• Title/Summary/Keyword: 네트워크 접속

Search Result 1,299, Processing Time 0.028 seconds

An Efficient Method to Update Character Moving Directions for Massively Multi-player Online FPS Games (대규모 온라인 FPS 게임을 위한 효율적인 캐릭터 방향 갱신 기법)

  • Lim, Jong-Min;Lee, Dong-Woo;Kim, Youngsik
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.35-42
    • /
    • 2014
  • In the market of First Person Shooter (FPS) games, Massively Multi-player Online FPS games (MMOFPS) like 'PlanetSide 2' have been popular recently. Dead reckoning has been widely used in order to mitigate the network traffic overload for the game server with hundreds or thousands of people. This paper proposes the efficient analytical method to calculate the tolerable threshold angle of moving direction, which is one of the most important factors for character status updating when dead reckoning is used in MMOFPS games. The experimental results with game testers shows that the proposed method minimizes the position error for character moving and provides natural direction updates of characters.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

A Study on the Application of the LMS and LCMS Based E-Learning in the Cloud Computing Environment (클라우드 컴퓨팅 환경에서LMS와 LCMS기반의 이러닝 적용 방안)

  • Jeong, Hwa-Young;Kim, Eun-Won;Hong, Bong-Hwa
    • 전자공학회논문지 IE
    • /
    • v.47 no.1
    • /
    • pp.56-60
    • /
    • 2010
  • The widespread development of IT, growth of Web 2.0 application, the proliferation of personal hand held devices with access to the internet, and the availability of wireless networks, each have played an important role in creating the cloud computing model. Cloud computing is a business model and new trend of web application technology. The term is often used in the same context as grid computing or utility computing. In the cloud computing environment, we are able to use the same all of hardware resources in the server and share information easily. In this paper, we aimed a study to apply e-learning part to cloud computing environment. For this purpose, we proposed an application of LMS and LCMS based e-learning in the cloud computing environment. So LMS including LCMS connected to data center of cloud computing.

An Empirical Study on Machine Learning based Smart Device Lithium-Ion Cells Capacity Estimation (머신러닝 기반 스마트 단말기 Lithium-Ion Cell의 잔량 추정 방법의 실증적 연구)

  • Jang, SungJin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.797-802
    • /
    • 2020
  • Over the past few years, smart devices, including smartphones, have been continuously required by users based on portability. The performance is improving. Ubiquitous computing environment and sensor network are also improved. Due to various network connection technologies, mobile terminals are widely used. Smart terminals need technology to make energy monitoring more detailed for more stable operation during use. The smart terminal which is light in small size generates the power shortage problem due to the various multimedia task among the terminal operation. Various estimation hardwares have been developed to prevent such situation in advance and to operate stable terminals. However, the method and performance of estimating the remaining amount are not relatively good. In this paper, we propose a method for estimating the remaining amount of smart terminals. The Capacity Estimation of lithium ion cells for stable operation was estimated based on machine learning. Learning the characteristics of lithium ion cells in use, not the existing hardware estimation method, through a map learning algorithm using machine learning technique The optimized results are estimated and applied.

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

Study on the Implementation of a Virtual Switch using Intel DPDK (Intel DPDK를 이용한 가상스위치의 구현에 관한 연구)

  • Jeong, Gab-Joong;Choi, Kang-Il
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.2
    • /
    • pp.211-218
    • /
    • 2015
  • This paper describes the implementation of the accelerated virtual switch using Intel DPDK(Data Plane Development Kit), and evaluates the virtual network functions of the virtual switch which is one of the most important components to build a virtual network for cloud computing. Nowadays, new information service platforms are appeared from the interconnection of intelligent IT systems like IoT(Internet of Things). And many companies want to use the new service platform for their new application service. The companies can apply there new service early which needs small investment and responses adaptively to the fast change of consumer environment. Using cloud computing technology, the new business service can be introduced as a commercial IT service for the time to market. In this study, an implementation and investigation were performed for the accelerated virtual switch, called Intel DPDK virtual switch, which is using multi processors in network interface card for virtual network functions. It can be useful for Internet-oriented companies to leverage the new cloud service and businesses for its creativeness.