Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.1.001

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment  

Seo Dae-Hee (순천향대학교 전산학과)
Lee Im-Yeong (순천향대학교 정보기술공학부)
Abstract
Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.
Keywords
Ubiquitous Environment; Wireless Network; Network Management; PTD;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Alfred J. Menezes, Paul C.van Oorschot and Scott A. Vanstone 'HANDBOOK of APPLIED CRYPTOGRAPHY', CRC
2 이임영, '전자상거래 보안입문', 생능출판사, 2001
3 최용락, 소우영, 이재광, 이임영 '컴퓨터 통신보안', 도서출판 그린, 2001. 2
4 이송종, '유비쿼터스 네트워크 환경에 적용되는 무선기술', 한국정보과학회 춘계학술발표대회, pp.574-576, 2003
5 W. Du, J. Deng, Y.S. Han, S. Chen and P. Varshney. 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge', To appear in IEEE INFOCOM'04, March 7-11, 2004   DOI
6 M.Chen, W. Cui, V. Wen and A. Woo, 'Security and Deployment Issues in a Sensor Network' http://www.cs.sfu.ca/~angiez/personal/paper/sdissues.pdf#search='Security%20and%20Deployment%20Issues%20in%20a%20Sensor%20Network'
7 S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck and M.B. Srivastava. 'On communication Security in Wireless Ad-Hoc Sensor Network' Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE'02) June 10-12, 2002   DOI
8 L. Lymberopoulos, E. Lupu and M. Sloman, 'An Adaptive Policy Based Management Framework for Differentiated Services Networks', proceedings of the Third International Workshop on Policies for Distributed Systems and Networks, pp.147-158, 2002   DOI
9 F. Hu, Neerajk, Sharma 'Security Considerations in Wireless Sensor Networks', Sensors Expo, San jose, CA, 2004
10 D.W. Carman, B.J. Matt and G.H. Cirincione. 'Energy-efficient and Low-latency Key Management for Sensor Networks', In Proceedings of 23rd Army Science Conference. Dec., 2-5 2002
11 Ubiquitous Computing http://www.ubiq.com/hypertext/weiser/UbiHome.html
12 WAP Forum: Wireless Application Protocol Public Key Infrastructure, Version April, 2001, http://www.wapforum.org
13 http://crpit.com/confpapers/CRPITV21AZhao.pdf
14 http://www.itu.int/ITU-D/pdf/4597-13.3bis-en.pdf
15 http://www.iris.re.kr/iwapO1/program/download/g07_paper. pdf#search='Secure%20MCommerce%20with%20WPKI'
16 Project digital Signatures :http://www.law.kuleuven.ac.be/icri/projects/
17 OnIineCertificateStatusProtocol http://www.ietf.org/html.charters/tls-chater.html