DOI QR코드

DOI QR Code

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network

무선랜 메쉬 네트워크에서의 효율적인 멀티미디어 서비스를 위한 보안 정량화 기반의 프레임워크 연구

  • Shin, Myoung-Sub (Graduate School of Information Management and Security, Korea University) ;
  • Lim, Sun-Hee (Graduate School of Information Management and Security, Korea University) ;
  • Yi, Ok-Yeon (Department of Mathematics, Kookmin University) ;
  • Lim, Jong-In (Graduate School of Information Management and Security, Korea University)
  • 신명섭 (고려대학교 정보경영공학전문대학원) ;
  • 임선희 (고려대학교 정보경영공학전문대학원) ;
  • 이옥연 (국민대학교 자연과학대학 수학과) ;
  • 임종인 (고려대학교 정보경영공학전문대학원)
  • Published : 2008.03.31

Abstract

Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.

최근 급격하게 사용이 증가되고 있는 멀티미디어 서비스는 QoS를 만족하기 위하여 네트워크의 속도, 잡음 환경, 단말의 계산 능력, 컨텐츠 종류 등을 기반으로 멀티미디어 데이터를 변환, 전송한다. 멀티미디어 서비스에서 정보 보호를 위해 중간 수준의 단일한 보안 서비스만을 제공하거나 단말의 계산 능력 및 컨텐츠 종류에 따라 서비스 제공자 정책에 기반한 보안 메커니즘을 제공한다. 안전한 멀티미디어 서비스를 지원하기 위해 응용 계층의 보안과 네트워크 보안 메커니즘을 연구하여 보다 효과적인 멀티미디어 서비스를 위한 보안 메커니즘을 지원할 수 있다. 본 논문은 확장성과 경제성을 향상시킨 무선랜 메쉬 네트워크에서의 보안 수준, 침해 수준에 대한 효용 함수와 누적 보정 모델을 기반으로 멀티미디어 서비스 제공자가 단말의 계산 능력 및 컨텐츠의 종류 이외의 무선랜 메쉬 네트워크에서의 정량화된 보안 수준을 고려하여 멀티미디어 서비스의 보안 메커니즘을 결정하는 프레임워크를 정의 한다.

Keywords

References

  1. International Telecommunication Union (ITU), Security Architecture for Open Systems Interconnection for CCIT Applications, Recommendation ITU-T X.800, ITU, Geneva, 1991
  2. International Organization for Standardization (ISO), Information Processing Systems - Open Systems Interconnection - Part 2: Security Architecture, ISO/IEC 7498-2, ISO, Geneva, 1989
  3. Akyildiz, I.F., Wang, X. and Wang, W., 'Wireless Mesh Networks: A Survey,' Computer Networks Journal (Elsevier), Vol. 47, pp. 445-487, March 2005 https://doi.org/10.1016/j.comnet.2004.12.001
  4. W.Steven Conner, Jan Kruys, Kyeongsoo Kim, Juan Carlos Zuniga, 'IEEE 802.11s Tutorial; Overview of the Amendment for Wireless Local Area Mesh Networking.' IEEE 802 Plenary, November 2006
  5. IEEE Standard 802.11i, 'Wireless LAN Medium Access Control and Physical Layer specification: Medium Access Control (MAC) Security Enhancements,' July. 2004
  6. RFC 3748, 'Extensible Authentication Protocol(EAP),' June 2004
  7. IEEE 802.l x, 'IEEE Standard for Local and Metropolitan area networks-Port-Based Network Access Control,' 2001
  8. Avesh K. Agarwal, Wenye Wang, 'On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility,' Springer Mobile Network Application, Vol. 12, pp. 93-110, November 2006
  9. Stedano M. Faccion, Carl W Ijting, Jarkko Kneckt, Ameya Damle, 'Mesh WLAN Networks: Concept and System Design,' IEEE Wireless communication, Vol. 13, pp. 10-17, April, 2006 https://doi.org/10.1109/MWC.2006.1632476
  10. Kimaya Sanzgiri, Daniel Laflamme, Bridget Dahill, 'Authenticated Routing for Ad hoc Networks,' In journal on Selected Areas in Communication, Vol. 23. pp. 598-610, March 2005 https://doi.org/10.1109/JSAC.2004.842547
  11. Yih-Chun Hu, David B. Johnson, Adrian Perrig, 'Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,' In proceedings of the 4th IEEE workshop on Mobile Computing Systems and Application, Vol. I, pp.175-192, July 2003
  12. Atul Puri, Xuemin Chen. Ajay Luthra, 'Video coding using the H.264/MPEG-4 AVC compression standard,' Signal Processing: Image Communication Vol. 19, No. 99, pp. 793-839, October 2004 https://doi.org/10.1016/j.image.2004.06.003
  13. L.Tang, 'Methods for Encrypting and Decrypting MPEG Video Data Efficiently,' Proceeding of ACM International Multimedia Conference and Exhibition, pp. 219-229, Noberber 1996
  14. Guang Ming Hong. Chun Yuan, Yi Wang, Yu Shuo Zhong, 'A Quality Controllable Encryption for H.264/ AVC Video Coding,' Advances in Multimedia Information Processing PCM 2006, Vol. 2461, pp. 510-517, October 2006
  15. Tuo Shi, Brian King, and Paul Salama, 'Selective Encryption for H.264/ AVC Video Coding,' the Society of Photo-Optical Instrumentation Engineers, Vol. 6072, pp. 461-469, Feb, 2006
  16. Chui Sian Ong, Klara Nahrstedt and Wanghong Yuan, 'Quality of Protection for mobile multimedia Application,' in ICME 2003, Vol.2, pp. 137-140, July 2003
  17. Martin Prangl, Tibor Szkaliczki, Hermann Hellwagner, 'A Framework for Utility-Based Multimedia Adaptation,' IEEE Trans. on circuits and systems for video technology, Vol. 17, pp. 719-728, June 2007 https://doi.org/10.1109/TCSVT.2007.896650