• Title/Summary/Keyword: device network

Search Result 2,421, Processing Time 0.038 seconds

Secure Device to Device Communications using Lightweight Cryptographic Protocol

  • Ajith Kumar, V;Reddy, K Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.354-362
    • /
    • 2021
  • The device to device (D2D) communication is an important and emerging area for future cellular networks. It is concerned about all aspect of secure data transmission between end devices along with originality of the data. In this paradigm, the major concerns are about how keys are delivered between the devices when the devices require the cryptographic keys. Another major concern is how effectively the receiver device verifies the data sent by the sender device which means that the receiver checks the originality of the data. In order to fulfill these requirements, the proposed system able to derive a cryptographic key using a single secret key and these derived keys are securely transmitted to the intended receiver with procedure called mutual authentication. Initially, derived keys are computed by applying robust procedure so that any adversary feel difficulties for cracking the keys. The experimental results shows that both sender and receiver can identify themselves and receiver device will decrypt the data only after verifying the originality of the data. Only the devices which are mutually authenticated each other can interchange the data so that entry of the intruder node at any stage is not possible.

Effective Utilization of DLNA Functions in Home Media Devices (홈 미디어 기기의 DLNA 소프트웨어 효율적 적용)

  • Kang, Ki-Cheol;Kim, Se-Young;Kim, Dae-Jin
    • Journal of Broadcast Engineering
    • /
    • v.17 no.1
    • /
    • pp.37-48
    • /
    • 2012
  • These days many DLNA home media network services start in home network area. DLNA networking softwares included in DLNA media devices contains all of server, renderer and controller functions. But a home media device in home media network environment not uses all of DLNA functions but uses only limited functions. Using all of integrated DLNA functions wastes networking and processing resources especially in home media network, because a home media device uses very limited functions. For example, a smart-TV has a main role of playback and a network attached storage has a main role of media content storage. In this paper, we analyze integrated DLNA networking softwares and design DLNA software models representing each home media device so as to utilize device resources efficiently. And we implement DLNA softwares for smart-TV and smart-phone and test resource efficiency.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Tracking Control using Disturbance Observer and ZPETC on LonWorks/IP Virtual Device Network (LonWorks/IP 가상 디바이스 네트워크에서 외란관측기와 ZPETC를 이용한 추종제어)

  • Song, Ki-Won
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.1
    • /
    • pp.33-39
    • /
    • 2007
  • LonWorks over IP (LonWorks/IP) virtual device network (VDN) is an integrated form of LonWorks device network and IP data network. LonWorks/IP VDN can offer ubiquitous access to the information on the factory floor and make it possible for the predictive and preventive maintenance on the factory floor. Timely response is inevitable for predictive and preventive maintenance on the factory floor under the real-time distributed control. The network induced uncertain time delay deteriorates the performance and stability of the real-time distributed control system on LonWorks/IP virtual device network. Therefore, in order to guarantee the stability and to improve the performance of the networked distributed control system the time-varying uncertain time delay needs to be compensated for. In this paper, under the real-time distributed control on LonWorks/IP VDN with uncertain time delay, a control scheme based on disturbance observer and ZPETC(Zero Phase Error Tracking Controller) phase lag compensator is proposed and tested through computer simulation. The result of the proposed control is compared with that of internal model controller (IMC) based on Smith predictor and disturbance observer. It is shown that the proposed control scheme is disturbance and noise tolerant and can significantly improve the stability and the tracking performance of the periodic reference. Therefore, the proposed control scheme is well suited for the distributed servo control for predictive maintenance on LonWorks/IP-based virtual device network with time-varying delay.

Study of Internet Web-Based Photovoltaic Inverter Remote Control System (인터넷 웹 기반 환경에서의 태양광용 인버터 원격제어시스템 개발에 관한 고찰)

  • Choi J. Y.;Cho K. S.;Choy I.;Yu G. J.;Jung Y. S.;Kim K. H.
    • Proceedings of the KIPE Conference
    • /
    • 2001.12a
    • /
    • pp.63-66
    • /
    • 2001
  • This paper aims at developing remote control system to control and monitor distributed various devices such as photovoltaic Inverter system through internet. TCP/IP (Transmission Control Protocol/Internet Protocol) and photovoltaic inverter system operated in a row are adopted for network management protocol and applied device, respectively. For controlling and monitoring distributed devices in real-time, java-environment software is constructed. Also, HelloDevice, general-use interface controller between network device and applied device is proposed. Finally, serial communication such as RS-232C is used between controller and applied device.

  • PDF

Development of Internet Web-Based Inverter Remote Control System (인터넷 웹 기반 환경에서의 인버터 원격제어시스템 개발)

  • Choi, J.Y.;Choy, I.;Yu, G.J.
    • Proceedings of the KIEE Conference
    • /
    • 2002.04a
    • /
    • pp.219-224
    • /
    • 2002
  • This paper aims at developing remote control system to control and monitor distributed various devices such as UPS or photovoltaic inverter system through internet. TCP/IP(Transmission Control Protocol/Internet Protocol) and photovoltaic inverter system operated in a row are adopted for network management protocol and applied device, respectively. For controlling and monitoring distributed devices in real-time, java-environment software is constructed. Also, HelloDevice, general-use interface controller between network device and applied device is proposed. Finally, serial communication such as RS-232C is used between controller and applied device.

  • PDF

Mobile Device-to-Device (D2D) Content Delivery Networking: A Design and Optimization Framework

  • Kang, Hye Joong;Kang, Chung Gu
    • Journal of Communications and Networks
    • /
    • v.16 no.5
    • /
    • pp.568-577
    • /
    • 2014
  • We consider a mobile content delivery network (mCDN) in which special mobile devices designated as caching servers (caching-server device: CSD) can provide mobile stations with popular contents on demand via device-to-device (D2D) communication links. On the assumption that mobile CSD's are randomly distributed by a Poisson point process (PPP), an optimization problem is formulated to determine the probability of storing the individual content in each server in a manner that minimizes the average caching failure rate. Further, we present a low-complexity search algorithm, optimum dual-solution searching algorithm (ODSA), for solving this optimization problem. We demonstrate that the proposed ODSA takes fewer iterations, on the order of O(log N) searches, for caching N contents in the system to find the optimal solution, as compared to the number of iterations in the conventional subgradient method, with an acceptable accuracy in practice. Furthermore, we identify the important characteristics of the optimal caching policies in the mobile environment that would serve as a useful aid in designing the mCDN.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.