• Title/Summary/Keyword: IP 이동성

Search Result 643, Processing Time 0.028 seconds

Efficient Implementation of Crypto Processing Based on Pre_Buffered Key Stream Method (Pre_Buffered 키스트림을 이용한 효율적인 암호처리 구현)

  • Kang, Cheol-Oh;Kim, Eun-Chan;Park, Jea-Min;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.989-1000
    • /
    • 2013
  • Mobile devices use VPN solution to transfer information securely through open network in mobile office environment. In this paper, we propose Pre_Buffered mechanism that improves the throughput of IPSec VPN using low performance H/W crypto Token. Pre_Buffered method precompute key stream, store them in Buffer and use them in IPSec engine for IP packet processing. Moreover, Design, analysis, and experimental results prove the efficiency and feasibility of our proposed method.

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

A Study on Automatic Crack Detection Process for Wall-Climbing Robot based on Vacuum Absorption Method (진공흡착방식 기반의 벽면 이동로봇을 위한 자동 균열검출 프로세스에 관한 연구)

  • Park, Jae-Min;Shin, Dong-Ho;Kim, Hyun-Seop;Kim, Hyung-Hoon;Kim, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.1034-1037
    • /
    • 2019
  • 본 논문은 진공을 이용한 흡착방식과 바퀴형 이동방식을 사용하는 벽면 이동로봇의 구성과 로봇 내부에서의 균열검출 및 처리 프로세스에 관한 연구이다. 임베디드 시스템에서 기계학습을 이용한 균열검출을 구현하기 위해 YOLO v3를 수정하여 구동하였으며, 검출된 균열의 영상을 저장하고 위치 정보를 추정하였다. 또한, 균열 정보를 수집하기 위해 고정 IP를 갖는 서버를 구축하고 각 기기 간의 효율적인 통신 네트워크를 구성하였다. 본 기술은 균열검출 작업뿐만 아니라 보수작업에도 활용될 수 있어, 대형 구조물과 건축물 등의 안전진단뿐만 아니라 안전성 향상에 이바지할 수 있을 것으로 예상한다.

Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application (IPv6 기반의 모바일용 가상 저장장치 드라이버 구현 및 응용)

  • Lim, Hyo-Taek;Choi, Sae-Bom;Singh, Vinay;Cha, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.74-82
    • /
    • 2007
  • IPv6 is the internet protocol for next generation which can solve the problem of IPv4 protocol. Mobile IPv6 efficiently provides the mobility for mobile devices holding the properties of IPv6. iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard Ethernet switch and router for this kind of access, it can not only be applized to Ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the IPv6 iSCSI initiator driver which was originally designed for wired networks. Also, this paper describes about the implementation and performance analysis of mobile education service system using virtual storage devices in IPv6 wireless networks.

  • PDF

Effective Backup and Real-Time Replication Techniques for HSS System in All-IP Mobile Networks (All-IP 이동 통신망에서 HSS 시스템의 효과적인 백업과 실시간 이중화 기법)

  • Park, Seong-Jin;Park, Hyung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.795-804
    • /
    • 2009
  • An HSS(Home Subscriber Server) system requires a main-memory database on main-memory unit for the real-tine management of the subscriber information in the mobile communication service, in that the system controls not only basic data for handling calls of users, but also additional service data related to user authentication and operational data. Nonetheless, HSS-DBS system, requiring the reliability and stability, need more secure data store method and a back-up technique because the system have a long startup time and the big problem on the failures of main-memory. This paper proposes an efficient back-up replication technique, on the basis of enhancing the stability and performance of HSS system. The proposed shadowing back-up technique adopting the delayed recovery process, can help minimize the real-time back-up overloads by location registration, while the proposed backup replication method enables more stable system operations with replicating the data to remote server in real time.

A Inter-layer Path Provisioning System Architecture in Multi-layer Networks (다계층 광네트워크에서 계층간 경로설정 시스템 구조 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.25-31
    • /
    • 2013
  • Looking at the recent value change of users and the usage pattern of network users, it is changing from simple web information, one-way information acquisition and data transmission to increase of usage of multimedia, increasing demand for security and customization, and increasing demands for free mobility. Due to this change of demand, the services which were provided individually, developed into a form which is merged, the network also seems to develop into the combined network from the individual network for individual service, and the communication network control technology which is the core technology is also rapidly developing. To reflect the users' demands, the next generation network created the multi-layer network which is based on the WDM/IP transmission system and added the to make it easy to restructure. P-OTS (Packet-Optical Transport System) can be defined as a platform that combines SONET/SDH, Ethernet, DWDM, optical transport network (OTN) switching and reconfigurable optical add-drop multiplexers (ROADMs). In this paper, we suggested that the optimum path choice be performed through diversification of the PCE-based path selection using the information of various layers altogether in the multi-layer environment, compared with the established path selection method when the path was selected using the information of each layers.

A Converged Profile and Authentication Control Scheme for Supporting Converged Media Service (융합 미디어 서비스 제공을 위한 통합 프로파일 및 인증제어 기술 연구)

  • Lee, Hyun-Woo;Kim, Kwi-Hoon;Ryu, Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.503-516
    • /
    • 2010
  • In this paper, we propose the converged profile and authentication scheme for supporting converged media services of broadcasting & communications convergence in fixed mobile convergence networks. The proposed scheme supports the management of access, service, mobility and IPTV profiles on subscriber and a function of open API(Application Program Interface) for providing the subscriber profile for the third party service provider with the PUSH/PULL method. The open API is based on a web service and a REST(Representational State Transfer) and provides various services for the third party service provider with ease. In addition, the proposed scheme supports a function of SSO(Single Sign-on). After user succeeded in establishing an access connection, user can sustain the same authentication state with this function although connected access network is changed or IMS(IP Multimedia Subsystem) service network is attached. We evaluate and analyze the performance of the proposed scheme through the implementation of CUPS(Converged User Profile Server) system test-bed.

IPv6 Handover Performance for Mobile IPTV over Mobile WiMAX Networks (모바일 WIMAX 네트워크 기반의 모바일 IPTV를 위한 IPv6 핸드오버 성능)

  • Trung, Bui Minh;Chowdhury, Mostafa Zaman;Nguyen, Tuan;Jang, Yeong-Min;Kim, Young-Il;Ryu, Won
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.51-59
    • /
    • 2011
  • To support seamless IPTV services in IP-based wireless network, delay or interruption time must be minimized because noticeable interruption will make IPTV service users unhappy. A number of protocols have been proposed for solving mobility problem. However effective seamless handover mechanism to support mobile IPTV services yet to be solved. Mobile WiMAX offers a wireless solution in the access networks that can support IPTV services. Goal of this paper is to identify some reasons of delay time during handover process in an IPv6 capable Mobile WiMAX and to perform handover delay of some optimization scenarios given by existing standardization and proposed improvement.

Performance Analysis of Seamless Interworking Handover for Supporting MMS Continuity over WLAN and CDMA2000 Networks (WLAN과 CDMA2000 이종 네트워크에서 MMS 서비스의 연속성을 제공하기 위한 새로운 핸드오버의 성능 분석)

  • Kim, Su-Yong;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.2
    • /
    • pp.128-137
    • /
    • 2006
  • Recently, the combination of WLAN and 3G wireless technologies will make MMS service more ubiquitous, bringing benefits to both service providers and their customers. To realize seamless MMS service over WLAN and CDMA2000 networks, we design novel seamless interworking architecture by reusing the existing standards and network elements at the same time. Based on the proposed seamless interworking architecture, we also present seamless notification architecture and seamless handover architecture that can't be possible within current MMS reference architecture. This paper will make a contribution for service providers to provide their customers with seamless MMS service over WLAN and CDMA2000 networks.

  • PDF

The Design for Traffic Container to use resources efficiently in DiffServ (DiffServ의 효율적인 자원활용을 위한 트래픽 컨테이너 설계)

  • Jang, Kyung-Sung;Kang, Dae-Wook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.115-122
    • /
    • 2004
  • Diff-Serv is a mechanism by which network service providers can offer differing levels of network service to different traffic, in so providing quality of service (QoS) to their customers. Because this mechanism has been deployed just for fixed hosts with the Token Bucket mechanism, DiffServ have been suggested can not satisfy the mobility service or the differential serrlce for Individual traffics. In this paper, we suggest WFQ mechanism for traffic conditioner and scheduling method for monitoring the AggF(Aggregate Flow) which will be controlled in edge nodes and border routers. So it will control traffic rate dynamically and suggest efficient usability of bandwidth.