• Title/Summary/Keyword: 검증서버

Search Result 787, Processing Time 0.028 seconds

Design and Implementation of a Request and Response Process on Help-Requesting Mobile Application (모바일 도움요청 어플리케이션에서의 요청 및 상호 대응 프로세스 설계)

  • An, Sung-Eun;Lim, Soon-Bum;Kim, Min-Jeong;You, Soo-Yeon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.320-326
    • /
    • 2015
  • With the growing concern over frequent occurrences of criminal events, help-requesting mobile applications have drawn attention. However, existing applications solely focus on providing help-requesting services. Therefore, in this paper, we design and implement a help request and response process which allows users to request help by sending messages and locating their friends, acquaintances and even near-by application users, and to allow help be reached by forwarding messages. This application is composed of three parts: help-requesting, help-responding, and checking-status. This application is developed on the Android platform where we exchange users' longitude and latitude through web server communication. We conducted test to verify the effectiveness of the forwarding function, and it has been confirmed that 93.33% of subjects used the forwarding function to help users at risk.

A Timestamp Tree-based Cache Invalidation Report Scheme in Mobile Environments (모바일 환경에서 타임스탬프 트리 기반 캐시 무효화 보고 기법)

  • Jung, Sung-Won;Lee, Hak-Joo
    • Journal of KIISE:Databases
    • /
    • v.34 no.3
    • /
    • pp.217-231
    • /
    • 2007
  • Frequent disconnection is connected directly to client's cache consistency problem in Mobile Computing environment. For solving cache consistency problem, research about Invalidation Report is studied. But, existent invalidation report structure comes with increase of size of invalidation report structure and decline of cache efficiency if quantity of data become much, or quantity of updated data increases. Also, while existent method confirms whole cache, invalidation report doesn't support selective listening. This paper proposes TTCI(Timestamp Tree-based Cache Invalidation scheme) as invalidation report structure that solve problem of these existing schemes and improve efficiency. We can make TTCI using timestamp of updated data, composing timestamp tree and list ID of data in updated order. If we utilize this, each client can confirm correct information in point that become own disconnecting and increase cache utilization ratio. Also, we can pare down client's resources consumption by selective listening using tree structure. We experimented in comparison with DRCI(Dual-Report Cache Invalidation) that is existent techniques to verify such efficiency of TTCI scheme.

Embedded System Design of Automotive Media Server Platform with the MOST Interface (MOST 인터페이스를 갖는 차량용 미디어 서버 플랫폼에 대한 임베디드 시스템 설계)

  • Kwak, Jae-Min;Park, Pu-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.262-267
    • /
    • 2006
  • For growing need for the multimedia application in the vehicles, the MOST protocol has been focused on. The MOST protocol supports three kinds of communication modes; short control message, asynchronous packets, and reserved synchronous stream data. Because of a variety of transportation, the MOST is suitable for various applications in vehicle environment. In this paper, we implemented embedded system which is MOST-enabled AMS platform and tested the network communication operation through the control port and the synchronous channel of the source port. We implemented the prototype platforms which communicate each other on the MOST's POF network. Moreover we implemented the DivX decoder attached AMS platform and verified the operation by transferring the video stream and the control messages through the MOST network.

  • PDF

Implementation of Simulation System for Performance Analysis of CDN based on Mobile P2P (모바일 P2P 기반의 CDN의 성능 평가를 위한 시뮬레이션 시스템 구축)

  • Kim, Yu-Doo;Moon, Il-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.411-413
    • /
    • 2010
  • Now, smart phone markets are grows quickly. So it is needed research of CDN(Contents Delivery Network) technology for contents transmission in mobile networks. Especially the services of smart phone are focused on open platform model. So P2P(Peer to Peer) protocols will be used for mobile network because it is a distributed network architecture composed of participants that make a portion of their resources directly available to other network participants, without the need for a central server. Current research of P2P protocols for mobile network are not activated. The reason is appropriate in the mobile P2P network simulation environment, since it is not provided. So, in this paper we design a mobile P2P simulation system for CDN based on mobile P2P.

  • PDF

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

Cooperative Video Streaming and Active Node Buffer Management Technique in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.11-19
    • /
    • 2019
  • Recently, hybrid CDN/P2P video streaming architecture is specially designed and deployed to achieve the scalability of P2P networks and the desired low delay and high throughput of CDNs. In this paper, we propose a cooperative video streaming and active node buffer management technique in hybrid CDN/P2P architecture. The key idea of this streaming strategy is to minimize network latency such as jitter and packet loss and to maximize the QoS(quality of service) by effectively and efficiently utilizing the information sharing of file location in CDN's proxy server which is an end node located close to a user and P2P network. Through simulation, we show that the proposed cooperative video streaming and active node buffer management technique based on CDN and P2P network improves the performance of realtime video streaming compared to previous methods.

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.

A Study on the Reliability Verification of Real-time Railway Safety Integrated Monitoring and Control System (실시간 철도안전 통합 감시제어시스템 신뢰성 검증에 관한 연구)

  • Son, Sang-Hyun;Kim, Sang-Ahm;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.83-89
    • /
    • 2021
  • With the recent development of information and communication technology, there have been many attempts to apply various IT technologies in the railway field. Until now, the safety control system has been installed at the site and operated using actual data, but there is a problem that it is difficult to verify the function of the railway safety control system in that no accidents occur in real situations. In this study, accident data is generated randomly to verify that the safety control system is functioning properly, and to this end, simulation data is prepared according to the simulator, accident scenario and scenario. Real-time railway safety monitoring system collects and transmits data from interface devices to common protocol called DDS.

Object Detection and Optical Character Recognition for Mobile-based Air Writing (모바일 기반 Air Writing을 위한 객체 탐지 및 광학 문자 인식 방법)

  • Kim, Tae-Il;Ko, Young-Jin;Kim, Tae-Young
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.5
    • /
    • pp.53-63
    • /
    • 2019
  • To provide a hand gesture interface through deep learning in mobile environments, research on the light-weighting of networks is essential for high recognition rates while at the same time preventing degradation of execution speed. This paper proposes a method of real-time recognition of written characters in the air using a finger on mobile devices through the light-weighting of deep-learning model. Based on the SSD (Single Shot Detector), which is an object detection model that utilizes MobileNet as a feature extractor, it detects index finger and generates a result text image by following fingertip path. Then, the image is sent to the server to recognize the characters based on the learned OCR model. To verify our method, 12 users tested 1,000 words using a GALAXY S10+ and recognized their finger with an average accuracy of 88.6%, indicating that recognized text was printed within 124 ms and could be used in real-time. Results of this research can be used to send simple text messages, memos, and air signatures using a finger in mobile environments.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.