• Title/Summary/Keyword: Access Networking

Search Result 302, Processing Time 0.024 seconds

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

Performance Analysis of the HIPERLAN Channel Access Control Protocol (고속 무선 근거리 통신망(HIPERLAN) 채널접근제어 프로토콜의 성능분석)

  • Hyun, Young-Guen;Lee, Jong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.22-29
    • /
    • 2000
  • In this paper, we analyzed the performance of EY-NPMA(Elimination Yield-Non-preemptive Priority Multiple Access) protocol-channel access control protocol of HIPERLAN(HIgh PErformance Radio Local Area Network) type 1 specification, adopted as european high speed wireless LAN standard by ETSI(European Telecommunication Standards Institute). We established a system model for EY-NPMA protocol analysis, analyzed success probability in a channel access cycle, and derived expressions for the average length of contention phase. Using a M/G/1 model, we approximated the normalized delay, and throughput, and we evaluated these results by simulations.

  • PDF

Neighbor Cooperation Based In-Network Caching for Content-Centric Networking

  • Luo, Xi;An, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2398-2415
    • /
    • 2017
  • Content-Centric Networking (CCN) is a new Internet architecture with routing and caching centered on contents. Through its receiver-driven and connectionless communication model, CCN natively supports the seamless mobility of nodes and scalable content acquisition. In-network caching is one of the core technologies in CCN, and the research of efficient caching scheme becomes increasingly attractive. To address the problem of unbalanced cache load distribution in some existing caching strategies, this paper presents a neighbor cooperation based in-network caching scheme. In this scheme, the node with the highest betweenness centrality in the content delivery path is selected as the central caching node and the area of its ego network is selected as the caching area. When the caching node has no sufficient resource, part of its cached contents will be picked out and transferred to the appropriate neighbor by comprehensively considering the factors, such as available node cache, cache replacement rate and link stability between nodes. Simulation results show that our scheme can effectively enhance the utilization of cache resources and improve cache hit rate and average access cost.

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking

  • Kim, Ki Youn;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4748-4762
    • /
    • 2020
  • Recently, the COVID 19 pandemic has affected on our daily lives and society in many ways. Specifically, it has brought rapid changes in the working environment from office working to smart telecommuting. In addition, cloud computing technology and services not only provided ubiquitous access, but also led to a sharing of information, internal-external communication channels, telework, and innovative smart work for the business process. As a result, smart work services based on social cloud networking have spread to the public sector. However, existing academic research examining smart work merely remains to focus on the theoretical conceptualization or to deal with merely several examples of private views. Best practices of smart work services based on cloud computing technology in the public field rarely exists. Moreover, many studies have been differently measured the values of smart work for private and public sectors depending on organizational singularities. Therefore, the study aims to define new theoretical implications and to explore future business strategies and policy directions based on a technical working group's personal psychological subjectivity. The research applied Q methodology, and selected five public organizations in Korea, that they have adopted or currently plan to adopt some part of smart work services.

A Study on the Automatic Measurement at an Unmanned Measuring Station Using Image Processing and Wireless Networks (화상처리 및 무선네트워크를 이용한 무인 측정 지점에서의 원격 계측 자동화에 관한 연구)

  • Lee, Han-Jun;Cha, Myung-Suk;Lee, Choong-Hoon
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.3
    • /
    • pp.15-22
    • /
    • 2007
  • An automatic measurement system which collects experimental data at an unmanned station where the networking to the internet could not be accessed was developed. With a Robo-rail accessing to the unmanned station, wireless local networking between server PC at the Rob-rail and client PC at the unmanned station is possible within 30 m from an access point equipment located at the unmanned station. An algorithm for transferring the data file which is saved in the client PC at the unmanned station to the server PC in the Robo-rail was proposed. IEEE-1394 camera was used to collect the data at the client PC. An extracting program from the IEEE-1394 captured images to character data and number data was developed using image processing technique, which drastically reduces the size of data file comparing to that of the raw image file.

Monitoring Sensor Robot System based on Wireless Sensor Network (무선 센서 네트워크 기반의 모니터링 센서 로봇 시스템)

  • Choi, Ho-Jin;Pyun, Jae-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2330-2336
    • /
    • 2008
  • This paper deals with monitoring sensor robot control system for the application of wireless sensor network. In order to control the direction and speed of robot via remote sensing environment, low power, low weight sensors with ad-hoc networking between robots' sensors have been used. These wireless sensor network based robot monitoring system can be used for remote observation and detection of robots in the areas such as factories, power plants and other dangerous areas which are difficult for human access.

Development of Access Point Supporting Multiple Network Interfaces (다중 네트워크 인터페이스를 지원하는 액세스 포인트 개발에 관한 연구)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.109-114
    • /
    • 2004
  • Increasing popularity of WLAN and advancement of WPAN allow user to connect to the Internet easily today. The increasing of number of networking mobile device such as laptop and PDA requires computing devices to share high speed Internet line or work on networks in most cases. This has stimulated the demand of access point that supports multiple network interfaces. This paper describes the process of design, implementation and test of the wired/wireless integrated access point that supports multiple network interfaces such as wired LAN, wireless LAN, Bluetooth, and Broadband network. We designed and developed the hardware system and protocol software to integrate heterogeneous network. The system has shown compatibility with standard specification and good performance through testing with various network devices.

Implementation and Analysis of IEEE 802.15.4 Compliant Software based on a Vertically Decomposed Task Model (수직 분할 태스크 모델 기반의 IEEE 802.15.4 소프트웨어 구현과 성능평가)

  • Kim, Hie Cheol;Yoo, Seong Eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.53-60
    • /
    • 2014
  • IEEE 802.15.4 is one of the most widely adopted physical layer standards in the area of LR-WPAN(Low-Rate Wireless Personal Area Network). Numerous previous researches have contributed to deep insights on energy efficiency, transmission throughput, and reliability that IEEE 802.15.4 delivers to the LR-WPAN. As a research that is orthogonal and complementary to previous researches, we explore the implementation and practical performance evaluation of IEEE 802.15.4 MAC software. We implement the MAC software from the perspective of the networking stack, exploring the issues raised when the MAC software serves as a functional component in a complete networking stack consisting of MAC, network as well as well as application support layers. The performance is evaluated on a realistic experimental software environment integrated with operating system, networking stack, and applications.

Interface Development for Pre and Post processor on EDISON Platform Simulation System (EDISON 플랫폼 시뮬레이션 시스템에서 전처리 및 후처리기 연계를 위한 인터페이스 개발)

  • Kwon, Yejin;Jeon, Inho;Seo, Jerry H.;Lee, Jongsuk R.
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.103-110
    • /
    • 2020
  • The EDISON is a platform that supports numerical analysis for problem solving in computational science and engineering. We provide a cloud service for users, and provide an environment to access and execution of the simulation service on the web. For now, the EDISON platform provides simulation services for eight applied field on computational science engineering. Users can check the numerical analysis result by web in the computational science and engineering platform. In addition, various services such as community activity with other researchers, and the configuration of simulation environment by user 's needs can be provided. A representative service of the EDISON platform is a web-based simulation service that performs numerical analysis for problem solving of various computational science and engineering. Currently, EDISON platform provides workbench simulation service. It is the web-based simulation execution environment, and result analysis to provide simulation regardless of various personal computing resource or environment in each numerical analysis. In this paper, we build an interface for pre and post processor that can be used in conjunction with the workbench-based simulation service provided by EDISON platform. We provide a development environment with interface that is implemented by applying a pre and post processor optimized for the simulation service. According to simulation and execution are performed by linking the new workbench-based simulation service to the pre and post processor.

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.