• Title/Summary/Keyword: New Address Information

Search Result 682, Processing Time 0.026 seconds

A Study on Preventing SA Re-negotiation for Mobility Support in Mobile IP VPN Environment (모바일 IP VPN 환경에서의 이동성 지원에 따른 SA 재협상 방지에 관한 연구)

  • 차정석;김태윤;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.891-898
    • /
    • 2003
  • In the remote access VPN architecture which is based on IPsec, if the VPN client wants to be served the VPN service continuously during VPN client's handoff, It needs the techniques to merge VPN with Mobile IP. In this case, if the VPN client roams to new subnet, it acquires new CoA. As a result of changing IP address, existing SA becomes useless and new SA is required. The SA renegotiation process results from handoff of the VPN client and does not result from security aspect. Hence, In the environment which includes many handoffs, overhead by SA re-negotiation deteriorates performance. In this paper, we propose the technique provides that it doesn't need to renegotiate SA and be able to get the security service continuously even though MN's handoff occurs in Mobile IP VPN environment.

A Study on Passenger Information Integrated System Based IP (IP 기반의 승객안내 통합시스템에 대한 고찰)

  • Kwon, Myoung-Jin;Jeon, Yoon-Su;Lee, Chan-Yong;Park, Sung-Ho
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1716-1721
    • /
    • 2011
  • The Public Address and Passenger Information System of Rolling Stock should be able to perform automatic announcements in connection with TCMS(Train Control and Monitoring System), common announcements and emergency announcements for safe operation and the passengers. CCTV(Closed Circuit Television) System also should be able to watch passenger compartment for safety. Those equipments are very important thing for train service and safety. but the installation of equipment is restricted by space, weight, modulation. therefore, Passenger Information Intergrated System(PIIS) is required to consider economical efficiency, technical trend, expansion and space insufficiency. and system based on IP network has to be considered as new PIIS. so PIIS could meet economical efficiency and expansion. and it could go further and share network with TCMS and others.

  • PDF

Development of IP address translator for Virtual Group network service (Virtual Group 네트워크 서비스 제공을 위한 IP 주소 변환 시스템 개발)

  • Choi, Jin-Young;Lee, Seung-Pyo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1603-1609
    • /
    • 1998
  • In this paper, we present a development of IP addresstranslator for virtual group network service and an application to Korea Information Infrastructure Pilot projects in Daeduk Science town network, This method can be a way to provide network service for limited virtual groups which are connected to a specialized network. Also this can be used to provide a new network environment for closed user groups in Intranet applications.

  • PDF

Mining Spatio-Temporal Patterns in Trajectory Data

  • Kang, Ju-Young;Yong, Hwan-Seung
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.521-536
    • /
    • 2010
  • Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approaches transform trajectories into sequences of location symbols and derive frequent subsequences by applying conventional sequential pattern mining algorithms. However, spatio-temporal correlations may be lost due to the inappropriate approximations of spatial and temporal properties. In this paper, we address the problem of mining spatio-temporal patterns from trajectory data. The inefficient description of temporal information decreases the mining efficiency and the interpretability of the patterns. We provide a formal statement of efficient representation of spatio-temporal movements and propose a new approach to discover spatio-temporal patterns in trajectory data. The proposed method first finds meaningful spatio-temporal regions and extracts frequent spatio-temporal patterns based on a prefix-projection approach from the sequences of these regions. We experimentally analyze that the proposed method improves mining performance and derives more intuitive patterns.

Influence Maximization Scheme against Various Social Adversaries

  • Noh, Giseop;Oh, Hayoung;Lee, Jaehoon
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.4
    • /
    • pp.213-220
    • /
    • 2018
  • With the exponential developments of social network, their fundamental role as a medium to spread information, ideas, and influence has gained importance. It can be expressed by the relationships and interactions within a group of individuals. Therefore, some models and researches from various domains have been in response to the influence maximization problem for the effects of "word of mouth" of new products. For example, in reality, more than two related social groups such as commercial companies and service providers exist within the same market issue. Under such a scenario, they called social adversaries competitively try to occupy their market influence against each other. To address the influence maximization (IM) problem between them, we propose a novel IM problem for social adversarial players (IM-SA) which are exploiting the social network attributes to infer the unknown adversary's network configuration. We sophisticatedly define mathematical closed form to demonstrate that the proposed scheme can have a near-optimal solution for a player.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

A Study on the Transition of Elements of the Book Colophon in Korea (우리나라의 도서 판권기 기술요소 변천 고찰)

  • Lee, Myoung-Gyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.3
    • /
    • pp.329-349
    • /
    • 2010
  • Colophon means an element to describe bibliographic areas of the concerned book on the specific space like a back of the title page or the last page of a book. Colophon functioned as an information source when cataloging in a library, an area concerning the copyright and as an useful information to readers. The publication of a new book has begun since early 1900s in Korea. And the element of the colophon is dependent on changes in the social and cultural environment. Among the element of the colophon early 1900s until now, the elements consistently appear on the title and the author, a place of publication, a publisher, the date of publication and the price. Additional the elements according to the change of social environment are the edition, ISBN, the registration of publisher, the address of publisher and an author career. On the other hand, omitted elements are the address of author, the account number and the seal. In the future, the size of the book is additionally wanted to describe in the colophon.

  • PDF

A cell distribution algorithm of the copy network in ATM multicast switch (ATM 멀티캐스트 스위치에서 복사 네트워크의 셀 분배 알고리즘)

  • Lee, Ok-Jae;Chon, Byoung-Sil
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.8
    • /
    • pp.21-31
    • /
    • 1998
  • In this paper, a new algorithm is proposed which distributes multicast cells in a copy network. The dual copy network is composed of running adder network, distributor, dummy address encoder, and broadcasting network. It is operated lower input address and higher one simultaneously by the distribution algorithm. As a result, for each input has a better equal opportunity of processing, cell delay and hardware complexity are reduced in copy network. Also, for it adopts the broadcasting network from an expansion Banyan network with binary tree and Banyan network, overflow probability is reduced to a half in that network. As a result of computer simulation, the copy network processed by the distribution algorithm is remarkably improved in cell delay of input buffer according to all input loads.

  • PDF

Clue for Secure Route Optimization in Mobile IPv6 (모바일 IPv6 바인딩 업데이트의 보안 향상 기법)

  • Song, Se-Hwa;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.153-158
    • /
    • 2010
  • Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.

Implementation of Memory Efficient Flash Translation Layer for Open-channel SSDs

  • Oh, Gijun;Ahn, Sungyong
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.142-150
    • /
    • 2021
  • Open-channel SSD is a new type of Solid-State Disk (SSD) that improves the garbage collection overhead and write amplification due to physical constraints of NAND flash memory by exposing the internal structure of the SSD to the host. However, the host-level Flash Translation Layer (FTL) provided for open-channel SSDs in the current Linux kernel consumes host memory excessively because it use page-level mapping table to translate logical address to physical address. Therefore, in this paper, we implemente a selective mapping table loading scheme that loads only a currently required part of the mapping table to the mapping table cache from SSD instead of entire mapping table. In addition, to increase the hit ratio of the mapping table cache, filesystem information and mapping table access history are utilized for cache replacement policy. The proposed scheme is implemented in the host-level FTL of the Linux kernel and evaluated using open-channel SSD emulator. According to the evaluation results, we can achieve 80% of I/O performance using the only 32% of memory usage compared to the previous host-level FTL.