• Title/Summary/Keyword: Mobile P2P(Peer-to-Peer)

Search Result 108, Processing Time 0.025 seconds

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.

Design and Implementation of Integrated E-Coaching system Based on Synchronous and Asynchronous (동기/비동기 기반의 통합 E-코칭 시스템 설계 및 구현)

  • Kim, DoYeon;Kim, DoHyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.1-7
    • /
    • 2015
  • Until now, face to face coaching has been applied almost for completing the goal in various field. Face to face coaching is difficult always to reach each other anywhere, anytime due to the availability of internet and mobile devices. Recently, e-coaching is attempted to expend. But current e-coaching is supporting the secondary role for face to face coaching. E-coaching system has many benefits to use advancement technologies in internet. Therefore, the development of e-coaching system based on horizontal relationships between coach and coachee needs to communication anytime and anywhere in Internet. Usually previous online coaching systems have four types of interactions i.e. electronic mail, video chat, text chat, phone call. Most of the e-coaching approaches are easy to access and provide communication synchronous; video chat is an excellent visibility, whereas e-mail is asynchronous and document-centric. In this paper, we design and implement the integration e-coaching system based on synchronous and asynchronous. This system provides the asynchronous coaching offered by way of e-mail, and the synchronous coaching used P2P (Peer to Peer) video chat and text group chat. This system allows simultaneously asynchronous and synchronous coaching, and supports individual and group communication for periodical or informal coaching.

Architecture for Secure Mobile Agent through STAS System (STAS 시스템을 적용한 안전한 이동 에이전트구조)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1873-1879
    • /
    • 2007
  • As the mobile terminal which uses P2P service increases and it comes to be applied to many fields, mobile agent technology has been applied to P2P and its innovative services has been offered to various fields. However, free mobility of mobile agent technology works like worm, the problem which is contaminated by malicious attacker's attack quickly has appeared and fundamental solution has not been developed yet. This paper proposes STAS (Security Tracking and Auditing Server) system which can offer verification for security of mobile agent in structured P2P environments. Mobile Agent will send data value to STAS via peer so that STAS can verify secure audit and integrity and Mobile agent initiator will obtain the final value of the data from STAS. It can minimize overload of mobile terminal which is occurred by verification of mobile agent and its accomplishment.

An Energy-Efficient Mobile P2P Streaming Structure Using Agent Peers (에이전트 피어를 이용한 에너지 효율적인 모바일 P2P 스트리밍 구조)

  • Kim, Sang-Jin;Kim, Eun-Sam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.121-129
    • /
    • 2011
  • With advances in wireless networks and advent of powerful mobile devices such as smart phones, the demand for mobile IPTV services has been increasing. It is essential to minimize the energy consumption of mobile devices because their battery capacity is limited. In this paper, we therefore propose a new streaming structure in P2P-based mobile IPTV systems to minimize the energy consumption of mobile peers using agent peers. Agent peers can decrease the energy consumption of mobile peers significantly by performing streaming functionality and exchanging control messages for joining and leaving overlay networks in place of corresponding mobile peers. Finally, by simulation experiments using an energy model, we show that our proposed streaming structure can increase the lifetime of mobile peers using agent peers.

An Intelligence P2P Mobile Agent System to learn Real-time Users' Tendency in Ubiquitous Environment (유비쿼터스 환경에서 실시간 사용자 성향 학습을 위한 지능형 P2P 모바일 에이전트 시스템)

  • Yun Hyo-Gun;Lee Sang-Yong;Kim Chang-Suk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.7
    • /
    • pp.840-845
    • /
    • 2005
  • Intelligent agents to learn users' tendency have learn uscrs' tendency by sufficient users information and training time. When the intelligent agents is used in ubiquitous environment, users must wait for intelligent agents to learn, so user may be can't get proper services. In this paper we proposed an intelligent P2P mobile agent system that can learn users' tendency in real-time by sharing users' resource. The system shared users contexts on four places and made feel groups which was composed of similar users. When users' service which had the highest correlation coefficient in the peer groups was suggested, users were satisfied over $80\%$.

Building Sensor P2P Network Design using Embedded System (임베디드 시스템을 이용한 빌딩 센서 P2P 네트워크 설계)

  • 이정기;이준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1086-1090
    • /
    • 2004
  • Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or non-functional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel Strong ARM SA-1110 processor, then written several network modules for internet-based network devices.

A Hierarchical Sequential Index Scheme for Range Queries in Wireless Location-based Services (무선 위치기반서비스에서 영역질의처리를 위한 계층적 인덱스기법)

  • Park, Kwang-Jin
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.15-20
    • /
    • 2010
  • In this paper, we propose a novel approach to reduce spatial query access latency and energy consumption by leveraging results from nearby peers in wireless broadcast environments. We propose a three-tier Hierarchical Location-Based Sequential access index, called HLBS, which provides selective tuning (pruning and searching entries) without pointers using a linear accessing structure based on the location of each data object. The HLBS saves search cost and index overhead, since the small index size with a sequential index structure results in low access latency overhead and facilitates efficient searches for sequential-access media (wireless channels with data broadcast). Comprehensive experiments illustrate that the proposed scheme is more efficient than the previous techniques in terms of energy consumption.

Traffic-Oriented Stream Scheduling for 5G-based D2D Streaming Services

  • Lee, Chong-Deuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.95-103
    • /
    • 2022
  • As 5G mobile communication services gradually expand in P2P (peer-to-peer) or D2D (device-to-device) applications, traffic-oriented stream control such as YouTube streaming is emerging as an important technology. In D2D communication, the type of data stream most frequently transmitted by users is a video stream, which has the characteristics of a large-capacity transport stream. In a D2D communication environment, this type of stream not only provides a cause of traffic congestion, but also degrades the quality of service between D2D User Equipments (DUEs). In this paper, we propose a Traffic-Oriented Stream Scheduling (TOSS) scheme to minimize the interruption of dynamic media streams such as video streams and to optimize streaming service quality. The proposed scheme schedules the media stream by analyzing the characteristics of the media stream and the traffic type in the bandwidth of 3.5 GHz and 28 GHz under the 5G gNB environment. We examine the performance of the proposed scheme through simulation, and the simulation results show that the proposed scheme has better performance than other comparative methods.