• Title/Summary/Keyword: Access to Information (A2I)

Search Result 194, Processing Time 0.026 seconds

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

Hacking and Security of Encrypted Access Points in Wireless Network

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.156-161
    • /
    • 2012
  • An increasing number of people who use a smart phone or tablet PC are accessing wireless networks in public facilities including cafes and shopping centers. For example, iPhones and Android Phones have been available since 2010. However, security incidents may occur through all sorts of malicious code infection of users' personal information during the use of an insecure wireless network. In this paper, we will describe the Wi-Fi protected access (WPA) and WPA2 encryption systems used to access a wireless network from a smart phone and tablet PC, and demonstrate the access point (AP) hacking process in a wireless network to which a password is applied on the basis of the analyzed WPA and WPA2 passwords. We will analyze the method of successful AP hacking and propose an approach to enhancing wireless LAN security. This study will contribute to enhancing the security and stability of wireless networks.

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking (비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

A Hierarchical Time Division Multiple Access Medium Access Control Protocol for Clustered Underwater Acoustic Networks

  • Yun, Changho;Cho, A-Ra;Kim, Seung-Geun;Park, Jong-Won;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.153-166
    • /
    • 2013
  • A hierarchical time division multiple access (HTDMA) medium access control (MAC) protocol is proposed for clustered mobile underwater acoustic networks. HTDMA consists of two TDMA scheduling protocols (i.e., TDMA1 and TDMA2) in order to accommodate mobile underwater nodes (UNs). TDMA1 is executed among surface stations (e.g., buoys) using terrestrial wireless communication in order to share mobility information obtained from UNs which move cluster to cluster. TDMA2 is executed among UNs, which send data to their surface station as a cluster head in one cluster. By sharing mobility information, a surface station can instantaneously determine the number of time slots in a TDMA2 frame up to as many as the number of UNs which is currently residing in its cluster. This can enhance delay and channel utilization performance by avoiding the occurrence of idle time slots. We analytically investigate the delay of HTDMA, and compare it with that of wellknown contention-free and contention-based MAC protocols, which are TDMA and Slotted-ALOHA, respectively. It is shown that HTDMA remarkably decreases delay, compared with TDMA and Slotted-ALOHA.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

A Study on Interference Cancelling Receiver with Adaptive Blind CMA Array (적응 블라인드 CMA 어레이를 이용한 간섭 제거 수신기에 관한 연구)

  • 우대호;변윤식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.330-335
    • /
    • 2002
  • In the direct sequence code division multiple access system, the problem of multiple access interference due to multiple access is generated. A interference cancelling receiver is used to solve this problem. The conventional interference cancelling receiver is structure of successive interference canceller using antenna array. In this structure, the difference of between method I and method II depends on updating weight vector. In this paper, the adaptive blind CMA array interference cancelling receiver using cost function of constant modulus algorithms is proposed to update weight vector at conventional structure. The simulation compared the proposed interference cancelling receiver with two conventional interference cancelling receivers by signal to interference ratio and bit error rate curve under additive white Gaussian noise environment. The simulation results show that the proposed receiver has about the gain of SIR of 1.5[dB] more than method I which is conventional receiver at SIR curve, and about the gain of SIR of 0.5(dB) more than method II. In BER curve, the proposed IC receiver about the gain of SNR of 2[dB] more than method I and about the gain of SNR of 0.5[dB] more than method If, Thus, the proposed interference cancelling receiver has the higher performance than conventional interference cancelling receivers.

Key Factors to be Considered for Making Union Digital Centers (UDCs) Sustainable in Bangladesh

  • Kumar, Asim Sarker;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.2
    • /
    • pp.89-105
    • /
    • 2017
  • In this era of information and communication technology (ICT), efficient and cost effective public services delivery had become highly expected by the citizen in every country. In developed countries, digitally enabled public services were established in recent years while the developing countries like Bangladesh were trying to establish this advancement. The UNDP, USAID and the Government of Bangladesh launched the Access to Information (A2I) programme to improve the services delivery to reach at the doorsteps of citizen. Under this umbrella, Union Digital Centers (UDCs) were launched in 2009 at every Union of Bangladesh to reduce the "Digital Divide" in public service delivery. Thus, it had become the concern nowadays to make this initiative sustainable for a long run, this study focused to find out some key factor to be considered for making them sustainable in Bangladesh. It explored the previous researches related to these centers and same categories of institutions in other countries where the researchers argued about some issues in different aspects. Based on their findings and discussions, this study tried to analyze the key issues influencing the sustainability factors. To analyze the factors for sustainability, it addressed the financial, investment, business development and publicity, competencies of entrepreneurs, community acceptance and gender issues, institutionalization and physical infrastructure concerned with UDCs. The Government agencies, policy makers, researchers could be consider those recommendations for developing the strategies for sustaining the operations of UDCs in Bangladesh.

Intelligent Hierarchical Mobility Support Scheme in F-PMIPv6 Networks (F-PMIPv6 네트워크에서 지능적인 계층적 이동성 지원 기법)

  • Han, Sunghee;Jeong, Jongpil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.337-349
    • /
    • 2013
  • In this paper, we propose a new mobility management scheme, called i-FP(intelligent Fast PMIPv6). Our proposed i-FP scheme is addressed for solving the existing local mobility management problems from legacy frameworks. To move MN(Mobile Node) to other networks in one domain, i-FP employs three network entities which are extended from PMIPv6(Proxy Mobile IPv6), LMA(Local Mobility Anchor), MAG(Mobile Access Gateway) and MN. In i-FP, the three network entities can reduce the handover delay time of MNs. Also, i-FP uses an IP header swapping mechanism to avoid the traffic overhead and improve the throughput of network. To evaluate the performance of i-FP, we analyze our i-FP, HMIPv6(Hierarchical Mobile IPv6) and PMIPv6 which are legacy protocols of local mobility management in terms of various parameters. Finally, our i-FP scheme shows good performance(reduction of routing hops 10.2%, signaling costs 58.5% and handover delay 16.3%) than other network schemes for the total cost.

A Stable Random Access Protocol For A Computer Network (안정된 컴퓨터 통신망을 위한 임의 접근 프로토콜)

  • Lee, Sang-Geon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.515-522
    • /
    • 1997
  • A neat prefect stable random access protocol for a broadcast channel,the distributed queuing random access protocol(DQRAP)is presented and evaluated.The DQRAP prootcol utilizes minisolts to provide termaty chan-nel feedback and two distributed queues to:9a) resolve contention and (b) to schedute the transmission of messages.Three minislots are sufficient to resolve collisions faster than the tranmission times of all inboled mecages.Three minislots are suffcient to resolve collisions faster than the tranmission times of all inbolved arrivals when ternary minislot feedback is used.Modelingand simulation indicate that the DQRAP protocol, using as few as three minislits,achives a performance level which approaches that of hypothetical perfect cheduling protocol,ie,the M/D/I system,with respect to propagation delay,thus offers the potential of improved performance over current protocols in satellite,metropolitan and packet radio networks.

  • PDF