• Title/Summary/Keyword: global roaming

Search Result 36, Processing Time 0.022 seconds

SDR 소프트웨어 구조 및 다운로드

  • Lee, Heon U;Jeong, Sang Guk;Kim, Han Gyeong
    • The Magazine of the IEIE
    • /
    • v.30 no.4
    • /
    • pp.398-398
    • /
    • 2003
  • 이동통신서비스 기술이 서비스 속도 측면에서의 차별화로 인하여 이동 통신 단말기 구축 기술 스펙트럼이 다양하게 확대되어감에 따라 이를 지원하는 기술 사이에 호환성에 대한 필요성이 대두되고 있으며, 이를 지원할 기술로 소프트웨어에 의한 단말기 형상의 재구성을 고려하게 되었다. 이를 Software Defined Radio(SDR)라고 하며, SDR의 핵심을 이루는 기술 중의 하나로 소프트웨어 다운로드 기술이 요구된다. SDR Forum에서 소프트웨어 다운로드 기술을 표준화하기 위한 작업이 진행되고 있으나 아직 확정된 바가 없다. 소프트웨어 다운로드 중에서도 global roaming의 기반이 되는 Over-the-air(OTA)에 의한 형상 재구성 방안은 각 단말기가 갖는 다양성과 다운로드 과정의 복잡성으로 인하여 요구사항을 정하는 것이 쉽지 않다. 이에 다운로드 프로토콜의 진화와 변경을 고려하여, 소프트웨어의 구조와 다운로드 프로토콜을 제시한다.

Privacy Weakness Analysis of Delegation-Based Authentication Protocol (위임기반 인증 프로토콜의 프라이버시 취약성 분석)

  • Youn, Taek-Young;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.53-57
    • /
    • 2010
  • Recently, Lee et al. proposed a delegation-based authentication protocol for secure and private roaming service in global mobility networks. In this paper, we show that the protocol cannot protect the privacy of an user even though the protocol provides the user anonymity. To prove the weakness, we show that the protocol cannot provide the unlinkability and also examine the weakness of the protocol caused by the lack of the unlinkability.

Performance Evaluation of Advanced Container Security Device(ACSD) system based on IoT(Internet of Things) (IoT 기반 컨테이너 보안 장치 및 시스템 성능 평가)

  • Moon, Young-Sik;Choi, Sung-Pill;Lee, Eun-Kyu;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2183-2190
    • /
    • 2013
  • Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and status information about container are transmitted to a remote server using IoT (Internet of Things) based communication. In this research, we are looking into the development trend of global container security devices; and applying ConTracer to real freight transport from domestic to overseas using Global Roaming Service which is offered for domestic Mobile Communication Companies as well. As a result, we estimate the performance of ConTracer and verify it.

Network Evolution Stages and Characteristics of LTE/LTE-Advanced Systems (LTE/LTE-Advanced 네트워크 발전단계 및 특성 - Network and Protocol Architectures)

  • Kim, Jeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.6
    • /
    • pp.71-76
    • /
    • 2012
  • Recently, the huge growth of mobile data traffic has driven the earlier commercialization of LTE network and the evolution of LTE-Adv has been accelerated because of this trend of mobile traffic surges. Thus it has enabled the global connectivity and roaming capability due to continual standardization activities. The 3rd generation mobile communication system has been improved through incorporating technologies of HSDPA, MBMS and HSUPA etc continuously. Also, OFDMA/SC-FDMA-based LTE standardization has been under way. In this paper, the architectures of LTE network and protocol have been introduced and their inherent operation mechanisms have also been explored in order to give some insights about the LTE/LTE-Adv networks while their architectures are considered as most prominent candidate for worldwide standard by ITU-R and mobile operators for international communication networks.

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.

Design of Authentication Protocol for IMT-2000 (IMT-2000 인증 프로토콜 설계)

  • Gang, Hyeong-U;Yun, Lee-Jung;Lee, Su-Yeon;Park, Chang-Seop;Lee, Dong-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2133-2144
    • /
    • 1999
  • IMT-2000 system is expected to start its service at the beginning of 2000 on the purpose of providing with the highest qualitative service through one mobile terminal. In this paper, we investigate some of the important issues which need to be addresses in designing an authentication protocol for IMT-2000. Also proposed is an authentication protocol which addresses the above issues, and we design a correct and efficient authentication protocol to establish secure communication channel. Our protocol provides an authentication of the communication entities, location privacy, and secure messaging as well as global roaming service.

  • PDF

Design of Wireless LAM Authentication Mechanism for Fast Handoff Service based on PKI (공개키 기반구조에서 빠른 핸드오프를 위한 무선랜 인증 기법 설계)

  • 정종민;이주남;이구연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.45-55
    • /
    • 2003
  • Wireless LAM has the advantage of extension, flexibility and easiness of installation and maintenance. However, due to the characteristics of wireless media, it is vulnerable to security attacks. PKI(Public Key Infrastructure) is estimated to be a good solution offering security function to wireless LAM including global roaming. It offers high security functions as authentication confidentiality and digital signature while it generates big overheads such as CRL search and certificate verification. The overheads can not be avoided during the initial authentication. However, when we consider the case of handoff, it can be minimized through the fast handoff. In this paper, we design a fast handoff authentication mechanism based on PKI in the wireless LAM and analyze the performance of the scheme.

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Global Wireless LAN Roaming Status in Korea and Its Development Methods (국내 글로벌 무선랜 로밍 구축 현황 및 발전 방안)

  • Wang, Gicheol;Cho, Jinoh;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.15-21
    • /
    • 2015
  • Due to the appearance of various mobile terminals like smartphone, smartpad, and smartwatch and tremendous development of WiFi technology, data utilization rate on WiFi network is significantly increasing. As a result, users are wanting to use WiFi network using only a simple identification at a visited place as if they are at their home institute. In this paper, we review the domestic status of eduroam service which supports global extension of wireless network access environment and present the future development perspective of the service in Korea. Besides, we shed light on the current status of WiFi sharing service between domestic universities and propose some methods to facilitate the join of domestic universities in eduroam service.

A Secure Protocol for Contents Service in IMT-2000 (IMT-2000 기반 컨텐츠 서비스를 위한 보안 프로토콜)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.241-252
    • /
    • 2003
  • IMT-2000 appeared in order to satisfy the desires of the uses who wish to supply through wireless most of the services being provided through wire, such as Internet services and multimedia high-speed data information. However, during global roaming, the signal data and the user data get transmitted through the networks of other users. Also, it is judged that with the provision of high speed data communication the amount of data communication necessary for confidentiality protection will increase. It is planned that the recent IMT-2000 Project will begin its commercial service in 2002. From this viewpoint, wireless contents, due to their special characteristics, are greatly exposed to illegal actions by third persons. As a result, it can be said that security and certification issues in the mobile telecommunication environment are indispensable matters. For this purpose, it is intended that in this thesis through an analysis of the existent IMT-2000 certification method, a more safe and efficient authentication method is presented and, at the same time, a security protocol necessary in the provision of wireless contents is designed.