• Title/Summary/Keyword: Virtual Roaming

Search Result 9, Processing Time 0.019 seconds

Provision of VHE Services to Roaming Users

  • Roussaki, Ioanna;Chantzara, Maria;Xynogalas, Stavros;Anagnostou, Miltiades
    • Journal of Communications and Networks
    • /
    • v.4 no.4
    • /
    • pp.363-369
    • /
    • 2002
  • Towards the deployment of 3rd generation systems, Virtual Home Environment (VHE), stemming from 3GPP, appears to be a powerful concept advocating the provision and delivery of personalized services to roaming users across network and terminal boundaries. This paper aims to expose the pathway for materializing the VHE concept, via the specification, implementation and evaluation of a prototype. Core aspects for realizing the concept such as the business and roaming models are presented, while a VHE enabling architecture utilizing key technologies (OSA/Parlay, MExE, and USAT) is introduced. The proposed architecture has already been evaluated by performing an initial trial demonstration. Currently it is being extended to support VHE service provision to roaming users, an aspect to be addressed by the final trial.

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

Network Search Algorithm for Fast Comeback to Home Network in Roaming Environment (이동통신 로밍 환경에서 빠른 홈망 복귀를 위한 망탐색 알고리즘)

  • Ha, Won-Ki;Koh, Seok-Joo
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.149-152
    • /
    • 2012
  • In the roaming case, the cost of using the visited network is larger than that of home network. So, if a mobile terminal is connected to the visited network, even though it actually came back to the home network, the user may unduly pay for communication. Such a problem frequently occurs when many networks are overlapped in the same region, as shown in the case of Poland. In this paper, we propose a network search algorithm to support the fast comeback to home network in the roaming environment. In the proposed scheme, which is based on the 3GPP specification, the mobile terminal tries to search the home network by using a database of network information, as fast as possible. For performance evaluation, we construct a virtual testbed with real terminal and network equipment to emulate the service providers in Poland. From the experimental results, we can see that the proposed scheme can reduce the time of comeback to the home network by 3~60 minutes, compared the existing 3GPP scheme.

IMT-2000망에서의 로우밍 관련 주요 issue들

  • Im, Seon-Bae
    • The Magazine of the IEIE
    • /
    • v.25 no.10
    • /
    • pp.25-31
    • /
    • 1998
  • IMT-2000 시스템에서도 제2세대 이동통신시스템에서와 같이 로우밍(roaming) 에 대한 기술적인 문제의 해결이 필요하다. 다만 IMT-2000 시스템에서 요구되는 로우밍 요구사항은 제2세대 이동통신시스템에서 요구되는 로우밍 요구사항 보다 훨씬 수준 높은 점이 다르다. IMT-2000 에서 로우밍과 관련된 요구사항으로는 서로 다른 IMT- 2000 family member간의 이동성올 보장하는 글로벌 로우밍 (global roaming)기능, 타 IMT-2000 망에 이동하여서도 마치 자기 IMT-2000 망에 있는 것처럼 IMT-2000 망이 제공하는 서비스를 사용 할 수 있는 virtual home environment(VHE) 기능, 이동중에도 패킷 데이터 서비스 특히 인터넷을 사용하여 패킷 데이터를 주고 받을 수 있는 Internet interworking 기능등이 있다. 본고에서는 IMT-2000 망 구조하에서 이러한 로우밍 관련 요구사항들이 어떻게 논의되어 가고 있는지에 대하여 살펴본다.

  • PDF

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

IRS(Information Retrieval Service) Design Based on VHE(Virtual Home Environment) (VHE(Virtual Home Environment)환경을 기반으로 한 IRS(Information Retrieval Service)의 설계)

  • 최재원;이지영;김연중;송은봉;우시남;안순신
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.520-522
    • /
    • 2000
  • UMTS(Universal Mobile Telecommunication System)는 시간, 위치 및 단말기의 종류와 독립적으로 모든 사용자에게 동일한 서비스를 공급하는 것이 목적이다. 이를 위해서는 현재 사용자가 사용하고 있는 단말기의 종류나 사용자 위치에 독립적인 연결 설정과, 서비스 로밍(service roaming)의 기술이 필요하다. UMTS를 포함한 차세대 통신망에서 가장 중요한 개념은 서비스 로밍을 가능하게 해주는 VHE이다. VHE는 사용자에게 시간과 공간에 독립적인 일관적인 서비스를 제공하는 것이지만, 아직까지는 서로 다른 망을 연동 하는데 있어서 많은 문제점이 해결되지 않은 상황이다. 기존의 전화망과 인터넷망을 통합시켜주는 JAIN 기반 위에, Mobile Agent Technology(MAT)를 이용해서 기존환경의 문제점을 극복하고, 새로운 형태의 서비스를 창출할 수가 있다. 이 논문에서는 MAT를 기반으로 하여 이동 환경을 고려한 효율적인 정보검색 시나리오를 설계하고 그 시나리오를 제시한다.

  • PDF

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Security Mechanism for Firewall Traversal in Mobile IP (안전한 방화벽 Traversal을 제공하는 Mobile IP의 보안 메커니즘)

  • Jin, Min-Jeong;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.11-20
    • /
    • 2004
  • Mobile IP is designed to provide IP services to roaming nodes. Mobile users take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases mobile users is connected through a wireless link and is protected by corporation's firewall in virtual Private network. In order to have a successful deployment of Mobile IP as an extension of a private network, security services should be provided as if the mobile node were attached to its home network. In this paper, we propose the security mechanism of combining Mobile IP and IPSec tunnels, which can provide secure traversal of firewall in a home network. The simulation results show that the proposed mechanism provides the secure and efficient communication.

An Exploratory Study on the Possibility of Using Next-Generation Technology in Long-term Care Facilities : Focusing on the Perception of the Workforce of in Long-term Care Facilities (노인장기요양시설의 차세대 기술 활용가능성에 대한 탐색적 연구 : 노인장기요양시설 인력의 인식을 중심으로 -)

  • Lee, Sun Hyung;Lim, Choon Hee;Kim, Weon Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.191-205
    • /
    • 2020
  • This study examined the possibility of utilizing next-generation technology, such as Virtual Reality or AI robots, in the long-term care facilities for the elderly. For the study, the Focus Group Interview was conducted in three different groups of 14 participants (care workers, social workers, and directors of long-term care facilities for the elderly). The analysis revealed a total of three topics, eight categories, and 26 sub-categories. The main results of the study showed that the use of next-generation technology could assist the psychological and emotional stability, provide curiosity and interest, and relieve the desire for physical activity for the elderly. In addition, for long-term care services staff, it could provide useful services for the elderly with physical constraints, facilitate effective management of the elderly roaming around, and enhance emotional support services. Finally, it could also help directors of long-term care facilities promote their services, educate staff, and keep up with current trends. Participants expressed concerns about the introduction of new technologies, but they generally expected that the application of next-generation technology would be positive for the elderly as well as for care workers and directors of long-term care facilities. Therefore, the use of next-generation technology in long-term care facilities for the elderly will also help develop gerontechnology.