• Title/Summary/Keyword: Internet server

Search Result 1,960, Processing Time 0.022 seconds

A Provable One-way Authentication Key Agreement Scheme with User Anonymity for Multi-server Environment

  • Zhu, Hongfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.811-829
    • /
    • 2015
  • One-way authenticated key agreement protocols, aiming at solving the problems to establish secure communications over public insecure networks, can achieve one-way authentication of communicating entities for giving a specific user strong anonymity and confidentiality of transmitted data. Public Key Infrastructure can design one-way authenticated key agreement protocols, but it will consume a large amount of computation. Because one-way authenticated key agreement protocols mainly concern on authentication and key agreement, we adopt multi-server architecture to realize these goals. About multi-server architecture, which allow the user to register at the registration center (RC) once and can access all the permitted services provided by the eligible servers. The combination of above-mentioned ideas can lead to a high-practical scheme in the universal client/server architecture. Based on these motivations, the paper firstly proposed a new one-way authenticated key agreement scheme based on multi-server architecture. Compared with the related literatures recently, our proposed scheme can not only own high efficiency and unique functionality, but is also robust to various attacks and achieves perfect forward secrecy. Finally, we give the security proof and the efficiency analysis of our proposed scheme.

A New Roaming Authentication Framework For Wireless Communication

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin;Zhao, Qianqian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2061-2080
    • /
    • 2013
  • Roaming authentication protocol is widely used in wireless network which can enable a seamless service for the mobile users. However, the classical approach requires the home server's participation during the authentication between the mobile user and the foreign server. So the more the roaming requests are performed the heavier burden will be on the home server. In this paper, we propose a new roaming authentication framework for wireless communication without the home server's participation. The new roaming authentication protocol in the new framework takes advantage of the ID-based cryptography and provides user anonymity. It has good performance compared with the roaming authentication protocols whose authentication do not need the home server's participation in terms of security and computation costs. Moreover, a new User-to-User authentication protocol in the new framework is also present. All the authentications proposed in this paper can be regarded as a common construction and can be applied to various kinds of wireless networks such as Cellular Networks, Wireless Mesh Networks and Vehicle Networks.

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.

A Study on Implementation of On-Line Gaming Server applying an Object Polling Scheme (객체폴링기법을 적용한 온라인 게임서버의 구현에 관한 연구)

  • Kim, Hye-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.19-24
    • /
    • 2009
  • When a dynamic method is applied at the time of occurrence of an client's connection request for most of the online gaming server engine, the gaming server is processing a session connection, it's initialization. Yet, such a method will cause a lot of loading and bottle-neck in the gaming server at the same time. Therefore we propose the object polling scheme to minimizes a memory fragmentation and loading of the initialization on the client using a static allocation method for an efficient On-lin gaming serverin this paper. We implement the gaming server applying to our proposed scheme, and we show an improvement in our proposed scheme by performance analysis in this paper.

  • PDF

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

Cost-Aware Scheduling of Computation-Intensive Tasks on Multi-Core Server

  • Ding, Youwei;Liu, Liang;Hu, Kongfa;Dai, Caiyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5465-5480
    • /
    • 2018
  • Energy-efficient task scheduling on multi-core server is a fundamental issue in green cloud computing. Multi-core processors are widely used in mobile devices, personal computers, and servers. Existing energy efficient task scheduling methods chiefly focus on reducing the energy consumption of the processor itself, and assume that the cores of the processor are controlled independently. However, the cores of some processors in the market are divided into several voltage islands, in each of which the cores must operate on the same status, and the cost of the server includes not only energy cost of the processor but also the energy of other components of the server and the cost of user waiting time. In this paper, we propose a cost-aware scheduling algorithm ICAS for computation intensive tasks on multi-core server. Tasks are first allocated to cores, and optimal frequency of each core is computed, and the frequency of each voltage island is finally determined. The experiments' results show the cost of ICAS is much lower than the existing method.

IoT notification system for marine emergencies

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2022
  • Minimization of human casualties in disaster situations is of paramount importance. In particular, if a marine disaster occurs, it can be directly connected to human casualties, so prompt action is needed. In the event of a marine disaster, the route and location of movement should be identified and life tubes should be used to float on the water. This paper designs and proposes an emergency IoT notification system that can quickly rescue drowning people. The maritime emergency IoT notification system consists of four main types. First, an emergency IoT device that detects the expansion of the life tube and delivers location and situation information to the emergency IoT notification server. Second, an emergency IoT web server that manages emergency information and provides notification. Third, a database server that stores and manages emergency IoT notification information. And finally, an emergency notification app that can receive and respond to emergency notification information. The emergency IoT device consists of a TPMS(Tube Pressure Monitoring System) device that checks the pressure value of the TPMS in real time and sends it to the IoT device, and an IoT device that sends the rescuer's voice information and emergency information to the emergency IoT server. Emergency information is delivered using the MQTT(Message Queuing Telemetry Transport) protocol, and voice information is delivered to the IoT server as HTTP FormData.

Oracle9i Application Server Future-proof Your Architecture

  • 김상엽
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2002.11a
    • /
    • pp.24-46
    • /
    • 2002
  • Oracle은 단일의 완벽한 Internet Platform을 제공, Oracle9iAS는 Oracle9i와 함께 인터넷 애플리케이션 작성과 운영에 필요한 모든 것을 제공

  • PDF

Real-time Estimation and Analysis of Time-based Accessibility and Usability for Ubiquitous Mobile-Web Services

  • Kim, Yung-Bok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.938-958
    • /
    • 2011
  • Ubiquitous web services have been expanding in various business areas with the evolution of wireless Internet technologies, accessible and usable with a variety of mobile Internet devices such as smart phones. Ubiquitous mobile-web information services can be evaluated for accessibility and usability with the mobile Internet devices interacting with mobile-web information servers. In human mobile-web activity, a web server could be a unified center for mobile-web interaction services as well as for real-time estimation and analysis of mobile-web interaction sessions. We present a real-time estimation and analysis scheme for time-based accessibility and usability in ubiquitous mobile-web services. With real-time estimation/analysis of sessions in a mobile-web server, we estimated the time-based accessibility and usability for comparison between different web services as well as for applications in mobile cloud computing services. We present empirical results based on the implementation of the real-time estimation/analysis scheme.

Design and Implementation of National Language Ability Test System using Korean Style Internet-Based Test added Middle-Server (미들서버방식 한국형 IBT를 이용한 국가언어능력평가 시스템의 설계 및 구현)

  • Chang, Young-Hyun;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.185-192
    • /
    • 2011
  • The purpose of this paper is to propose the design and implementation of a korean style internet-based test system on the basis of efficiency and stability for middle server. The current assessment system has some unstable elements with regard to transmission procedure, cost, system load and stability. This paper proposes a series of activities for the performance improvement of korean style internet-based test system which finally produced various excellent results in the administration of expense control, human resources, and special operational affairs. The proposed system's technological factors using middle server have been tested through a basic simulation pilot system. Actual development procedure starts from the analysis required by improving the shortcomings of existing internet-based test systems. A efficiency comparison with existing system and newly developed system was made in the area of number of operators, abnormal processing, system maintenances. Korean style internet-based test system using middle server has shown great efficiency increased to the maximum of 2 times about the effectiveness of processing for various parts. The korean style internet-based test system using middle server have been given good evaluations with regard to the convenience of their use and the management system for operators and supervisors.