• 제목/요약/키워드: dynamic access control

검색결과 278건 처리시간 0.021초

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권6호
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

Dynamic Contention Window based Congestion Control and Fair Event Detection in Wireless Sensor Network

  • Mamun-Or-Rashid, Md.;Hong, Choong-Seon
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1288-1290
    • /
    • 2007
  • Congestion in WSN increases energy dissipation rates of sensor nodes as well as loss of packets and thereby hinders fair and reliable event detections. We find that one of the key reasons of congestion in WSN is allowing sensing nodes to transfer as many packets as possible. This is due to the use of CSMA/CA that gives opportunistic media access control. In this paper, we propose an energy efficient congestion avoidance protocol that includes source count based hierarchical and load adaptive medium access control. Our proposed mechanism ensures load adaptive media access to the nodes and thus achieves fairness in event detection. The results of simulation show our scheme exhibits more than 90% delivery ratio with retry limit 1, even under bursty traffic condition which is good enough for reliable event perception.

지문 식별을 위한 동적 임계치 설정방법 (Dynamic Thresholding Scheme for Fingerprint Identification)

  • 김경민;이범;박중조;정순원
    • 제어로봇시스템학회논문지
    • /
    • 제18권9호
    • /
    • pp.801-805
    • /
    • 2012
  • This paper proposes dynamic thresholding scheme for fingerprint identification. As a user authentication method by fingerprint recognition technology, verification method based on 1:1 matching was mainly used in the past, but identification method based on 1:N matching is generally used recently. The control of the value of FAR is very important in the application areas such as access control and time attendance systems. This paper proposes dynamic thresholding scheme which could properly control the value of FAR according to the field of applications and size of the fingerprints database.

서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구 (A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System)

  • 박용범;권예진
    • 반도체디스플레이기술학회지
    • /
    • 제17권1호
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석 (Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD)

  • 이민철;김정호
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제4권9호
    • /
    • pp.271-282
    • /
    • 2015
  • 비즈니스 환경에서 BYOD(Bring Your Own Device) 활용은 지속적으로 확대되고 있다. 시스코(Cisco)는 2012년 600개 기업을 대상으로 BYOD 활용에 관한 설문조사를 실시했다. 조사 결과 95%의 기업에서 이미 BYOD 사용을 허용하고 있으며, 업무 생산성이 향상된 것으로 나타났다. 가트너(Gartner)는 BYOD 도입으로 보안위협이 증가할 것으로 예측했으며, 보안위협 완화 방안으로 네트워크 접근통제(Network Access Control, NAC) 도입을 제안했다. 또한 접근통제 중요도에 따라 네트워크 영역을 나누고, 사용자 역할과 단말기 유형을 고려하여 접근통제 정책을 상세히 정의하고, 네트워크에 연결된 모든 단말기에 강제로 적용할 것을 주장했다. 본 논문에서는 IEEE 802.1X와 DHCP 핑거프린팅(fingerprinting)을 응용하여 네트워크 접근통제를 설계 구현하고, BYOD 환경에 적용하여 접근통제 성능을 해석하고자 한다.

휴대 단말기를 위한 상황인식 기반 사용제어 모델 (A Usage Control Model based on Context-Awareness for Mobile Devices)

  • 장혜영;노진욱;조성제
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권1호
    • /
    • pp.63-70
    • /
    • 2008
  • 휴대폰 사용이 대중화됨에 따라 사람들이 때와 장소를 가지리 않고 휴대폰을 무분별하게 사용함으로써 나타나는 폐해가 심각하다. 특히, 휴대폰 사용이 병원의 전자 의료기기나 항공기 이착륙 시스템 등에 나쁜 영향을 끼친다는 연구 결과들이 발표되고 있다. 본 논문에서는 모바일 기기에 적용할 수 있는 상황인식 기반의 사용제어 모델을 제안한다. 즉, 위치와 시간, 주변소음 등의 상황정보에 따라 휴대폰 자체 및 모바일 콘텐츠의 사용을 제어하는 모델에 대해 연구하였다. 제안한 사용제어 모델은 '동적인 역할기반 접근제어' (Dynamic Role-based Access Control)을 포함한다. 제안한 시스템의 효용성을 확인하기 위해, PC 서버 및 임베디드 보드 상에 프로토타입 시스템을 구현하여 그 성능을 평가하였다.

스마트 홈에서 안전한 디바이스 제어 명령을 위한 토큰 기반 사용자 동적 접근제어 기법 (Token-Based User Dynamic Access Control for Secure Device Commands in Smart Home)

  • 유혜선;서민혜
    • 정보보호학회논문지
    • /
    • 제34권4호
    • /
    • pp.553-568
    • /
    • 2024
  • 사물인터넷 기술의 빠른 발전과 코로나19 팬데믹 이후 가정 내 활동의 증가로 인해 사용자들의 스마트 홈에 대한 수요가 크게 증가하였다. 스마트 홈 시장의 규모가 매해 빠르게 증가하고 사용자의 수가 늘어남에 따라 개인정보보호 및 각종 보안 문제에 대한 중요성도 함께 커지고 있다. 현재는 필요에 따라 한시적으로 다른 사용자들에게 스마트 홈 소유자 권한을 부여하고 시스템에 접근하도록 한다. 그러나 부여된 권한에 대한 관리가 제대로 이뤄지지 않을 경우 쉽게 악의적인 공격자의 접근을 허용할 수 있다. 또한, 스마트 홈 디바이스 및 센서를 통해 수집된 개인정보를 이용한 2차 피해의 발생 가능성에 대한 예방도 필요하다. 따라서 본 논문에서는 사용자의 편의성을 감소시키지 않으면서 스마트 홈 시스템에 대한 무분별한 접근을 방지하기 위해 접근 권한을 스마트 홈 디바이스의 기능 및 종류에 따라 세분화하여 설계하고 사용자 개인 디바이스를 활용한 토큰 기반 사용자 접근제어 기법을 제안한다.

무선 ATM에서의 동적 슬롯 할당 알고리즘 (Dynamic Slot Allocation Algorithm of Wireless ATM)

  • 이지현;유소영;서주하
    • 산업기술연구
    • /
    • 제21권A호
    • /
    • pp.189-198
    • /
    • 2001
  • In recent years, the predominant part in telecommunications is mobile communications. The next generation network is extending today's voice-only mobile networks to multi-service networks. ATM Network is possible to carry such multi-media traffic and it will be expect to use wireless ATM for the future mobile access network. One of manly important aspects for the performance of wireless ATM is the Medium Access Control (MAC) protocol. The MAC protocol must be able to satisfyingly handle the different ATM services (CBR, VBR, ABR and UBR) with their radically different performance requirements. Additionally, the MAC protocol must be able to cope with the complex radio environment where fading, multi-path propagation interference and burst-errors further complicate the situation. In this paper, a dynamic slot allocation algorithm in wireless ATM is proposed for an efficient channel sharing/media access at the MAC layer. We use equivalent capacity in the allocation of slots for VBR traffic which is variable along the time. It is simple and effective slot allocation method for VBR service. In particular, we consider the slot allocation of a session consisted of several connections for requirement of multimedia traffic. Simulation shows that the cell loss ratio is reduced by re-allocation of extra slots in Mobile Terminal (MT).

  • PDF

Dynamic Resource Adjustment for Coexistence of LAA and Wi-Fi in 5 GHz Unlicensed Bands

  • Choi, Jihoon;Kim, Eunkyung;Chang, Sungcheol
    • ETRI Journal
    • /
    • 제37권5호
    • /
    • pp.845-855
    • /
    • 2015
  • To enable the coexistence of Licensed Assisted Access (LAA) and Wi-Fi in 5 GHz unlicensed bands, a new channel access mechanism is proposed. Accounting for the fairness between LAA and Wi-Fi, the proposed mechanism finds the optimal transmission time ratio by adaptively adjusting the transmission durations for LAA and Wi-Fi. In addition, we propose a new analytical model for the distributed coordination function of IEEE 802.11 through some modifications of conventional analytical models for saturation and non-saturation loads. By computing the activity ratio of Wi-Fi, the proposed analytical model is able to control the time ratio between LAA and Wi-Fi, which is required for practical implementation of the proposed access mechanism. Through numerical simulations, the proposed channel access mechanism is compared with conventional methods in terms of throughput and utility.

역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크 (Application Design and Execution Framework in Role-Based Access Control Systems)

  • 이형효;최은복;노봉남
    • 한국정보처리학회논문지
    • /
    • 제6권11호
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF