• Title/Summary/Keyword: eIPV

Search Result 46, Processing Time 0.025 seconds

A Study for IPv6 Transitions on the Home Networks (홈네트워크에서 IPv6 전환 기술 연구)

  • Park, Hae-Kyeong;Paik, E-Hyen
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1275-1278
    • /
    • 2005
  • 가정 내의 정보가전기기가 네트워크로 연결돼 기기, 시간, 장소에 구애 받지 않고 서비스가 이뤄지는 유비쿼터스 디지털 홈으로 진화하기 위해, 댁내 많은 수의 단말들을 수용하고 이동성을 지원할 수 있는 IPv6 기술의 적용이 필수적으로 요구된다. 본 논문에서는 홈네트워크에서 IPv6 전환 기술을 적용하기 위한 방안 및 구조 등을 제시하고자 한다.

  • PDF

The Study of QoS Using DiffServ and MAC Priority in Mobile IPv6 Network (Mobile IPv6망에서 DiffServ 와 매체접근 우선권을 이용한 QoS에 관한 연구)

  • Son, Sung-Chan;Oh, Chung-Gyun
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.7 no.1
    • /
    • pp.33-39
    • /
    • 2007
  • Recently there are increasing needs for Internet and various kinds of contents. These traffics for various contents need more amount of data to provide high-quality information and require various QoS depending on the characteristics of contents. However, current Internet service supports BE (Best Effort) service only, therefore IntServ (Integrated Service) scheme and DiffServ (Differentiated Service) scheme are represented to support QoS in IP layer. This paper describes new scheme that provides QoS taking into account the traffic characteristics over Mobile IPv6 network based on IEEE 802.11e by decreasing signal process time using traffic class of DiffServ and MAC and evaluates the performance through computer simulation.

  • PDF

The Study of End-to-End QoS Providing Technique in Mobile IPv6 Network Based on IEEE 802.11e (IEEE 802.11e기반 Mobile IPv6망에서 End-to-End QoS 보장 기술에 관한 연구)

  • Ye, Hwi-Jin;Kim, Moon;Son, Sung-Chan;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.573-577
    • /
    • 2005
  • Recently there are increasing needs for Internet and various kinds of contents. These traffics for various contents need more amount of data to provide high-quality information and require various QoS depending on the characteristics of contents. However, current Internet service supports BE (Best Effort) service only, therefore IntServ (Integrated Service) scheme and DiffServ (Differentiated Service) scheme are represented to support QoS in IP layer. Moreover, while wireless Internet is getting popular, MAC(Medium Access Control)is also becoming important. This is due to the fact that wireless access, resource allocation and packet scheduling, which are done in another layers before, are performed in MAC layer in many new wireless systems. This paper describes new scheme that provides QoS taking into account the traffic characteristics over Mobile IPv6 network based on IEEE 802.11e EDCF and evaluates the performance through computer simulation.

  • PDF

Evolution of E-commerce Protocols in IPv6 (IPv6 기반의 전자상거래 보안 프로토콜의 진화)

  • Choi, Jung-Sun;Kim, Geon-Ung;Park, Ryoung-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1565-1568
    • /
    • 2001
  • 인터넷의 보급으로 전자상거래가 활성화 되고 있는 시점에서 무엇보다 중요한 것이 보안 문제인데, 현재의 인터넷에서 전자상거래와 관련하여 이용되고 있는 보편적인 보안 프로토콜이 SET와 SSL이다. IPv4의 여러 가지 한계를 극복하고자 진행되고 있는 IPv6에서 무엇보다도 주목한 점은 망 차원에서의 보안기능이 강화되고 있다는 점인데, 본 논문에서는 이러한 IPv6외 IPsec과 SET 그리고 SSL의 기능 및 역할을 고찰하구 향후 차세대 인터넷에서의 전자상거래 관련 보안 프로토콜의 진화 방향을 제시한다.

  • PDF

DDoS Attack Detection on the IPv6 Environment (IPv6환경에서 DDoS 침입탐지)

  • Koo, Min-Jeong;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.185-192
    • /
    • 2006
  • By mistaking normal packets for harmful traffic, it may not offer service according to the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DUoS(Distributed DoS) attack like the Internet worm. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWIB and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

Attack Detection Algorithm Using Exponential Smoothing Method on the IPv6 Environment (IPv6 환경에서 지수 평활법을 이용한 공격 탐지 알고리즘)

  • Koo Hyang-Ohk;Oh Chang-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.378-385
    • /
    • 2005
  • Mistaking normal packets for harmful traffic may not offer service in conformity with the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DDoS(Distributed Denial of Service) attack. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWOX and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment (IPv6 기반 NGN 환경에서 무결성을 제공하는 역추적 기법)

  • Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.31-41
    • /
    • 2010
  • It is difficult to identify attacker's real location when the attacker spoofs IP address in current IPv4-based Internet environment. If the attacks such as DDoS happen in the Internet, we can hardly expect the protection scheme to respond to these attacks in active or real-time manner. Many traceback techniques have been proposed to protect against these attacks, but most traceback schemes were designed to work with the IPv4-based Internet and found to be lack of verification of whether the traceback related information is forged or not. Few traceback schemes for IPv6-based network environment have been suggested, but it has these disadvantages that needs more study. In this paper, we propose the reliable IP traceback scheme supporting integrity of traceback-related information in IPv6 network environment, simulate it, and compare our proposed scheme with exsisting traceback mechanisms in terms of overhead and functionality.

Location Recognition Mechanism of Mobile Node for Fast Handover on Proxy Mobile IPv6 (프록시 모바일 IPv6에서 빠른 핸드오버를 위한 이동단말의 위치인지 메커니즘)

  • Bae, Sang-Wook;Kim, Hee-Min;Oudom, Keo;Han, Sun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.459-465
    • /
    • 2010
  • Mobile IPv6(MIPv6) features have several defects such as overloading of nodes, loss of wireless signals, packet loss, movement problem and so forth. Proxy Mobile IPv6 (PMIPv6) got over the limit of MIPv6 problems. MIPv6 features have several defects such as overloading of nodes, loss of wireless signals, packet loss, movement problem and so forth. Research on PMIPv6, which features network-based mobility is actively in progress in order to resolve these issues. PMIPv6 is emerging as a new paradigm that can overcome the limitations of the existing MIPv6. Nevertheless, such PMIPv6 also incurs problems during hand-over. While it offers a solution to node-based problems, it does, too, create long delay times during hand-over. Since MN (Mobile Node) has been sensing its own movements on MIPv6, fast handover can be done easily. However it can't apply fast handover like MIPv6, as it can't apply fast handover like MIPv6 In this paper, the author solved hand-over problem on MIPv6. MAG knows location information of MN and if MN moves into other MAG's area, Location Server gives MN information to the MAG. Therefore, this mechanism makes hand-over process easier.

An Analysis of Detection of Malicious Packet Dropping and Detour Scheme in IoT based on IPv6 (IPv6 기반의 사물인터넷 환경에서 악성 노드의 패킷 유실 공격 탐지 및 우회 기법 분석)

  • Choi, Jaewoo;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.655-659
    • /
    • 2016
  • In this paper, we propose new detection and detour methods against packet drop attacks for availability in the Internet of Things (IoT) based on the IEEE 802.15.4e and RPL protocol standards that employ IPv6. We consider the rank value of RPL and the consecutive packet drops to improve the detection metrics, and also take into account the use of both sibling and child nodes on a RPL routing path to construct the detour method. Our simulation results show that the proposed detection method is faster than the previous result, and the detour method improves the detour success rate.

Authentication of Hierarchical Mobile IPv6 Handover Using Modified Return Rotability (Modified Return Routability를 이용한 Hierarchical Mobile IPv6 Handover 인증 기법)

  • Kim, Jung-Hwan;Yu, Ki-Sung;Park, Byung-Yeon;Noh, Min-Ki;Mun, Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.21-28
    • /
    • 2007
  • Hierarchical Mobile IPv6 improves performance of Mobile IPv6 by managing Binding Update in terms of location, With improved handover delay, realization of delay-sensitive services (e,g, VoIP or video streaming) has become more persuadable, Comparing with Mobile IPv6, however, Hierarchical Mobile IPv6 brings security threats related to Local Binding Update to mobile network, In the RFC 4140, specific methods to authenticate Local Binding Update message are not explicitly presented. It is essential that design secure architecture to address problems related to authenticating Local Binding Update, Many secure suggestions for Local Binding Update, however, concentrate on infrastructure-based solutions such as AAA PKI. These approaches may cause scalability problem when the suggested solutions are applied to real network. Therefore we suggest authentication method that doesn't require infrastructure, In addition to authentication of Local Binding Update, our method also provides mobile node with power saving ability.

  • PDF