• Title/Summary/Keyword: session security

Search Result 375, Processing Time 0.023 seconds

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

A Study on the Housing Environment in Farms for Practical Field Training of Young Farmers Focusing on the Farms for Practical Field Training of Korea National College of Agriculture and Fisheries (청년농업인의 현장실습장 주거환경에 관한 연구 -한국농수산대학 장기현장실습장을 중심으로-)

  • Joo, J.S.;Hwang, I.U.;Kim, J.S.;Kim, S.D.;Song, C.Y.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.20 no.1
    • /
    • pp.125-143
    • /
    • 2018
  • The study consisted of a survey of the residential satisfaction level of the 3rd grade students and a survey of accessibility from farms for practical field training to public facilities. According to the geographical location of the farms on the map, the average distance to facilities related to convenience or safety and health that students complained was about 12km. And that to social and public facilities was about 4.4km. Students pointed out the convenience of using transportation, commercial and convenient facilities, and the safety of anti-crime security facilities as complaints during the practice session. Residential satisfaction levels in five realms, such as facility and structure, convenience, safety, comfort and sociality, were not all reached at the satisfaction level. In particular, the satisfaction level of female students was sub-normal in the safety and convenience realms. The average satisfaction levels reviewed by department were sub-normal for horse industry and floriculture departments. By residential patterns, satisfaction with sharing with the farmers was higher than with other patterns. And satisfaction level by housing structure was much lower in the assembly and container structures Since residential satisfaction level is determined by the inside and outside environment of the dwelling, college should provide students with accurate and vivid data using information communication technologies.

EU's Space Code of Conduct: Right Step Forward (EU의 우주행동강령의 의미와 평가)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.211-241
    • /
    • 2012
  • The Draft International Code of Conduct for Outer Space Activities officially proposed by the European Union on the occasion of the 55th Session of the United Nations Peaceful Uses of the Outer Space last June 2012 in Vienna, Austria is to fill the lacunae of the relevant norms to be applied to the human activities in the outer space and thus has the merit our attention. The missing elements of the norms span from the prohibition of an arms race, safety and security of the space objects including the measures to reduce the space debris to the exchange of information of space activities among space-faring nations. The EU's initiatives, when implemented, cover or will eventually prepare for the forum to deal with such issues of interests of the international community. The EU's initiatives begun at the end of 2008 included the unofficial contacts with major space powers including in particular the USA of which position is believed to have been reflected in the Draft with the aim to have it adopted in 2013. Although the Code is made up of soft law rather than hard law for the subscribing countries, the USA seems to be afraid of the eventuality whereby its strategic advantages in the outer space will be affected by the prohibiting norms, possibly to be pursued by the Code from its current non-binding character, of placing weapons in the outer space. It is with this trepidation that the USA has been opposing to the adoption of the United Nations Assembly Resolutions on the prevention of an arms race in the outer space (PAROS) and in the same context to the setting-up of a working group on the arms race in the outer space in the frame of the Conference on Disarmament. China and Russia who together put forward a draft Treaty on Prevention of the Placement of Weapons in Outer Space and of the Threat or Use of Force against Outer Space Objects (PPWT) in 2008 would not feel comfortable either because the EU initiatives will steal the lime light. Consequently their reactions are understandably passive towards the Draft Code while the reaction of the USA to the PPWT was a clear cut "No". With the above background, the future of the EU Code is uncertain. Nevertheless, the purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security, all to maximize the principle of the peaceful use and exploration of the outer space is the laudable efforts on the part of EU. When the detailed negotiations will be held, some problems including the cost to be incurred by setting up an office for the clerical works could be discussed for both efficient and economic mechanism. For example, the new clerical works envisaged in the Draft Code could be discharged by the current UN OOSA (Office for Outer Space Affairs) with minimal additional resources. The EU's initiatives are another meaningful contribution following one due to it in adopting the Kyoto Protocol of 1997 to the UNFCCC (UN Framework Convention on the Climate Change) and deserve the praise from the thoughtful international community.

  • PDF

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.