• Title/Summary/Keyword: multiple session

Search Result 170, Processing Time 0.022 seconds

Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

  • Tan, Zuowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.8
    • /
    • pp.1982-1997
    • /
    • 2012
  • Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.

A Resource Allocation Method for Supporting Multiple Sessions in a Mobile Terminal during Handover (핸드오버 시 이동 단말기에서 다중 세션 지원을 위한 자원 할당 방안)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.57-66
    • /
    • 2012
  • LTE-Advanced network will form the high-speed IP backbone in collaboration with heterogeneous radio access networks for dynamic optimized resource utilization. In order to implement more innovative and attractive services such as U-Cloud streaming, LBS and mobile smart TV, a mobile terminal needs to support multiple sessions simultaneously. Efficient resource allocation schemes are necessary to maintain QoS of multiple sessions because service continuity may be defected by delay and information loss during handover. This paper proposes a resource allocation scheme to accommodate multiple sessions in a mobile terminal on handover period based on session priority mechanism. Simulation is focused on the forced termination probability of handover sessions. Simulation results show that our proposed method provides a better performance than the conventional method.

A Framework for Continuous Real-time Collaborative Editing (지속적인 실시간 공동 편집을 위한 프레임워크 개발)

  • Sohn, Kyu-Seek;Lee, Soo-Dong;Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1049-1056
    • /
    • 2011
  • In the field of document editing, a real-time collaborative editing that multiple users edit a same document simultaneously has been actively studied. The co-editing session should be kept for the synchronization about the changes during the real-time collaborative editing of documents among the participants. If the session ends during collaborative editing, they wouldn't be able to continue co-editing anymore. The purpose of this study is to develop a framework for Continuous Real-time Collaborative Editing that disconnects the session in unintended situations. Participants should be able to terminate editing at any time in opened co-editing session, and certain participant is able to disconnected because of unstable networks. In this case, the editing session should be maintained without termination.

Surgery for Bilateral Large Intracranial Traumatic Hematomas : Evacuation in a Single Session

  • Kompheak, Heng;Hwang, Sun-Chul;Kim, Dong-Sung;Shin, Dong-Sung;Kim, Bum-Tae
    • Journal of Korean Neurosurgical Society
    • /
    • v.55 no.6
    • /
    • pp.348-352
    • /
    • 2014
  • Objective : Management guidelines for single intracranial hematomas have been established, but the optimal management of multiple hematomas has little known. We present bilateral traumatic supratentorial hematomas that each has enough volume to be evacuated and discuss how to operate effectively it in a single anesthesia. Methods : In total, 203 patients underwent evacuation and/or decompressive craniectomies for acute intracranial hematomas over 5 years. Among them, only eight cases (3.9%) underwent operations for bilateral intracranial hematomas in a single session. Injury mechanism, initial Glasgow Coma Scale score, types of intracranial lesions, surgical methods, and Glasgow outcome scale were evaluated. Results : The most common injury mechanism was a fall (four cases). The types of intracranial lesions were epidural hematoma (EDH)/intracerebral hematoma (ICH) in five, EDH/EDH in one, EDH/subdural hematoma (SDH) in one, and ICH/SDH in one. All cases except one had an EDH. The EDH was addressed first in all cases. Then, the evacuation of the ICH was performed through a small craniotomy or burr hole. All patients except one survived. Conclusion : Bilateral intracranial hematomas that should be removed in a single-session operation are rare. Epidural hematomas almost always occur in these cases and should be removed first to prevent the hematoma from growing during the surgery. Then, the other hematoma, contralateral to the EDH, can be evacuated with a small craniotomy.

Multi-Rate TCP Video Streaming for Client Heterogeneity (이종 클라이언트들을 위한 멀티레이트 TCP 비디오 스트리밍에 관한 연구)

  • Jung, Young-H.;Choe, Yoon-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3B
    • /
    • pp.144-151
    • /
    • 2008
  • In this paper, we propose a video streaming server that guarantees a certain level of quality when a server should serve video streaming service to multiple heterogenous clients simultaneously with TCP transport. If each heterogeneous client requests video streaming service in according to its own requirement such as bitrate of content and these requests are accepted by a server, then TCP flows for each video streaming session fairly share limited uplink bandwidth of the server. At this time, because TCP's bandwidth fair-share characteristics can result in bandwidth shrinkage of higher bitrate video streaming session, the client of higher bitrate video may suffer sluggish playback which is related with streaming QoS degradation. To tackle this problem, our proposed server system uses multiple TCP connections adaptively for each video streaming session depending on the anticipated status of the client playout buffer. Simulation results show that our proposed algorithm can successfully reduce the occurrence of playout buffer underrun and enhance streaming quality for whole video clients.

The User Terminal Registration Method in Proximity Using the Virtual ISIM for Providing Service Continuity (가상 ISIM을 통한 서비스 연속성 제공을 위한 근접 단말 등록 방법)

  • Yim, Jong-Choul;Kim, Sang-Ha;Keum, Chang-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.529-540
    • /
    • 2015
  • The NGN should support an ubiquitous environment in which users can use multiple devices. Especially, services should be provided to users in a seamless manner across multiple devices which are dynamically found in users' vicinity. Therefore, supporting service continuity is essential in the NGN. Currently the IMS, which is a session control layer for the NGN, deals with session control procedures in detail for service continuity. However, the IMS provides limited methods how users can find target terminals for transferring the session. The target terminals tend to be located near in user's physical location, and could be shared among different users. For providing better service experience in the NGN, The NGN needs to encompass methods to enable for users to use the dynamically-found terminals in users' vicinity seamlessly. In this paper, we introduce a novel registration method based on virtual ISIM by which the target terminals in user's vicinity can register themselves to the IMS, and also we discuss how service continuity is supported.

Multi-Objective Handover in LTE Macro/Femto-Cell Networks

  • Roy, Abhishek;Shin, Jitae;Saxena, Navrati
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.578-587
    • /
    • 2012
  • One of the key elements in the emerging, packet-based long term evolution (LTE) cellular systems is the deployment of multiple femtocells for the improvement of coverage and data rate. However, arbitrary overlaps in the coverage of these femtocells make the handover operation more complex and challenging. As the existing handover strategy of LTE systems considers only carrier to interference plus noise ratio (CINR), it often suffers from resource constraints in the target femtocell, thereby leading to handover failure. In this paper, we propose a new efficient, multi-objective handover solution for LTE cellular systems. The proposed solution considers multiple parameters like signal strength and available bandwidth in the selection of the optimal target cell. This results in a significant increase in the handover success rate, thereby reducing the blocking of handover and new sessions. The overall handover process is modeled and analyzed by a three-dimensional Markov chain. The analytical results for the major performance metrics closely resemble the simulation results. The simulation results show that the proposed multi-objective handover offers considerable improvement in the session blocking rates, session queuing delay, handover latency, and goodput during handover.

Post-quantum identity-based authenticated multiple key agreement protocol

  • Yang Yang;Hongji Yuan;Linbo Yan;Yinglan Ruan
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1090-1102
    • /
    • 2023
  • Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that are vulnerable to quantum algorithms. Lattice cryptography provides quantum resistance to authenticated key agreement protocols, but the certificate always incurs excessive public key infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed that removes this overhead. To answer this need, we provide a two-party lattice- and identity-based AMKA scheme based on bilateral short integer or computational bilateral inhomogeneous small integer solutions, and we provide a security proof based on the random oracle model. Compared with existing AMKA protocols, our new protocol has higher efficiency and stronger security.

Pairwise Key Agreement Protocols Using Randomness Re-use Technique (난수 재사용 기법을 이용한 다중 키 교환 프로토콜)

  • Jeong, Ik-Rae;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.949-958
    • /
    • 2005
  • In the paper we study key agreement schemes when a party needs to establish a session key with each of several parties, thus having multiple session keys. This situation can be represented by a graph, tailed a key graph, where a vertex represents a party and an edge represents a relation between two parties sharing a session key. graphs to establish all session keys corresponding to all edges in a key graph simultaneously in a single session. A key agreement protocol of a key graph is a natural extension of a two-party key agreement protocol. We propose a new key exchange model for key graphs which is an extension of a two-party key exchange model. using the so-called randomness re-use technique which re-uses random values to make session keys for different sessions, we suggest two efficient key agreement protocols for key graphs based on the decisional Diffie-Hellman assumption, and prove their securities in the key exchange model of key graphs. Our first scheme requires only a single round and provides key independence. Our second scheme requires two rounds and provides forward secrecy. Both are proven secure In the standard model. The suggested protocols are the first pairwise key agreement protocols and more efficient than a simple scheme which uses a two-party key exchange for each necessary key. Suppose that a user makes a session key with n other users, respectively. The simple scheme's computational cost and the length of the transmitted messages are increased by a factor of n. The suggested protocols's computational cost also depends on n, but the length of the transmitted messages are constant.

Supporting Service Continuity in Ubiquitous Network Environment with IMS Extension (IMS 확장을 통한 유비쿼터스 네트워크 환경에서의 서비스 연속성 지원)

  • Yim, Jong-Choul;Bae, Hyun-Joo;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1148-1159
    • /
    • 2012
  • It is of great significance in the NGN - which supports a ubiquitous network environment in which users can use multiple devices and all the devices are connected to networks - to support the terminal mobility as well as service continuity. The IMS architecture, which is considered as session control layer in the NGN, exists to support a wide range of advanced new services in addition to the traditional voice and data connectivity offerings of "old" telecommunications. The recent IMS specification also defines IUT (Inter UE Session Transfer) functionality in order to support service continuity in the NGN. However, service continuity in IMS has a limitation that two terminals involved in session transfer should belong to the same user. In this paper, we proposed a new device discovery mechanism for IMS and extended UEs with a few capabilities to overcome some of IMS's limitations. We also analysed how much overhead of the proposed method in terms of signaling cost will be.