• Title/Summary/Keyword: Roaming Server

Search Result 24, Processing Time 0.024 seconds

Distributed Secure Mail System For Roaming User (이동 사용자를 위한 분산 보안 메일 시스템)

  • Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.825-834
    • /
    • 2003
  • In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.

A Key Roaming Protocol using Elliptic-Curve and Multi-Server (타원곡선과 다중서버를 이용한 키로밍 프로토콜)

  • 문성원;권영갑;문창주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.235-237
    • /
    • 2004
  • 어플리케이션 시스템을 사용하려는 사용자에 대한 인증에 관한 문제는 네트워크에 접근하고자 하는 사용자가 실제 의도한 상대인지를 판단하는 것으로써, 서버에서 서비스를 제공하기 전에 만족해야 할 필수적인 요구조건이다. 이와 관련한 많은 연구들이 진행되어 왔는데, 이 중에서 패스워드를 이용한 사용자인증 프로토콜은 여타의 방법에 비해 사용자에게 편리함을 제공할 뿐만 아니라 추가적인 하드웨어를 필요로 하지 않는 다는 장점을 가지고 있다. 최근에는 다중서버를 이용한 프로토콜이 제안되어 기존의 프로토콜 비해 보안이 강화된 서비스를 제공할 수 있게 되었다. 그러나 이 프로토콜은 다중서버를 사용함으로 인해서 부하가 많이 걸린다는 문제점이 존재한다. 본 논문에서는 이러한 다중서버를 이용한 프로토콜을 기반으로 하고 이에 타원곡선 알고리즘을 적용함으로써 컴퓨팅 파워를 줄일 수 있는 방안을 제시하고자 한다.

  • PDF

OPEN LBS PLATFORM ARCHITECTURE

  • Choi, Hae-Ock
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.854-859
    • /
    • 2002
  • Location Based Services, or LBS refers to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless internet, the LBS has preconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. This paper describes the open architecture for LBS platform ensuring interoperability among the wireless networks and various location-based application services and the functional requirements for the LBS platform. The LBS platform in a narrow sense provides a standard interfaces for location management and network management for location services as follows, positioning (location acquisition through network or/and handset), location managing, location based functions, profile management, authentication and security, location based billing, information roaming between carriers and the system monitoring independent to specific network or ISP/CPs(Content Providers).

  • PDF

A Study On Diameter IAPP Server Supporting WirelessLAN Terminal Handoff (무선랜단말 핸드오프지원 Diameter IAPP 서버에 대한 연구)

  • 함영환;정병호;정교일
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.597-601
    • /
    • 2003
  • 무선랜 환경에서 무선랜 단말이 AP(Access Point)사이를 로밍(Roaming)할 때 무선랜단말의 안전한 핸드오프를 위한 프로토콜로서 IAPP(InterAccess Point Protocol)가 있고 관련된 IEEE표준으로 802.11f가 있다. 무선랜단말의 안전한 핸드오프를 위해서는 IAPP를 통하여 기존에 접속되었던 AP에서 새로운 AP에게 무선랜단말의 인증 또는 과금관련 정보를 안전하게 전달하는 것이 필요하다. IEEE 802.11f에서는 무선랜단말의 핸드오프를 지원하는 액세스포인트를 인증하고 AP사이의 안전한 통신을 위한 정보를 제공하는 IAPP서버로 라디우스(RADIUS) 서버를 권고한다. 본 논문에서는 라디우스 서버의 한계를 극복하고 보다 확장성과 신뢰성이 뛰어난 서버를 위해 Diameter를 사용한 IAPP 서버의 구조와 동작에 대해서 설 명 한다.

  • PDF

Authentication Mechanism using Trust Relationship Server in Heterogeneous Network Roaming Environment (이기종 네트워크 로밍환경에서 신뢰 관계 서버를 이용한 인증 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.1262-1265
    • /
    • 2007
  • 인터넷 및 디바이스의 발달과 유비쿼터스 환경이 도래함에 따라 모바일 디바이스를 이용하여 서비스를 제공받고자 하는 수요는 급속도로 증가하고 있다. 유비쿼터스 환경에서 모바일 디바이스가 이기종 네트워크로 이동하여 언제, 어디서, 누구에게나 끊김없는 서비스를 제공하기 위해서는 이기종 네트워크간의 통신 및 디바이스간의 데이터 통신이 가능해야 한다. 그러나 동종 네트워크에서의 보안 기술 및 통신 기술로는 이기종 네트워크에 적용했을 때 확장성 및 안전성에 많은 문제가 따른다. 따라서 이기종 네트워크 로밍 환경에서 안전하고 효율적인 인증 메커니즘을 제안하였다.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Design and Implementation of Parking Information Support System for Inner Parking Lot Based on Microprocessor (마이크로프로세서 기반의 실내 주차정보 제공 시스템 설계 및 구현)

  • Yoo, Si-On;Oh, Hyoung-Jin;Oh, Kab-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.51-59
    • /
    • 2010
  • Apartment complex, buildings, markets and department stores have inner parking lots which can accept many cars but drivers waste lots of times to find the empty parking spaces in crowding parking lots. In this paper, we proposed the inner parking information support system based on microprocessor which can decrease roaming times to find vacant parking spot in confusing parking lots through notice monitor and provide SMS to make it easy to find parked place. Proposed system consist with RFID system for detecting access of cars, microprocessor system for processing data of checking existence of cars on parking spots and communicating with server, and server system which processes information of cars' in and out, guides empty parking spots and parked location to drivers. Suggested system is realized by handmade model parking lot size of 8 cars, and we confirmed practicality by providing information using parking notice monitor and single message service.

A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment (무선 랜 환경에서 안정적인 로밍을 위한 선행 인증기법 설계)

  • Hong, Soon-Ja;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.33-41
    • /
    • 2006
  • Wireless LAN is intrinsically weak in security of transmissions. WPKI (Wireless Public Key Infrastructure) is a well known Method to deal with the security issues in wireless LAN. The authentication required by the method becomes a source of unrellability of the hand-off performance. This paper suggests a solution to overcome the instability while using the WPKI technique, Prior to getting into the next region, a station is provided with the keys of the surrounding regions so that the possible delay problem can be avoided during the actual hand-off time. Thereby the hand-off instability can be solved in the WPKI framework.

  • PDF

A Fast Authentication Algorithm For Smooth Handoff (Smoothe Handoff 지원을 위한 빠른 인증 알고리즘)

  • Kim, In-Su;Kim, Gi-Cheon;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.17-20
    • /
    • 2002
  • IMT-2000 technologies are divided 3G packet data system that using mobile IP and GPRS that based on the GSM networks. These technologies Push introduce mobile IP to support seamless roaming. In mobile If environments, use AAA server such as RADIUS or DIAMETER to provide authentication service for dial-up computers. This factor is important for mobile nodes. Mobile If require strong authentication between mobile nodes and home agents. We propose application of AAA protocols for smooth handoff mechanism in IMT-2000 environments.

Performance Evaluation of Advanced Container Security Device(ACSD) system based on IoT(Internet of Things) (IoT 기반 컨테이너 보안 장치 및 시스템 성능 평가)

  • Moon, Young-Sik;Choi, Sung-Pill;Lee, Eun-Kyu;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2183-2190
    • /
    • 2013
  • Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and status information about container are transmitted to a remote server using IoT (Internet of Things) based communication. In this research, we are looking into the development trend of global container security devices; and applying ConTracer to real freight transport from domestic to overseas using Global Roaming Service which is offered for domestic Mobile Communication Companies as well. As a result, we estimate the performance of ConTracer and verify it.