VSAT) based satellite communication systems. In addition, we implement the proposed interworking model and prove the feasibility of the proposed system. VSAT based satellite communication systems commonly use digital video broadcasting (DVB)-S2 standard. Unfortunately, DVB-S2 has inefficient parts to support IP based internet services because it has originally been designed to support broadcasting services. Generic stream encapsulation (GSE) protocol, which is a layer 2 protocol, has been proposed to mitigate this inefficiency. We propose a cross-layer interworking scheme to cooperate efficiently between IP and GSE protocols and between GSE protocol and DVB-S2, respectively. In addtion, we implement the proposed interworking schemes via computer softwares and prove the feasibility using NI-USRP and commercial DVB receiver.