• Title/Summary/Keyword: Access Networking

Search Result 302, Processing Time 0.027 seconds

Integrated Security Management Framework for Secure Networking

  • Jo, Su-Hyung;Kim, Jeong-Nyeo;Sohn, Sung-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2174-2177
    • /
    • 2003
  • Internet is exposed to network attacks as Internet has a security weakness. Network attacks which are virus, system intrusion, and deny of service, put Internet in the risk of hacking, so the damage of public organization and banking facilities are more increased. So, it is necessary that the security technologies about intrusion detection and controlling attacks minimize the damage of hacking. Router is the network device of managing traffic between Internets or Intranets. The damage of router attack causes the problem of the entire network. The security technology about router is necessary to defend Internet against network attacks. Router has the need of access control and security skills that prevent from illegal attacks. We developed integrated security management framework for secure networking and kernel-level security engine that filters the network packets, detects the network intrusion, and reports the network intrusion. The security engine on the router protects router or gateway from the network attacks and provides secure networking environments. It manages the network with security policy and handles the network attacks dynamically.

  • PDF

A Study on Wireless Home Network Platform for End-to-End Seamless Connection and TCP Performance Improvement (종단간 끊김없는 연결과 TCP 성능의 향상을 위한 무선 홈네트워크 플랫폼에 관한 연구)

  • Kim, Byoung-Hoon;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.10
    • /
    • pp.1295-1309
    • /
    • 2007
  • A wireless access point is used for all communications in the infrastructure mode wireless home networking, including communication between mobile nodes in the same service area. When a mobile station in the infrastructure mode wireless home networking moves into a dead zone, the communication between the mobile station and the access point is disconnected. To solve this problem, the existing wireless home network platforms focus on the ad hoc mode wireless home networking. However, the performance of an ad hoc network is poorly decreased when the number of mobile participating in the ad hoc network increases. In addition, although the ad hoc routing technique is necessary to support seamless communication of mobile nodes, the existing routing protocols, such as AODV and DSR, do not consider that a wireless channel state could affect performance significantly. Therefore, we propose a wireless home networking platform based on the ESCOD (End-to-end Seamless multi-hop COnnection based on Dual network mode) technique incorporating the VLR (Virtual Link Routing) scheme that supports end-to-end seamless connections. Extensive experiments show that the proposed wireless home networking platform incorporating the VLR scheme outperforms wireless home networking platforms based on the AODV and the DSR routing protocols respectively in terms of low packet transmission failure rate, fast packet transmission time, high TCP performance, and a wider coverage area of wireless home networks.

  • PDF

Study on Agent based Internetworking Platform (에이전트 기반 인터네트워킹 플랫폼 연구)

  • 전준현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.314-324
    • /
    • 2004
  • Recently, high-speed internet subscribers have grown continuously, and reached up to 10 millions. But existing network management that is responsible only for user access is confronted with many difficulties, since user access network(xDSL, Cable, B-WILL, and so on) has diversified and value added wired/wireless contents service has developed. In this paper propose the Agent based Inter Networking platform as object-oriented hierarchical system that can provide various service such as access QoS(Quality of Service), customized application service and security service according to user on demand. This system has divided into two parts(user agent and agent management system & local and central management systems). Management system periodically receive status information such as bandwidth, download speed, delay, current service, and so on, and process them, then build a policy based on processed information. According to personal user profile that is generated by this policy, the customized service can be provided for users. And This system adopt the object-oriented modeling in case that system migration and integration, and implement a system that is robust and stable for security through hierarchical server system.

Establishment of a secure networking between Secure OSs

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2097-2100
    • /
    • 2003
  • Many studies have been done on secure operating system using secure kernel that has various access control policies for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policies like DAC(Discretionary Access Control), MAC(Mandatory Access Control), RBAC(Role Based Access Control), and so on. But, even if secure operating system is running under various access control policies, network traffic among these secure operating systems can be captured and exposed easily by network monitoring tools like packet sniffer if there is no protection policy for network traffic among secure operating systems. For this reason, protection for data within network traffic is as important as protection for data within local system. In this paper, we propose a secure operating system trusted channel, SOSTC, as a prototype of a simple secure network protocol that can protect network traffic among secure operating systems and can transfer security information of the subject. It is significant that SOSTC can be used to extend a security range of secure operating system to the network environment.

  • PDF

The Authentication Framework in Access Network based on Home Gateway (홈 게이트웨이에 기반한 가입자망에서의 인증 프레임워크)

  • Yoon Hwa-Mook;Choi Byung-Sun;Lee Seoung-Hyeon;Lee Jae-Kwang;Lee Won-Goo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.160-168
    • /
    • 2005
  • Today, home networking security shows the complicated and various characteristics of requirements for consideration because of the variety of information appliances and share of resources among them. Therefore, security framework to satisfy with security functions is arranged ,regardless of the variety of communication medium and protocols. Thus, we construct security framework for mobile host(or user) to securely control devices in home-network through the variety of suggested mechanism, with security mechanism to be available for future home networking model, and verified the performance of our model.

  • PDF

An Investigation on Security Management Architecture of Home Gateway (홈 게이트웨이 보안 관리 방식에 관한 연구)

  • Kim, Hyun Cheol;An, Seong Jin;Jung, Jin Wook;Kim, Seung Hae;Ryu, Yoon Sik;Jun, Young Il
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.67-74
    • /
    • 2003
  • Home network technologies which interconnect various wire and wireless home appliances, access network technologies and service offer technologies are continuing growth. To provide secure services in the home, home network environment, access network environment, and various service and contents offer technologies are consist organically. Thesis of administration method of systematic and effective groove network is most urgent and important urea to offer safety and authoritativeness of home networking service in home network that strong certification and security function are required among these technologies. In this paper, we propose home gateway security management architecture and the way to use SNMPv3. Also, we propose structure and function of home network management system to support various home networking security scenarios.

  • PDF

A design of HomePNA2.0 PHY. (10Mbps급 HomePNA2.0 PHY. 회로 설계)

  • 박성희;구기종;김종원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1282-1287
    • /
    • 2002
  • In this Paper, we present the design of 10Mbps HomePNA(Home Phoneline Networking Alliance) PHY which is Home Network Technology using phone-line. It is connected with external interface through MII(Media Independent Interface) and AFE(Analog Front End) Interface. 10Mbps HomePNA PHY is composed with Management Block IEEE 802.3 CSMA/CD MAC(Media Access Control) Block Modulator block and Demodulator block. For their verification, we designed a prototype FPGA PCB board using XPC860T made in Motorola. We verified HomePNA frame data transmission using a driver program based Linux kernel. we verified rate negotiation by HomepNA 2.0 Link Layer Protocol.

Performance Analysis of Multicarrier DS-CDMA for Vehicular Sensor Communications and Networking (자동차 내부 센서간의 통신 및 네트워킹을 위한 다중 반송파 DS-CDMA의 성능 분석)

  • Park, Tae-Yoon;Choi, Jae-Ho
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.5
    • /
    • pp.761-770
    • /
    • 2004
  • The multicarrier direct sequence code-division (MC-DS/CDMA) is a well-known multiple access and data transmission scheme that is applicable for various mobile and wireless communications. Particularly for modern, smart vehicles equipped with multiple sensors, MC-DS/CDMA is one of the possible means for giving the sensors to get connected one another for sending and receiving messages and control information. For intra-vehicalur communicaiton and networking applications, we have proposed a novel MC-DS/CDMA multiple access and data transmission scheme incorporating a new idea of inserting sub-symbol based cyclic prefixes for compromising inter-symbol interference. In the performance investigation of our MC-DS/CDMA, we have looked into system performances related to bandwidth utiltzation, coding gain, and multiple number of sensors. Since the channel delay is comparatively shorter inside of vehicle than any other general mobile channels, the proposed scheme can be a successful candidate for networking wireless sensors simultaneously operting in an intelligent vehicle.

  • PDF

Resource Allocation and IP Networking for Next Generation Military Satellite Communications System (차기 군 위성통신 체계를 위한 자원 할당 및 IP 네트워킹)

  • Noh, Hong-Jun;Go, Kwang-Chun;Lee, Kyu-Hwan;Kim, Jae-Hyun;Lim, Jae-Sung;Song, Ye-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.939-954
    • /
    • 2013
  • Korean military is developing the next generation military satellite communications system in order to achieve the requirements of future military satellite communication such as high speed, high capacity, survivability, all IP networking, and on-the-move. In this paper, we survey and analyze the research interests about optimal resource allocation and IP networking such as MF-TDMA, random access, satellite IP routing, and PEP. Conventional researches have focused on the increase in channel throughput and efficiency. In addition to these measurements, we consider heterogeneous satellite terminals, full mesh topology, distributed network, anti-jamming, and the like which are the special characteristics of the next generation military satellite communications system. Based on this, we present key research issues and evaluation on the issues by simulation.

Worst-case Delay Analysis of Time-Triggered 802.15.4 for Wireless Industrial Environments

  • Kim, Hyun-Hee;Lee, Kyung-Chang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.3
    • /
    • pp.205-212
    • /
    • 2017
  • This paper focuses on worst-case delay analysis of the time-triggered IEEE 802.15.4 protocol to satisfy the industrial quality-of-service (QoS) performance. The IEEE 802.15.4 protocol is considered to be unsuitable for industrial networks because its medium access control method is contention-based CSMA/CA, which exhibits unstable performance with an unbounded delay distribution under heavy traffic. To avoid these limitations, this paper presents a time-triggered version of the nonbeacon-enabled network of IEEE 802.15.4 that relies on a time division multiplexing access (TDMA) method implemented in the application layer without any modification of specification. The timing analysis of this time-triggered IEEE 802.15.4 was executed, and the worst-case transmission delay was calculated. Based on this analysis, the time-triggered IEEE 802.15.4 is a promising alternative for wireless industrial networking.