• Title/Summary/Keyword: Information sender

Search Result 351, Processing Time 0.029 seconds

VoIP-Based Voice Secure Telecommunication Using Speaker Authentication in Telematics Environments (텔레매틱스 환경에서 화자인증을 이용한 VoIP기반 음성 보안통신)

  • Kim, Hyoung-Gook;Shin, Dong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.1
    • /
    • pp.84-90
    • /
    • 2011
  • In this paper, a VoIP-based voice secure telecommunication technology using the text-independent speaker authentication in the telematics environments is proposed. For the secure telecommunication, the sender's voice packets are encrypted by the public-key generated from the speaker's voice information and submitted to the receiver. It is constructed to resist against the man-in-the middle attack. At the receiver side, voice features extracted from the received voice packets are compared with the reference voice-key received from the sender side for the speaker authentication. To improve the accuracy of text-independent speaker authentication, Gaussian Mixture Model(GMM)-supervectors are applied to Support Vector Machine (SVM) kernel using Bayesian information criterion (BIC) and Mahalanobis distance (MD).

A Representative-based Multicast Congestion Control for Real-time Multimedia Applications (실시간 멀티미디어 응용을 위한 대표자 기반의 멀티캐스트 혼잡 제어)

  • Song, Myung-Joon;Cha, Ho-Jung;Lee, Dong-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.58-67
    • /
    • 2000
  • The paper presents a representative-based feedback mechanism and rate adaptation policy for congestion control in multicast traffic for multimedia applications. In multicast congestion control, feedback implosion occurs as many receivers send feedback to a sender. We propose to use representatives to avoid the feedback implosion. In our scheme, receivers feedback packet loss information periodically and a sender adapts the sending rate based on the information collected through a hierarchy of representatives. A representative is selected in each region and roles as a filter to decrease the number of feedbacks. The simulation results show that the proposed scheme solves the feedback implosion problem and well adapts in a congested situation.

  • PDF

Many-to-One Encryption and Authentication Scheme and Its Application

  • Lin, Xi-Jun;Wu, Chuan-Kun;Liu, Feng
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.18-27
    • /
    • 2008
  • This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods, the burdens of the receiver and the KGC are reduced greatly. How to revoke a sender from his receiver's legitimate sender group is also proposed and it is efficient compared with some traditional methods. The proposed scheme is proven in the random oracle models. The computational complexity of our scheme is independent of the number of the senders. At the end of the paper, an example is given to show how to use our scheme in online software registration and update.

A Design for Data Transmission Algorithm of Multimedia Data with Best Effort Environment (Best Effort 환경에 적절한 멀티미디어 데이터 전송 알고리즘 설계)

  • 허덕행
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.155-162
    • /
    • 1999
  • Various applications of video conferencing are required real-time transmission in order to offer service of best effort in internet. Because the bandwidth of internet changes dynamically, appropriated QoS could not be guaranteed To resolve the problem. available bandwidth between sender and receiver is measured. And according to measured bandwidth, the transmission of multimedia data is controlled In this paper, we propose algorithm of efficient transmission for best QoS in internet According to a present status of network, we measure available bandwidth using feedback RTCP information and change a compression rate to reduce a producing CODEC data. And according to the priority that is measured by packet loss for received RTCP information, we abandon frames indicated as lower weight in transmission buffer of sender.

  • PDF

Prevention of Buffer Overflow in the Mobility Support Router for I-TCP (I-TCP를 위한 이동성 지원 라우터에서의 버퍼 오버플로우 방지)

  • 김창호;최학준;장주욱
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.20-26
    • /
    • 2004
  • A congestion control algorithm to prevent buffer overflow in MSR(Mobility Support Router) for I-TCP is proposed. Due to high bit error rate and frequent hand-offs over wireless environment, the current congestion control scheme in TCP Reno over mixed(wired and wireless) network exhibits lower throughput than the throughput achieved over wired only network. I-TCP has been proposed to address this by splitting a TCP connection into two TCP connections over wired section and wireless section, respectively. However, buffer overflow in MSR may occur whenever there are excessive bit errors or frequent hand-offs. This may lead to the loss of packets acked by MSR(resident in buffer) to the sender, but not received by the receiver, breaking TCP end-to-end semantics. In this Paper, a new scheme is proposed to prevent the MSR buffer from overflow by introducing “flow control” between the sender and the MSR. Advertised window for the TCP connection between the sender and the MSR is tied to the remaining MSR buffer space, controlling the flow of packets to the MSR buffer before overflow occurs.

Transmission status monitoring method for improving the performance of MPTCP in Bufferbloat environment (Bufferbloat 환경에서 MPTCP 성능 개선을 위한 전송 상태 모니터링 방법)

  • Jung, Il Hyung;Lee, Jae Yong;Kim, Byung Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.259-269
    • /
    • 2018
  • Multipath TCP (MPTCP) can be expected to provide improved network performance because it transmits data through multiple paths. However, Bufferbloat, which unexpectedly occurs in the transmission path, degrades not only the performance of the corresponding path but also the performance of other paths, so that the performance is worse than that of a single TCP. In this paper, we propose the transmission status monitoring method at the sender's MPTCP level and also HoL packets retransmission algorithm in order to solve the Bufferbloat problem. The proposed algorithm enables Bufferbloat detection by the sender side independently, and it can resolve the HoL blocking problem by identifying the HoL packet in the proposed transmission status monitoring buffer and retransmitting it to the normal path. Simulation results based on NS-3 show that the proposed algorithm achieves the improved throughput performance up to 22.8% compared to the existing MPTCP, and the average number of queued packets in the sender and receiver's buffers is decreased to 44.3% and 9.2%, respectively.

A Sender-oriented Automatic Rate Adaptation Scheme in IEEE 802.11 WLANs (IEEE 802.11 WLAN에서 송신단 기반 전송률 적응기법)

  • Lee, Sun-Hun;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.143-152
    • /
    • 2009
  • IEEE 802.11 WLANs provide multiple transmission rates to improve the system throughput by adapting the transmission rate to the current wireless channel conditions. Many rate adaptation schemes have been proposed because IEEE 802.11 standard does not contain any specifications for the rate adaptation scheme. In this paper, in order to overcome limitations of the previous research, we propose a new rate adaptation scheme called SARA(Sender-oriented Automatic Rate Adaptation). The SARA scheme, a proposed rate adaptation scheme, appropriately adjusts the data transmission rate based on the estimated wireless channel conditions, specifically the measured RSSI at the sender-side. Moreover it continuously updates the thresholds for selecting the transmission rate and selectively enforces the RTS/CTS exchanges to adapt the changes in the wireless channel conditions. Through the performance evaluations, we prove that the SARA scheme overcomes the limitations of the previous research and improves the wireless link utilization.

TCP Throughput Analysis in the Portable Internet Wireless Environment with Consideration of Mobility (휴대 인터넷 무선 환경에서 이동성을 고려한 TCP 처리율 분석)

  • 원기섭;조용범;노재성;조성준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.399-403
    • /
    • 2004
  • In this paper, we have analyzed the TCP throughput of Portable Internet system in 2.3GHz wireless environment with considering user's mobility speed. As the Portable Internet uses large cells compared to wireless LAM and supports user's nobility, we have adapted different wireless channel model to derive the TCP throughput of the system. We have assumed wireless channel is Rayleigh fading channel and the channel is modeled as two-state Markov model with which user's nobility speed can be considered by varying transition matrix of the model. from the simulation results, we have known that higher TCP throughput under the slow fading than under the fast fading. Because the TCP throughput is closely related to the sender's congestion control, the more congestion control is done by the sender, the lower TCP throughput we have. The more congestion control is caused in the sender under the fast fading than the slow fading so the lower TCP throughput is resulted in the fast fading environment.

  • PDF

Portable system module for wireless based on mountain climbing safety using 447 MHz band FSK (447MHz 대역 FSK방식을 이용한 무선 통신 기반 산행 안전을 위한 휴대 시스템)

  • Lim, Jae Don;Kim, Jung Jip;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1428-1433
    • /
    • 2019
  • Interest in mountain accidents among the technical trends of disasters in Korea is increasing continuously. When accidents occur, the most common methods are location tracking and accident reporting using smartphones, and rescue activities are being carried out by using them. In this paper, we proposed an improvement of wireless safety system for mountain climbing safety using 447 FSK. Using the 447 MHz band transmitter / receiver, it accumulates position coordinates and data through position transmission and rescue signal transmission in case of anomalies. If a sender is out of the threshold of the set area range, a danger warning notification can be generated to quickly exit the danger zone. Provide services. In addition, it is considered that the health condition of the sender is continuously checked and the receiver is warned when the specified threshold is exceeded, so that it is possible to respond to the sender's disaster.

Hybrid Cryptosystem providing Implicit Authentication for sender (송신자에 대한 묵시적 인증을 제공하는 하이브리드 암호 시스템)

  • Oh, Soo-Hyun;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.71-80
    • /
    • 2002
  • To provide the confidentiality of messages transmitted over the network, the use of cryptographic system is increasing gradually and the hybrid cryptosystem, which combines the advantages of the symmetric cryptosystem and the public key cryptosystem is widely used. In this paper, we proposes a new hybrid cryptosystem capable of providing implicit authentication for the sender of the ciphertext by means of the 1-pass key distribution protocol that offers implicit key authentication, hash function and symmetric cryptosystem. Also, we describe some examples such as the Diffie-Hellman based system and the Nyberg-Ruppel based system. The proposed hybrid cryptosystem is an efficient more than general public key cryptosystems in the aspect of computation work and provides implicit authentication for the sender without additional increase of the communication overhead.