• Title/Summary/Keyword: ip

Search Result 6,899, Processing Time 0.036 seconds

Conversational Quality Measurement System for Mobile VoIP Speech Communication (모바일 VoIP 음성통신을 위한 대화음질 측정 시스템)

  • Cho, Jae-Man;Kim, Hyoung-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.71-77
    • /
    • 2011
  • In this paper, we propose a conversational quality measurement (CQM) system for providing the objective QoS of high quality mobile VoIP voice telecommunication. For measuring the conversational quality, the VoIP telecommunication system is implemented in two smart phones connected with VoIP. The VoIP telecommunication system consists of echo cancellation, noise reduction, speech encoding/decoding, packet generation with RTP (Real-Time Protocol), jitter buffer control and POS (Play-out Schedule) with LC (loss Concealment). The CQM system is connected to a microphone and a speaker of each smart phone. The voice signal of each speaker is recorded and used to measure CE (Conversational Efficiency), CS (Conversational Symmetry), PESQ (Perceptual Evaluation of Speech Quality) and CE-CS-PESQ correlation. We prove the CQM system by measuring CE, CS and PESQ under various SNR, delay and loss due to IP network environment.

Design of User Access Authentication and Authorization System for VoIP Service (사용자 접근권한 인증을 이용한 안전한 VoIP 시스템 설계)

  • Yang, Ho-Kyung;Kim, Jin-Mook;Ryou, Hwang-Bin;Park, Choon-Sik
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • VoIP is a service that changes the analogue audio signal into a digital signal and then transfers the audio information to the users after configuring it as a packet; and it has an advantage of lower price than the existing voice call service and better extensibility. However, VoIP service has a system structure that, compared to the existing PSTN (Public Switched Telephone Network), has poor call quality and is vulnerable in the security aspect. To make up these problems, TLS service was introduced to enhance the security. In practical system, however, since QoS problem occurs, it is necessary to develop the VoIP security system that can satisfy QoS at the same time in the security aspect. In this paper, a user authentication VoIP system that can provide a service according to the security and the user through providing a differential service according to the approach of the users by adding AA server at the step of configuring the existing VoIP session is suggested. It was found that the proposed system of this study provides a quicker QoS than the TLS-added system at a similar level of security. Also, it is able to provide a variety of additional services by the different users.

  • PDF

A Study of VoIP Encryption and Authentication Technologies in 4G WiBro Services (4G WiBro서비스에서 VoIP 암호화와 인증기술 연구)

  • Baek, Jong-Il;Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.291-294
    • /
    • 2011
  • 4G WiBro service in Korea, the world's fourth-generation communication is standardized. VoIP service has been activated one of the application in WiBro communications infrastructure. When using VoIP in the WiBro service, complementing the existing VoIP vulnerabilities in the encryption and authentication technology is a need for research. In this paper, fourth-generation WiBro, LTE, and the definition, 1G, 2G, 3G and 4G compares. And, WiBro service in the VoIP edaehan technical, administrative, physical, and hacker attacks and vulnerability analysis is the study of security measures. Enhanced security measures for the WiBro service to VoIP security through encryption and authentication technologies are studied.

  • PDF

Effect of Molecular Weights and Mixture Ratios of Polyvinylpyrrolidone on the Bioavailability of Ipriflavone Solid Dispersion (이프리플라본 고체분산체의 생체이용률에 미치는 폴리비닐피롤리돈의 분자량 및 혼합비율의 영향)

  • Jeong, Je-Kyo;Khang, Gil-Son;Rhee, John-M.;Shin, Ho-Chul;Lee, Hai-Bang
    • Journal of Pharmaceutical Investigation
    • /
    • v.30 no.4
    • /
    • pp.235-239
    • /
    • 2000
  • Ipriflavone (3-phenyl-7-isopropoxy-4H-1-benzopyran-4-one, IP) is a well-known antiosteoporotic drug with poor bioavailability. In the previous study, we reported that the IP formulation prepared by spray-drying method with polyvinylpyrrolidone (PVP) (SIP) was very effective in improving the bioavailability of IP. In this study, we examined the effects of molecular weight and mixture ratios of PVP to IP on the systemic absorption of IP following oral administration of SIP at a dose of 50 mg/kg to rats. In the effect of molecular weight, the Cmax of spray-dried IP with PVP K30 (SIP-K30) was significantly higher than those of spray-dried IP with PVP 360 (SIP-360), spray-dried IP with PVP K90 (SIP-K90), and spray-dried IP with PVP K17 (SIP-K17) (p<0.05). The AUC of SIP-K30 was about 2, 3, and 5.5 times higher than those of SIP-360, SIP-K90, and SIP-K17, respectively. The AUC value of SIP-K30 was significantly greater than those of SIP-K17 and SIP-K90 (p<0.05) except for SIP-360. In the ratio of PVP K30 to drug, the $C_{max}$ and the AUC value of 3 : 7 IP-PVP solid dispersion were similar to those of 5 : 5 IP-PVP and significantly higher than those of the other solid dispersions (p<0.05). It was concluded that the spray-dried IP with PVP K30 at the ratio of 3:7 (w/w) was the best formulation for improving the bioavailability of IP.

  • PDF

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

An IP Based Transcript System in VoIP Network (VoIP망에서 IP기반 녹취 시스템 설계 및 구현)

  • Son Min-ho;Kim Soo-hee;Kim Young-ung;Jung In-hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.898-900
    • /
    • 2005
  • 초고속 통신망의 확대 적용으로 인터넷의 빠른 성장과 함께 음성과 비디오 그리고 데이터를 통합하고자 하는 노력이 시도 되고 있다. VoIP(Voice over IP)는 IP를 이용하여 음성과 데이터를 패킷 형태로 통합하여 실시간으로 전송하는 기술이다[1]. 패킷 네트워크에서 VoIP 시그널링 기술을 이용하면 망 자원의 효율적 이용 및 PSTN에 가까운 음질 그리고 인터넷과 연계한 다양한 음성서비스 지원(H.323, SIP, MGCP 등 다양한 신호처리 지원)이 가능하다. 본 논문에서는 VoIP망에서 IP기반 녹취 시스템을 설계 및 구현한다. 녹취 시스템은 고객과 상담원의 통화 내용을 자동으로 녹음하여 보관함으로써 고객의 요구사항을 명확히 파악할 수 있으며 녹취 데이터의 통계 자료 제공으로 효율적인 관리가 지원되고 선택 녹취, 스케줄링 녹취, 상담원의 평가 자료를 제공하여 고객 관리의 질적인 향상을 지원한다. 본 논문의 녹취 시스템은 고객과의 통화 내용을 녹취하여 서버의 녹취 DB에 저장하여 관리하는 녹취 시스템으로 모든 네트워크 환경에서 사용할 수 있으며 CTI와 연동하여 효율적이고 체계적인 녹취 시스템 구국이 가능하다.

  • PDF

Evaluation of VoIP Service Quality under the Roaming of Mobile Terminals (이동단말의 로밍에 따른 VoIP 서비스 품질 분석)

  • Choi, Dae-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.747-752
    • /
    • 2012
  • In this paper we evaluated by simulation the effect of VoIP roaming and data traffic roaming on other VoIP calls. Regardless of MIPv4 or MIPv6, the quality of voice of all VoIP calls falls down quickly to the bottom level after the start of roaming by one voice terminal. That was caused by the excessive retransmission on downlink. Thus it seems that we need a kind of call admission control when we adopt the roaming service on VoIP calls. Data traffic degrades also the voice quality especially at the foreign agent side.

Effects of communication environment on VoIP capacity using WiFi (통신환경이 WiFi를 이용한 VoIP 서비스 용량에 미치는 영향)

  • Choi, Dae-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1327-1332
    • /
    • 2015
  • In this paper, we studied several aspects that affect the quality of VoIP using WiFi network. It's clear that the background data traffic within an AP, the end-to-end delay and the traffic loss of TCP/IP network gives serious effects on the voice quality. A kind of access control for the VoIP connection within an AP should be done for the acceptable voice quality.

A Study on Countermeasures against Messenger Phishing using ARIT Technique (ARIT 기법을 이용한 메신저 피싱 대응방안에 관한 연구)

  • Cho, Sung Kyu;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.223-230
    • /
    • 2013
  • With the rapid development of IT technologies, many people talk to each other in real time on-line using messenger or use the messenger to share files for work. However, using this convenience, phishing crimes occur: e.g. demanding money, and if a criminal uses a bypassing technique like proxy in order to hide the IP address the criminal has used to log on, it is in fact, difficult to find the criminal's real IP address. This paper will propose a plan to measure against messenger phishing that may occur in advance by collecting the IP address with which a user has used in a dual channel mode and the real IP address obtained by ARIT Agent using ARIT technique, going through a separate identification process and deciding whether the user has accessed in a normal method.