• Title/Summary/Keyword: Update Protocol

Search Result 216, Processing Time 0.033 seconds

Improving the CGA-based HMIPv6 Security Protocol (CGA 기반의 HMIPv6 보안 프로토콜 개선)

  • You, Il-Sun;Kim, Heung-Jun;Lee, Jin-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.95-102
    • /
    • 2009
  • In 2006, Haddad, Krishnan and Soliman proposed a Cryptographically Generated Address based protocol as a standard for protecting HMIPv6. Though this protocol can provide both the strong message authentication and binding update key negotiation based on the public-key cryptography, it is still vulnerable to several attacks such as denial of service attacks and redirection attacks. This paper improves the problems caused by the protocol. The improved protocol is analyzed in terms of security and performance, and then is shown to be better than the previous one considering the two factors together.

Dynamic Adjustment Strategy of n-Epidemic Routing Protocol for Opportunistic Networks: A Learning Automata Approach

  • Zhang, Feng;Wang, Xiaoming;Zhang, Lichen;Li, Peng;Wang, Liang;Yu, Wangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2020-2037
    • /
    • 2017
  • In order to improve the energy efficiency of n-Epidemic routing protocol in opportunistic networks, in which a stable end-to-end forwarding path usually does not exist, a novel adjustment strategy for parameter n is proposed using learning atuomata principle. First, nodes dynamically update the average energy level of current environment while moving around. Second, nodes with lower energy level relative to their neighbors take larger n avoiding energy consumption during message replications and vice versa. Third, nodes will only replicate messages to their neighbors when the number of neighbors reaches or exceeds the threshold n. Thus the number of message transmissions is reduced and energy is conserved accordingly. The simulation results show that, n-Epidemic routing protocol with the proposed adjustment method can efficiently reduce and balance energy consumption. Furthermore, the key metric of delivery ratio is improved compared with the original n-Epidemic routing protocol. Obviously the proposed scheme prolongs the network life time because of the equilibrium of energy consumption among nodes.

List Locking Protocol for XML Data Sharing (XML 데이터 공유를 위한 리스트 잠금 프로토콜)

  • Lee Eunjung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1367-1374
    • /
    • 2004
  • For sharing XML data by many users, a way of concurrency and access control is required for isolating update actions such as inserting and deleting subtrees. Exisiting locking mechanisms as 2PL or MGL suffer low concurrency when applied to tree structures. In this paper, list data subtrees model is proposed based on the semantics expressed in DTD. In this model, tree updating actions such as inserting and deleting subtrees are considered only for the repetitive parts of XML trees. The proposed model guarantees that the result XML tree after applying a tree updating action is always valid, even when multiple users access the tree at the same time. Also, a new locking mechanism called list lock-ing protocol is proposed. The new locking protocol is expected to show better accessility with less number of locking objects compared to the Helmer's OO2PL model. Since update actions on a shared XML tree usually applied to the repetitive parts of the tree, the proposed model is expected to provide a useful way for efficient data sharing when combined with previous locking methods on terminal node data.

Use of FMIPv6 and Selective handover mechanisms based on hierarchical MAP information (FMIPv6 사용과 계충적인 MAP 정보 기반의 선택적인 핸드오버 매커니즘)

  • Kim, Jae-Seung;Kim, Dong-Il;Lee, Hong-Gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.87-90
    • /
    • 2007
  • Many moderncommunication technologies are developing based on internet protocol (IP) and there is many work to archive seamless mobility service. IETF proposed MIPv6 protocol that uses IPv6 to provide mobility services to mobile node however it has some limits like sending and receiving too many messages during binding update (BU) procedure. So, now a day it makes HMIPv6(Hierarchical Mobile IPv6). HMIPv6 solves overhead and transmission delay problem in MAP(Mobile Anchor Pointer), but it can't accomplish effectively Macro handover between MAPs. This paper introduces use of FMIPv6 and Selective handover mechanisms based on hierarchical MAP information in HMIPv6 for improvement of handover efficiency.

  • PDF

A Design and Implementation of a Two-Way Synchronization System of Spatio-Temporal Data Supporting Field Update in Mobile Environment (모바일 환경에서 필드 업데이트를 지원하는 시공간 데이터의 양방향 동기화 시스템의 설계 및 구현)

  • Kim, Hong-Ki;Kim, Dong-Hyun;Cho, Dae-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.909-916
    • /
    • 2010
  • In ubiquitous GIS services is possible to use the spatio-temporal data using a mobile device at anytime. Also, client is transmitted latest spatio-temporal data from server. But traditional systems have a problem that the time of transmitting latest information from server to client takes long time because of collecting data periodically. In this paper, we proposed Two-way Synchronization system supporting field update to solve the existing problem. This system uses mobile device for collecting changed data in the real world and sending collected data to server.

Two-Level Tries: A General Acceleration Structure for Parallel Routing Table Accesses

  • Mingche, Lai;Lei, Gao
    • Journal of Communications and Networks
    • /
    • v.13 no.4
    • /
    • pp.408-417
    • /
    • 2011
  • The stringent performance requirement for the high efficiency of routing protocols on the Internet can be satisfied by exploiting the threaded border gateway protocol (TBGP) on multi-cores, but the state-of-the-art TBGP performance is restricted by a mass of contentions when racing to access the routing table. To this end, the highly-efficient parallel access approach appears to be a promising solution to achieve ultra-high route processing speed. This study proposes a general routing table structure consisting of two-level tries for fast parallel access, and it presents a heuristic-based divide-and-recombine algorithm to solve a mass of contentions, thereby accelerating the parallel route updates of multi-threading and boosting the TBGP performance. As a projected TBGP, this study also modifies the table operations such as insert and lookup, and validates their correctness according to the behaviors of the traditional routing table. Our evaluations on a dual quad-core Xeon server show that the parallel access contentions decrease sharply by 92.5% versus the traditional routing table, and the maximal update time of a thread is reduced by 56.8 % on average with little overhead. The convergence time of update messages are improved by 49.7%.

Ticket based Binding Update Protocol for MIPv6 (MIPv6을 위한 티켓 기반의 바인딩 갱신 프로토콜)

  • Koo, Jung-Doo;Kim, Sang-Jinn;Oh, Hee-Kuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.4-6
    • /
    • 2005
  • 기존 MIPv6 을 위한 바인딩 갱신(binding update) 프로토콜은 이동 노드가 새로운 외부 링크로 이동할 때마다 동일한 프로토콜을 수행하여 바인딩을 갱신한다 그러나 이동을 하지 않아도 바인딩 갱신의 수명 때문에 같은 네트워크 링크에 있더라도 바인딩 갱신을 계속 수행하여야 하므로 매번 동일한 과정을 반복하여 바인딩을 갱신하는 것은 비효율적이다 이 논문에서는 CGA(Cryptographically Generated Address) 방식의 MIPv6 을 위한 새로운 티켓 기반 바인딩 갱신 프로토콜을 제안한다. 제안한 프로토콜에서 처음으로 바인딩을 갱신할 때 대응노드는 이동 노드에게 티켓을 발급하여 준다. 이후 갱신에서는 홈 에이전트의 도움 없이 이동 노드는 대응 노드와 직접 바인딩 갱신 프로토콜을 수행할 있다. 따라서 기존 프로토콜과 달리 두 번째 갱신부터는 매우 효율적으로 바인딩을 갱신할 수 있다. 이 논문은 몇 가지 공격 시나리오를 통해 제안한 프로토콜의 안전성을 분석하며, 기존 프로토콜과 비교하여 효율성을 입증한다.

  • PDF

A Study on Reduced Binding Update for RR Protocol In FMIPv6 (FMIPv6 RR 프로토콜의 바인딩 절차 간소화에 관한 연구)

  • Oh, Se-Won;Jung, Min-Soo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.275-278
    • /
    • 2009
  • MIPv6의 핸드오버 지연시간을 줄이는 많은 연구가 등장 하였고, 그 중 IEFT에서 표준화한 두 가지 프로토콜이 있다. 첫 번째 FMIPv6(Fast MIPv6) 프로토콜은 2계층 핸드오버 전에 3계층 핸드오버의 일부 과정은 사전에 수행함으로써 핸드오버 지연 시간을 줄이는 프로토콜이다. 두 번째 HMIPv6(Hierarchical MIPv6)는 일정한 범위를 커버할 수 있는 에이전트를 두어 이동성을 지역적으로 관리하여 핸드오버 지연시간을 줄이는 프로토콜이다. 본 논문에서는 FMIPv6에서 주로 사용하는 바인딩 갱신 프로토콜인 RR 프로토콜의 바인딩 갱신 절차를 줄임으로써 바인딩 갱신으로 생기는 시간을 단축시키는 방법을 제안한다.

  • PDF

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

Geographical Time Back-off Routing Protocol for Wireless Sensor Networks (무선 센서 네트워크에서 쥐치 정보의 시간차를 이용한 에너지 효율적인 라우팅 프로토콜)

  • Kim, Jae-Hyun;Sim, In-Bo;Kim, Hong;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5B
    • /
    • pp.247-256
    • /
    • 2007
  • In this paper, we propose Geographical Back-off Routing (Geo-Back Routing) protocol for wireless sensor networks. Geo-Back uses the positions of nodes, a packet's destination and a optimal back-off time to make the packet forwarding decisions using only source and destination's location information without information about neighbor nodes' location or the number of one hop neighbor nodes. Under the frequent topology changes in WSNs, the proposed protocol can find optimal next hop location quickly without broadcast algorithm for update. In our analysis, Geo-Back's scalability and better performance is demonstrated on densely deployed wireless sensor networks.