• Title/Summary/Keyword: 재인증

Search Result 49, Processing Time 0.033 seconds

Efficient Anonymous On-Demand Routing Protocol in MANET (익명성을 지원하는 효율적인 MANET On-Demand 라우팅 프로토콜)

  • Sung-Yun Lee;Hee-Kuck Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1465-1468
    • /
    • 2008
  • 모바일 에드혹 네트워크(MANET)에서 익명 라우팅을 위해 각 노드가 익명ID를 이용하여 MAC 단에서 익명으로 서로를 인증하고 네트워크 단에서 익명 라우팅 수행하는 AODV 기반의 라우팅 기법이 제안된바 있다[4]. 하지만 기존의 제안된 방법은 익명ID가 변경될 때마다 페어링 연산을 통해 재인증을 해야 하며, 라우팅 경로 중간의 노드들은 메시지의 연결성을 없에게 위해 매홉마다 암·복호화를 반복하여 상당히 비효율적이다. 본 논문은 기존논문의 노드 인증 기법을 확장하여 실제 메시지의 교환과정에서 일어나는 홉 간 암호화 횟수를 줄이고, 임시 인증값을 이용한 노드 상호간의 빠른 인증 기법을 사용하여 노드간의 인증과 익명성을 보장하는 보다 효율적인 프로토콜을 제안한다.

XML-based Single Sign-On Scheme for Internet Protocol TV(IPTV)Services (IPTV 서비스 제공을 위한 XML 기반의 단일인증 구조)

  • Lee, Seung-Hun;Shin, Dong-Il;Shin, Dong-Kyoo
    • Journal of Broadcast Engineering
    • /
    • v.14 no.4
    • /
    • pp.463-474
    • /
    • 2009
  • By employing the subscriber concept in broadcasting services, IPTV (Internet Protocol Television) operators provide various grades of services to subscribers based on the billing level of the subscribers. With the income from subscribers for a basis, IPTV operators plan to provide high quality services. Since Web browser-based IPTV provides T-commerce and E-commerce services as well as television services, users may frequently visit other service domains to buy goods or content. To provide the user with charged or private services, these service domains request authentication of user. The existing authentication system is not appropriate for the IPTV service environment because the environment unavoidably forces the user to cross from one authentication-based service domain to another. Single sign-on provides a user with transparent authentication services by enabling an authenticated user to move between authentication-based service domains without any re-authentication. Like this distributed environment, since the IPTV service environment also provides a variety of authentication-based services, transparent authentication service needs to be provided to subscribers who want to access charged or private services. In this paper, we propose a new user authentication scheme for the IPTV environment. This scheme integrates the Security Assertion Markup Language (SAML), which is a standard for XML-based single sign on. We validate this scheme using a simple use case scenario.

Memory Impairment in Dementing Patients (치매환자의 기억장애)

  • Han, Il-Woo;Seo, Sang-Hun
    • Sleep Medicine and Psychophysiology
    • /
    • v.4 no.1
    • /
    • pp.29-38
    • /
    • 1997
  • Dementia is defined as a syndrome which is characterized by various impairments in cognitive functions, especially memory function. Most of the diagnostic criteria for dementia include memory impairment as on essential feature. Memory decline can be present as a consequence of the aging process. But it does not cause significant distress or impairment in social and occupational functionings while dementiadoes. Depression may also be associated with memory impairment. However, unlike dementia, depression dose not cause decrease in delayed verbal learning and recognition memory. In dementia, different features of memory impairment may be present depending on the involved area. Memory impairment in cortical dementia is affected by the disturbance of encoding of information and memory consolidation, while memory imparnene in subcortical denentiy is affected by the disturbance of retrieval in subcortical dementia.

  • PDF

Software license acquisition Authority authentication management system development by Client Sever method (Client·Sever방식을 활용한 Software License 사용자 인증 통합관리시스템 개발에 관한 연구)

  • Kim, Jae-Hyeun;Ju, Ireh;Kim, Hyuhng Joon;Kim, Ye-Eun;Kim, Jin-Mook;Lee, Dong-Sub;Kim, Dong-wan;Park, Gyeong-Sik;Lee, Da-Heun;Koo, Dae-Geun;Yoon, Do-Sang;Kim, Do-Yen
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.407-410
    • /
    • 2017
  • 본 라이선스 통합관리시스템은 사용자에게는 소프트웨어 라이선스의 간편한 인증 요청과 재인증 절차를 제공하고 라이선스 발급하고 인증하는 관리자는 사용자의 현황 파악이 가능하며 언제 어디서나 간편하게 라이선스를 제공하여 많은 시간을 단축하고 라이선스 관리 비용을 절감한다. 효율적인 소프트웨어 인증관리시스템의 개발로 소프트웨어 불법적인 사용을 방지하여 건전한 생태계를 조성할 수 있다.

An Authentication Interworking Mechanism between Multiple Wireless LANs for Sharing the Network Infrastructure (망 인프라 공유를 위한 무선랜 시스템들간의 상호 인증 연동 방법)

  • Lee Wan Yeon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.451-458
    • /
    • 2004
  • The previous studies focussed on the security problem and the fast re-authentication mechanism during handoffs in a single wireless LAN system. When the multiple wireless LAN systems share their network infrastructure one another, we propose an authentication mechanism allowing the subscriber to Perform the authentication procedure with the authentication server of its own wireless LAN system even in areas of other wireless LAN systems as well as in areas of its own wireless LAN system. In the proposed mechanism, the access point or the authentication server of other wireless LAN systems plays a role of the authentication agent between the subscriber and the authentication server of the subscriber's wireless LAN system. The proposed authentication mechanism is designed on the basis of the 802.1X and EAP-MD5 protocols.

Design of G-SEED : EB System for Enhanced Green Building Re-Certification in IoT Environment (IoT 환경에서 녹색건축 재인증제도 개선을 위한 G-SEED : EB 시스템 설계)

  • Kim, Woong-Bo;Park, Seok-Cheon;Kim, Dea-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.522-525
    • /
    • 2015
  • "녹색건축 인증제도"는 건축물의 자재생산단계, 설계, 건설, 유지 관리, 폐기에 걸쳐 건축물의 전 과정에서 발생할 수 있는 에너지와 자원의 사용 및 오염물질 배출과 같은 환경 부담을 줄이고, 쾌적한 환경을 조성하기 위한 목적으로 건축물의 친환경성을 평가하여 인증하는 제도이다. 우리나라는 2002년부터 제도를 운영해오고 있지만 LCA를 기반으로 한 평가기준이 미비하고, 인증대상 확대에 따른 수요를 대처하기 어려운 구조이다. 따라서 본 논문에서는 G-SEED와 국외 인증제도의 비교분석을 통해 문제점을 도출하고, 이를 해결하기 위한 IoT 환경에서의 G-SEED : EB 시스템 설계를 목적으로 하였다.

Improvement of Handoff Performance Using Prefetched AP Information in IEEE 802.11 (IEEE 802.11 환경에서 사전 AP 정보를 이용한 핸드오프 성능 개선)

  • Lee, Han-Na;Kim, Hyang-Mi;Kim, Sangkyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2401-2409
    • /
    • 2015
  • This paper proposes the improved handoff mechanism for IEEE 802.11 wireless LANs. When a wireless mobile node moves out of the coverage of its currently associated AP(Access Point) and needs to be re-associated with a new AP, a handoff procedure is initiated. Channel scanning process during a handoff procedure occupies over 90% of total handoff latency. Long latency leads to many packet losses and service discontinuity, which degrades wireless network performance. This paper describes about the new mechanism to improve handoff performance by skipping channel scanning during a handoff procedure. In oerder for that, acquires neighboring AP information such as its address, location, channel number in use, the number of associated nodes before handoff, and delivers the information to its associated mobile nodes. The mobile nodes can reduce handoff latency and perform more exact handoff using the delivered AP information. We have conducted simulations to analyze our proposal's performance and confirmed that handoff latency and the number of handoff occurrences are decreased.

Secure Handoff Based on Dual Session Keys in Mobile IP with AAA (Mobile IP 및 AAA 프로토콜 기반으로 신속성과 안전성을 고려한 듀얼세션키 핸드오프 방식연구c)

  • Choi Yumi;Lee Hyung-Min;Choo Hyunseung
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.107-119
    • /
    • 2005
  • The Mobile IP has evolved from providing mobility support for portable computers to support wireless handheld devices with high mobility patterns. The Mobile IP secures mobility, but does not guarantee security, In this paper, the Mobile IP has been adapted to allow AM protocol that supports authentication, authorization and accounting for authentication and collection of accounting information of network usage by mobile nodes, For this goal, we propose a new security handoff mechanism to intensify the Mobile IP security and to achieve fast handoff. In the proposed mechanism, we provide enough handoff achievement time to maintain the security of mobile nodes, According to the analysis of modeling result, the proposed mechanism composed the basic Mobile IP along with AM protocol is up to about $60\%$ better in terms of normalized surcharge for the handoff failure rate that considers handoff time.

  • PDF

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

Design of a Secure Session Key Exchange Method for tow Latency Handoffs (Low Latency Handoffs를 위한 안전한 세션 키 교환 기법 설계)

  • Kim Hyun-Gon;Park Chee-Hang
    • Journal of Internet Computing and Services
    • /
    • v.5 no.3
    • /
    • pp.25-33
    • /
    • 2004
  • Mobile IP Low Latency Handoffs(l) allow greater support for real-time services on a Mobile IP network by minimizing the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to re-authentication the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoffs without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide confidentiality and integrity of session keys in the phase of key exchange between agents, it uses a key sharing method by gateway foreign agent that performs a trusted thirty party. The proposed method allows the mobile node to perform Low Latency Handoffs with fast as well as secure operation.

  • PDF