• Title/Summary/Keyword: Dynamic access control

Search Result 276, Processing Time 0.025 seconds

Dynamic Bandwidth Allocation Algorithm for Multimedia Services over Ethernet PONs

  • Choi, Su-Il;Huh, Jae-Doo
    • ETRI Journal
    • /
    • v.24 no.6
    • /
    • pp.465-468
    • /
    • 2002
  • Ethernet passive optical networks (PONs) are an emerging access network technology that provides a low-cost method of deploying optical access lines between a carrier's central office and a customer site. In this paper, we propose a new algorithm of dynamic bandwidth allocation for multimedia services over Ethernet PONs. To implement the suggested dynamic bandwidth allocation algorithm, we present control message formats that handle classified bandwidths in a multi-point control protocol of Ethernet PONs.

  • PDF

A Dynamic Backoff Adjustment Method of IEEE 802.15.4 Networks for Real-Time Sporadic Data Transmission (비주기적 실시간 데이터 전송을 위한 IEEE 802.15.4 망의 동적 백오프 조정 기법에 대한 연구)

  • Lee, Jung-Il;Kim, Dong-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.3
    • /
    • pp.318-325
    • /
    • 2008
  • In this paper, a dynamic backoff adjustment method of IEEE 802.15.4 is proposed for time-critical sporadic data in a noisy factory environment. For this, a superframe of IEEE 802.15.4 is applied to a real-time mixed data (periodic data, sporadic data, and non real-time message) transmission in factory communication systems. To guarantee a channel access of real-time sporadic(non-periodic) data, a transmission method using the dynamic backoff is applied to wireless control networks. For the real-time property, different initial BE, CW parameters are used for the dynamic backoff adjustment method. The simulat-ion results show an enhancement of the real-time performance of sporadic emergency data. The proposed method provides the channel access of real-time sporadic data efficiently, and guarantee real-time transmission simultaneously within a limite-d timeframe.

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

New MAC Protocol and Dynamic Bandwidth Allocation Method for TWDM PON (TWDM PON을 위한 새로운 MAC 프로토콜 및 동적대역할당 방법)

  • Han, Man-Soo;Na, Cheol-Hun;Kang, Seong-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1419-1424
    • /
    • 2013
  • Passive optical networks (PONs) are the emerging solution for access networks since PONs provide high bandwidth and the low operation cost. In recent, the new solution in access networks is TWDM PON which is a mixture of WDM (wavelength-division multiplexing) and TDM (time-division multiplexing). This paper proposes a new MAC (media access control) protocol for TWDM PON. In addition, this paper proposes and evaluates a new dynamic bandwidth allocation method for TWDM PON.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

Dynamic Property Evaluation of Control Equipment using Lead Rubber Bearing (납-고무베어링을 적용한 제어장비의 동적 특성평가)

  • 이경진;김갑순;서용표
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 2002.09a
    • /
    • pp.341-348
    • /
    • 2002
  • In these days, The base isolation system is often used to improve the seismic capacity of the structures instead of conventional techniques of strengthening the structural members. The purpose of this study is to evaluate dynamic property evaluation of control equipment using lead Lead Rubber Bearing. In this study, a base isolation test of seismic monitoring control cabinet with LRB(lead rubber bearing) was performed. The cabinet will be installed on access floor in MCR(main control room) of nuclear power plant. Details and dynamic characteristics of the access floor were considered in the construction of testing specimen. N-S component of El Centre earthquake was used as seismic input motion. Acceleration response spectrums in the top of cabinets showed that the first mode frequency of cabinet with LRB(lead rubber bearing) was shifted to 7.5 Hz in compared with 18Hz of cabinet without LRB and the maximum peak acceleration was reduced in a degree of22 percent from 2.35 g to 1.84 g

  • PDF

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

A Dynamic Security Service using Access Control Model in Distributed Framework Support for u-Healthcare (u-헬스케어 지원 분산 프레임워크에서 접근 제어 모델을 이용한 동적 보안 서비스)

  • Jeong, Chang-Won;Kim, Dong-Ho;Kim, Myung-Hee;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.29-42
    • /
    • 2007
  • This paper describes a security object designed to support a dynamic security service for application services in u-healthcare computing environments in which domains are used to object groups for specifying security policies, In particular, we focus on security object for distributed framework support for u-healthcare including policy, role for security and operations use to access control. And then, by using the DPD-Tool. we showed the access right grant procedure of objects which are server programs, the developing process of client program. Also, we verified the executablility of security service supporting by distributed framework support for u-healthcare use to the mobile monitoring application developing procedure implemented through DPD-Tools.

  • PDF

Study on the dynamic bandwidth allocation over Ethernet Passive Optical Network (이더넷 수동형 광가입자망에서의 동적 대역폭 할당에 관한 연구)

  • Joo, Jung-Min;Byun, Hee-Jung;Nam, Gi-Wook;Lim, Jong-Tae
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.663-665
    • /
    • 2004
  • Ethernet-based passive optical network(EPON) technology is being considered as a promising solution for next-generation broadband access network. It must have the property of high efficiency, low cost, and support quality of service(QoS). A major feature for this new architecture is the use of a shared transmission media between all connected optical network unit(ONU). Hence, medium access control(MAC) arbitration mechanisms are essential for the successful implementation of EPON. In this paper we propose a simple dynamic bandwidth allocation(DBA) algorithm that improves the performance of network and supports IP-based multimedia applications with the bursty data traffic. In addition, we introduce analytic models of proposed algorithms and prove the system based on our algorithm to be asymptotically stable. Simulation results show the new DBA algorithm provides high bandwidth efficiency and low queueing delay of ONU in EPON.

  • PDF