• Title/Summary/Keyword: Internet Protocol(IP)

Search Result 717, Processing Time 0.028 seconds

A study of Cryptographic Algorithms of IKE version 2 Protocol (IKE 버전 2 프로토콜의 암호 알고리즘에 관한 연구)

  • 김윤희;이유태;이계상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.199-202
    • /
    • 2003
  • IPsec is a standardization way for protection of IP packets in network layer and it is composed of three protocols that is AH(Authentication Header), ESP(Encapsulation Security Protocol) and IKE(Internet Key Exchange). Before doing encryption and decryption using AH or ESP protocols, both of communicating entities have to share same key safely. IKE protocol works automatically. But it has less interoperability because IKE protocol is not simple. A work which standardize IKEv2 has been done up to now. In this article, we will examine the Cryptographic Algorithms of IKEv2, and describe the AES usage with IPsec, based on the IETF Draft document.

  • PDF

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

Mobile IP Multicast Protocol Losing Local Broadcast (로컬 브로드캐스트를 이용한 이동 IP 멀티캐스트 프로토콜)

  • 차용주;김화종
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12C
    • /
    • pp.208-217
    • /
    • 2001
  • In mobile Internet environment, providing multicast requires much more complex mechanism comparing with the unicast Mobile IP routing protocol. This is because multicast datagrams are sent to a group address that do not belong to a specific network. The IETF Mobile IP suggested two approaches for mobile multicasting, namely remote subscription and hi-directional tunneling. In remote subscription, a mobile node may join a group via a local multicast router on the visited subnet. Therefore remote subscription may cause much datagram loss while reconstructing the delivery tee. In bi-directional tunneling, a mobile node may join a group via a hi-directional tunnel to its home agent. Bi-directional tunneling may suffer from inefficient routing. In this paper, we proposed a new mobile multicasting protocol, Mobile If Multicast using Local Broadcast(MIMLB) which can receive multicast datagrams as fast as possible and optimize routing path for multicast delivery. The MIMLB protocol uses hi-directional tunneling to receive multicast datagrams. And the MIMLB protocol can resolve datagram duplicated problem and optimize routing path by using local broadcast. Simulation results show that MIMLB reduces delivery path length and optimizes multicast routing path when a mobile nod? moves into a foreign network.

  • PDF

IoT based Smart Health Service using Motion Recognition for Human UX/UI (모션인식을 활용한 Human UI/UX를 위한 IoT 기반 스마트 헬스 서비스)

  • Park, Sang-Joo;Park, Roy C.
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.1
    • /
    • pp.6-12
    • /
    • 2017
  • In this paper, we proposed IoT based Smart Health Service using Motion Recognition for Human UX/UI. Until now, sensor networks using M2M-based u-healthcare are using non-IP protocol instead of TCP / IP protocol. However, in order to increase the service utilization and facilitate the management of the IoT-based sensor network, many sensors are required to be connected to the Internet. Therefore, IoT-based smart health service is designed considering network mobility because it is necessary to communicate not only the data measured by sensors but also the Internet. In addition, IoT-based smart health service developed smart health service for motion detection as well as bio information unlike existing healthcare platform. WBAN communications used in u-healthcare typically consist of many networked devices and gateways. The method proposed in this paper can easily cope with dynamic changes even in a wireless environment by using a technology supporting mobility between WBAN sensor nodes, and systematic management is performed through detection of a user's motion.

  • PDF

Internet-based Real-Time Remote Monitoring System for High-Speed Machining Process (인터넷 기반 실시간 원격 고속가공 모니터링)

  • 이우영;최성주;김흥배
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.05a
    • /
    • pp.952-955
    • /
    • 2000
  • Nowadays, Internet is so popular that we can easily access the remote site to search information and to communicate remote site and users. People who want to make a collaborate working environment can use JAVA, CORBA, and other internet programming tools like a Perl/XML. The mechanist are try to make the environment fur collaboration within design/manufacturing, simulation, remote sensing through TCP/IP And many industries and research institutions are working towards the agile manufacturing. This paper describes an internet-based real-Time remote monitoring system. The system consists of a hardware setup and a software interface. The hardware setup consists of a machine and its data acquisition hardware, while the software interface incorporates the data acquisition software, the server program, and the client program. The server program acts as the main interface between the data acquisition system and the internet technology. The client program is to be distributed to the remote users who want to monitor the machining status. The system has been demonstrated and verified for an industrial High-Speed Machine (HSM) especially measuring cutting force and acoustic emission. To share the signal, we make the WWW server and display its value. The system has been found to be highly efficient, reliable and accurate.

  • PDF

Global Healthcare Information System

  • Singh, Dhananjay;Lee, Hoon-Jae;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.365-368
    • /
    • 2008
  • This paper presents a new concept of IP-based wireless sensor networks and also introduces a routing protocol that is based on clustering for global healthcare information system. Low-power wireless personal area networks (LoWPANs) conform the standard by IEEE 802.15.4-2003 to IPv6 that makes 6lowpan. It characterized by low bit rate, low power, and low cost as well as protocol for wireless connections. The 6lowpan node with biomedical sensor devices fixed on the patient body area network that should be connected to the gateway in personal area network. Each 6lowpan nodes have IP-addresses that would be directly connected to the internet. With the help of IP-address service provider can recognize or analysis patient biomedical data from anywhere on globe by internet service provider equipments such as cell phone, PDA, note book. The system has been evaluated by technical verification, clinical test, user survey and current status of patient. We used NS-2.33 simulator for our prototype and also simulate the routing protocols. The result shows the performance of biomedical data packets in multi-hope routing as well as represents the topology of the networks.

  • PDF

Improved Accountable Internet Protocol Using Signature (시그니처를 이용한 향상된 Accountable 인터넷 프로토콜)

  • Park, Gi-Tae;Lee, Jae-Hwoon;Jung, Hee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.200-206
    • /
    • 2014
  • Accountable Internet Protocol (AIP) is one of the future Internet architectures to provide accountability concept by using the self-certifying address that is derived by the public key of the host. In AIP, when a host sends a packet, a domain that is located between the source and the destination hosts discards the packet in order to verify the source IP address. Therefore, performance degradation can occur due to packet discard especially when there is asymmetric route. In this paper, we propose the improved AIP mechanism to verify the source IP address without discarding the packet by including the timestamp, public key value and the signature for protecting from forfeiting the source address. Security safety of the proposed mechanism is evaluated and the proposed mechanism can provide the more robust security as well as reducing the latency due to discarding packets.

A Study on Detection Method Internet Protocol Address Collision in a Ethernet (이더넷 상에서 인터넷 프로토콜 주소 충돌 검출방법에 관한 연구)

  • 유상민;박기홍
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.611-613
    • /
    • 2000
  • 이 논문은 TCP/IP 기반 지역 망 내에서 개인용 컴퓨터의 사용에 있어 인터넷 프로토콜의 주소 충돌 해결 방법에 대하여 연구하였다. 현재 컴퓨터의 수는 계속해서 늘고 있지만 사용자는 IP 주소에 대한 지식이 없음으로 인해 고의나 실수로 자신의 것이 아닌 다른 사람의 IP 주소를 사용할 수 있고, 이로 인해 원래 사용자가 네트웍을 사용할 수 없게 된다. 본 논문은 사전에 지역 망 내의 관리 대상 컴퓨터들의 주소정보를 DNS 서버상에서 수집하여 현재 사용하는 주소 정보가 저장된 정보가 같은 지를 검사하는 방법으로 IP 조소 충돌 검출 방법을 제시하였다.

  • PDF

IPSec VPNs vs. SSL VPNs

  • 윤재호;권태경;천동현;임선간
    • Review of KIISC
    • /
    • v.13 no.5
    • /
    • pp.24-30
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있다. 그러나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹보안프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 IPSec VPN과 SSL VPN의 차이점의 분석하여 정리하고자 한다.

Analysing the SSL VPN model compared with IPSec VPN (SSL을 이용한 VPN Model분석)

  • 윤재호;권태경
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.760-762
    • /
    • 2003
  • 인터넷을 비롯한 대부분의 패킷스위칭 네트워크는 IP(Internet Protocol)을 기반으로 하고 있으나, IP는 기본적으로 보안에 취약하게 설계되어 보안이 필요한 통신에 사용하는데는 어려움이 있다. IPSec(IP Security)은 IP 트래픽에 대한 이러한 보안문제를 극복하기 위해 생겨났으며, 방화벽과 결합된 형태로 가장 널리 쓰이고 있는 VPN(Virtual Private Network) 제품의 하나이다. 그러나 IPSec 자체의 문제점이 대두되고, Web-based Service가 영역을 넓혀가면서 기존의 웹 보안 프로토콜인 SSL이 VPN의 새로운 형식으로 나타나고 있다. 본 고에서는 이러한 SSL VPN의 모델을 IPSec VPN과 비교하여 분석하고자 한다.

  • PDF