• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.029 seconds

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

A Proposal for a Femto-Cell Local Gateway and Packet Off-Loading for Remote Shipyards (원격 조선소의 펨토셀 로컬 게이트웨이 구성과 패킷 오프로드 방식 제안)

  • Lee, Won Hee;Min, Sang Won;Jeong, Min A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.387-393
    • /
    • 2013
  • In shipyard site, a ship is constructed by integrating lots of modules that are made in several sites with different capabilities and specifications. Recently, it needs to make a shipyard to be smart with wired and wireless broadband networks between hierarchical shipyards. In this paper, we propose an installation of LTE femtocell local gateway at a remote shipyard, an information exchange method between hierarchical shipyards, and an offload method to separate the general traffic. We define the mode change in a femtocell gateway for supporting the offload of the general traffic between the headquarter and a remote shipyard, the offload data management and trigger message, and cache entry fields. To show the operation of our proposed off-loading function, we consider the transcipient message flow at the femtocell gateway with its state transition diagram. Hence, it is expected to increase the productivity of shipyard industry with mobile communications and broadband Internet technologies.

A Mobility Prediction Scheme using a User's Mobility Pattern in Wireless Networks (무선 네트워크에서 사용자 이동 패턴을 사용한 이동성 예측 기법)

  • Kwon, Se-Dong;Park, Hyun-Min
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.193-202
    • /
    • 2004
  • Handoff if the most Important feature for the user's mobility in a cellular communication system, which is related to resource reservation at nearby cells. For efficient resource reservation, mobility prediction has been reported as an effective means to decrease call dropping probability and to shorten handoff latency in wireless cellular environments. Several early proposed handoff schemes making use of tile user's movement history on a cell-by-cell basis work on the assumption that the user's movements are restricted to the indoor locations such as an office or a building. However, those algorithms cannot be applied to a micro-cell structure or a metropolis with complicated structure of roads. In this paper, to overcome those drawbacks we propose a new mobility prediction algorithm, which stores and uses the history of the user's positions within the current cell to predict the next cell.

An Transport Layer Vertical Handover Approach for Video Services in Overlay Network Environments (오버레이 네트워크 환경에서 비디오 서비스를 위한 트랜스포트 계층에서의 수직 핸드오버 방안)

  • Chang, Moon-Jeong;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.163-170
    • /
    • 2007
  • The next generation communication environment consists of various wireless access networks with distinct features that are configured as an overlay topology. In the network environments, the frequency of hand overs should be minimized and the error propagation should be solved in order to provide high-quality multimedia services to mobile users. Therefore, we propose an performance enhancement approach, based on mSCTP, that provides high quality multimedia services to mobile users by ameliorating the error propagation problem. We utilizes the following four functions: 1) the separation of transmission paths according to the types of frames. 2) retransmission strategy to minimize the loss rate of frames, 3) Foced vertical handover execution by utilizing bicasting, 4) using the stability period in order to reduce the effect of the ping pong phenomenon. The simulation results show that the proposed approach provides seamless multimedia service to mobile users by achieving error resilience.

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.

A Re-configuration Scheme for Social Network Based Large-scale SMS Spam (소셜 네트워크 기반 대량의 SMS 스팸 데이터 재구성 기법)

  • Jeong, Sihyun;Noh, Giseop;Oh, Hayoung;Kim, Chong-Kwon
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.801-806
    • /
    • 2015
  • The Short Message Service (SMS) is one of the most popular communication tools in the world. As the cost of SMS decreases, SMS spam has been growing largely. Even though there are many existing studies on SMS spam detection, researchers commonly have limitation collecting users' private SMS contents. They need to gather the information related to social network as well as personal SMS due to the intelligent spammers being aware of the social networks. Therefore, this paper proposes the Social network Building Scheme for SMS spam detection (SBSS) algorithm that builds synthetic social network dataset realistically, without the collection of private information. Also, we analyze and categorize the attack types of SMS spam to build more complete and realistic social network dataset including SMS spam.

U-Bus Advertisement Business Model and System Implementation based on Wireless Networks (무선망 기반의 U-버스광고 비즈니스 모델 및 시스템 구축 방안)

  • Roh, Su-Sung;Kim, Do-Nyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.88-97
    • /
    • 2010
  • Recently the more convenient services are provided to people in the city in line with the change of city paradigm and the recent development of ubiquitous. For example, Information on bus arrivals an effective advertisement the combination of high technology and departures through smart-phones. However, in respect of the mobile advertisement, because of difficulties such as the means of transferring the mass storage data or the burden of communication charges. there need means to improve such difficulties. This study has been conducted aiming to overcome such difficulties. This study suggests the strategic differentiation plan through the analysis of the media characteristics such as real time service information when in traveling, U-Bus business model in the category of mobile advertisement, etc. and also the concrete system establishment plan from the operation center via network to the delivery of the advertisement through vehicle terminals. In respect that this study suggests the implications as a practical business model through the fusion of high technology and diverse media. It has great significance.

Emerging Electronic Documentary Credit and Electronic Presentation of Documents (전자신용장의 출현과 서류의 전자적 제시에 관한 고찰)

  • Kang, Won-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.21
    • /
    • pp.73-97
    • /
    • 2003
  • In this paper, I examined the trends of standardization and electronization of trade documents and SWIFT network. Also, I reviewed on emerging electronic documentary credit for electronic payment and electronic presentation of documents. New international trade customs and practices are being established and changed as a result of the growth of the Internet and other on-line networks. At the same time there is increasing pressure to move from existing paper-based documentary credit to electronic documentary credit. Several projects devoted to development of an electronic letter of credit infrastructure have recently been proposed such as Bolero, SWIFTNet, UNeDocs and eUCP, etc. Yet, little can be done until the presentation process is electrified between traders and banks. Also, interbank communication of letters of credit has long been electronic, mainly through the SWIFT. However, it is not functioned between applicant and beneficiary, although the solution of SWIFTNet has recently been developed. The Banking Commission of International Chamber of Commerce established a working group consisting of experts in the related fields to prepare the appropriate rules as a Supplement to UCP 500 for Electronic Presentation: eUCP. The eUCP will provide the necessary rules for the presentation of the electronic equivalents of paper documents under letters of credit. Some problems of electronic presentation under the eUCP, exist such as format, presentation of electronic records and the way of beneficiary's notice for completeness under the Article e5 if more than one record is to be presented electronically by third parties. Therefore, it is encouraged to provide more detailed guide for eUCP Article e5.

  • PDF

A Theoretical Reconsideration of Contemporary Fashion Criticism (현대패션비평에 관한 이론적 재고)

  • Choi, Kyung Hee
    • Fashion & Textile Research Journal
    • /
    • v.16 no.1
    • /
    • pp.66-78
    • /
    • 2014
  • The purpose of this study is to illuminate the location of fashion in contemporary society and to suggest a direction for fashion criticism in aesthetic$\hat{u}$cultural perspective. For this, literature researches about some of art criticism and fashion criticism theories and cultural studies related to fashion are performed. In this study, fashion criticism is defined as a linguistic analysis and interpretation about a variety of discursive networks around fashion as well as an aesthetic analysis of it. Considering this definition, an analytical framework for the contemporary fashion criticism combines Feldman's and Carney's models with Crane & Bovone's and Entwistle's sociological studies for aesthetic and cultural perspectives. At first, its aesthetic perspective shows 'Description'-'Descriptive formative features', 'Analysis'-'Locate the style' and 'Aesthetic value', 'Interpretation'- 'Interpretation of the fashion object' and 'Socio-cultural interpretation', 'Judgment'-'Critical judgment'. Then, its cultural perspective especially emphasizes 'Socio-cultural interpretation' of the 6 steps above. Socio-cultural interpretation gets tangled with the network of various cultural agents within the fashion system, producers/designers, retailers/suppliers, media/editors, consumers/spectators, and so on. In the course of the fashion system 5 analytical methods about the fashion object can be suggested and they are as follows: Analyses of texts, discourses and symbols of a fashion object, Analyses of fashion systems which produces symbolic values, Analyses of the communication of symbolic values and the disseminating processes through the media, Analyses of the attribution of symbolic values to a fashion object by consumers, and Cross-national studies of symbolic values expressed in a fashion object.

Integrating Ant Colony Clustering Method to a Multi-Robot System Using Mobile Agents

  • Kambayashi, Yasushi;Ugajin, Masataka;Sato, Osamu;Tsujimura, Yasuhiro;Yamachi, Hidemi;Takimoto, Munehiro;Yamamoto, Hisashi
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.3
    • /
    • pp.181-193
    • /
    • 2009
  • This paper presents a framework for controlling mobile multiple robots connected by communication networks. This framework provides novel methods to control coordinated systems using mobile agents. The combination of the mobile agent and mobile multiple robots opens a new horizon of efficient use of mobile robot resources. Instead of physical movement of multiple robots, mobile software agents can migrate from one robot to another so that they can minimize energy consumption in aggregation. The imaginary application is making "carts," such as found in large airports, intelligent. Travelers pick up carts at designated points but leave them arbitrary places. It is a considerable task to re-collect them. It is, therefore, desirable that intelligent carts (intelligent robots) draw themselves together automatically. Simple implementation may be making each cart has a designated assembly point, and when they are free, automatically return to those points. It is easy to implement, but some carts have to travel very long way back to their own assembly point, even though it is located close to some other assembly points. It consumes too much unnecessary energy so that the carts have to have expensive batteries. In order to ameliorate the situation, we employ mobile software agents to locate robots scattered in a field, e.g. an airport, and make them autonomously determine their moving behaviors by using a clustering algorithm based on the Ant Colony Optimization (ACO). ACO is the swarm intelligence-based methods, and a multi-agent system that exploit artificial stigmergy for the solution of combinatorial optimization problems. Preliminary experiments have provided a favorable result. In this paper, we focus on the implementation of the controlling mechanism of the multi-robots using the mobile agents.