• Title/Summary/Keyword: 네트워크 접근제어

Search Result 485, Processing Time 0.028 seconds

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

A Research and development of integrated Platform for data security between different smart home devices (안드로이드 기반 스마트 홈 디바이스의 통신 데이터 보안 및 통합 관리 플랫폼 연구개발)

  • Lee, Jeong-Gi;Yang, Chul-Seung;Kim, Jun-Ha;Kim, Kang-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1173-1179
    • /
    • 2015
  • In this paper is given to implements the Android-based integration platform to provide convenience for gender development and scalability , easy access for the user. Sensor-based smart home-related products have a different way of the data exchange so platform can be integrated easily and connect heterogeneous network products and external data transmission security processing for data communication and supported to enable the integration

Implementation of File Security Module Using on Windows (윈도우즈 기반 파일 보안 모듈 설계 및 구현)

  • Sung Kyung;Yoon Ho-gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.105-112
    • /
    • 2005
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, If system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

  • PDF

Interactive Remote Lecture System Based on IPv6 Multicast Services (IPv6 멀티캐스트 기반의 쌍방향 원격 강의 시스템)

  • Kang, Sung-Ho;Choo, Young-Yeol
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.295-301
    • /
    • 2006
  • The scope ID field of IPv6 multicast address indicates the zone of the destination for which a multicast traffic is intended. Without any further examination on the header field, the scope ID enables a router to determine whether the traffic will be forwarded to a subnet or not. For the graceful migration from IPv4 networks to IPv6 networks, various IPv6 applications working through IPv4 networks are indispensable during the migration period. This paper describes development of an interactive remote lecture system providing service integration on voice, image, and data of teaching materials. Access right to the network for dialog among multicast group members is controlled via additional TCP (Transmission Control Protocol) session. A jitter buffer algorithm was implemented to improve the voice communication jitters.

  • PDF

Implementation of file Access Control Module Using on Windows XP (윈도우 XP 기반의 파일 정책 모듈 설계 및 구현)

  • 성경
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1204-1211
    • /
    • 2004
  • As the development of information telecommunication technology and thus the information sharing and opening is accelerated, f system is exposed to various threatener and the avrious security incident is rasing its head with social problem. As countermeasure, to protect safely and prepare in the attack for a system from a be latent security threat, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. The module, implemented in this paper, is based on Windows XP, like Linux and Unix, and has effect integrity and non-repudiation for a file.

A Full Duplex MAC Protocol of Asymmetric Traffic Environment (비대칭 트래픽 환경에서의 전이중 MAC 프로토콜)

  • Ahn, Hyeongtae;Kim, Cheeha
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.381-386
    • /
    • 2016
  • Recently full-duplex communication in wireless networks is enabled by the advancement of self-interference cancellation technology. Full-duplex radio is a promising technology for next-generation wireless local area networks (WLAN) because it can simultaneously transmit and receive signals within the same frequency band. Since legacy medium access control (MAC) protocols are designed based on half-duplex communication, they are not suitable for full-duplex communication. In this paper, we discuss considerations of full-duplex communication and propose a novel full-duplex MAC protocol. We conducted a simulation to measure the throughput of our MAC protocol. Through the simulation results, we can verify that significant throughput gains of the proposed full-duplex MAC protocol, thus comparing the basic full-duplex MAC protocol.

Implementation of Sensors Information Alarm Service using an FCM based on Raspberry Pi (FCM을 이용한 라즈베리파이 기반의 센서정보 알림 구현)

  • Oh, Sejin
    • Journal of Industrial Convergence
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2022
  • The Internet of Things(IoT) is one of the key technologies in the Fourth Industrial Revolution. The IoT is a system that acquires information from various sensors and provides meaningful information to users. The method of obtaining information from sensor is using WIFI, Bluetooth and Server. is not accessible to external users because of different type of networks or local area communication. For this reason, there is a problem that external user cannot receive notification in regard to sensor information. In this paper, we want to establish a cloud message environment using Google's FCM(Firebase Cloud Messaging) and find out through experiments how users can receive notifications even if they are outside.

Performance Evaluation of Distributed Cooperative MAC Protocol Algorithm for Enhancing Multimedia QoS of WiMedia Communication Network (와이미디어 통신네트워크의 멀티미디어 QoS 개선을 위한 분산협력방식 MAC 프로토콜 성능분석)

  • Kim, Jin-Woo;Lee, Yeon-Woo;Lee, Seong-Ro
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.4
    • /
    • pp.516-525
    • /
    • 2012
  • In this paper, an efficient technique for enhancing the QoS of multimedia service for an WiMedia network applying distributed cooperative medium access (D-MAC) protocol is proposed. D-MAC protocol has been proposed to support high-rate Wireless Personal Area Networks (HR-WPANs) by the WiMedia Alliance. Unlike the centralized IEEE 802.15.3 MAC, the D-MAC UWB specified by WiMedia supports all devices to be self-organized and removes the SOP (Simultaneous Operating Piconet) problem, i.e., packet collisions between overlapped piconets in the centralized IEEE 802.15.3 MAC. However the WiMedia D-MAC can't prevent reduce the throughput degradation occurred by mobile nodes with low data rate. Therefore, a distributed cooperative MAC protocol for multi-hop UWB network is proposed in this paper. The proposed technique can intelligently select the transmission path with higher data rate to provide real-time multimedia services with minimum delay, thus enhances QoS of multimedia service.

Exploring Cancer-Specific microRNA-mRNA Interactions by Evolutionary Layered Hypernetwork Models (진화연산 기반 계층적 하이퍼네트워크 모델에 의한 암 특이적 microRNA-mRNA 상호작용 탐색)

  • Kim, Soo-Jin;Ha, Jung-Woo;Zhang, Byoung-Tak
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.980-984
    • /
    • 2010
  • Exploring microRNA (miRNA) and mRNA regulatory interactions may give new insights into diverse biological phenomena. Recently, miRNAs have been discovered as important regulators that play a major role in various cellular processes. Therefore, it is essential to identify functional interactions between miRNAs and mRNAs for understanding the context- dependent activities of miRNAs in complex biological systems. While elucidating complex miRNA-mRNA interactions has been studied with experimental and computational approaches, it is still difficult to infer miRNA-mRNA regulatory modules. Here we present a novel method, termed layered hypernetworks (LHNs), for identifying functional miRNA-mRNA interactions from heterogeneous expression data. In experiments, we apply the LHN model to miRNA and mRNA expression profiles on multiple cancers. The proposed method identifies cancer-specific miRNA-mRNA interactions. We show the biological significance of the discovered miRNA- mRNA interactions.

Performance Analysis of Optical CDMA System with Cross-Layer Concept (계층간 교차 개념을 적용한 광 부호분할 다중접속 시스템의 성능 분석)

  • Kim, Jin-Young;Kim, Eun-Cheol
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.7
    • /
    • pp.13-23
    • /
    • 2009
  • In this paper, the network performance of a turbo coded optical code division multiple access (CDMA) system with cross-layer, which is between physical and network layers, concept is analyzed and simulated. We consider physical and MAC layers in a cross-layer concept. An intensity-modulated/direct-detection (IM/DD) optical system employing pulse position modulation (PPM) is considered. In order to increase the system performance, turbo codes composed of parallel concatenated convolutional codes (PCCCs) is utilized. The network performance is evaluated in terms of bit error probability (BEP). From the simulation results, it is demonstrated that turbo coding offers considerable coding gain with reasonable encoding and decoding complexity. Also, it is confirmed that the performance of such an optical CDMA network can be substantially improved by increasing e interleaver length and e number of iterations in e decoding process. The results of this paper can be applied to implement the indoor optical wireless LANs.