• Title/Summary/Keyword: 데이터분배서비스

Search Result 129, Processing Time 0.022 seconds

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

Efficient Method for Exchanging Data between DDS Middlewares based on Adaptive Packet Transmission (적응형 패킷 전송에 기반한 DDS 미들웨어 간의 효율적인 데이터 교환 방법)

  • Ahn, Sung-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1229-1234
    • /
    • 2012
  • In this paper, we analyze the problems that the DDS middleware, which is a standard data-centric communication interface, uses the fixed packet transmission method by the pre-defined protocol for exchanging data packets. The packet transmission method selected in a fixed manner cannot handle appropriately the increasing of resource overhead in an environment where the load of the DDS network changes dynamically. If the load on the node and network exceeds the threshold, the performance of the packet transmission may be degraded rapidly. This results in a failure of ensuring the real-time characteristic of DDS middleware. To solve this problem, we propose the scheme of the adaptive packet transmission for adjusting the transmission method in real-time based on the overhead on the DDS network.

Spatial Operation Allocation Scheme over Common Query Regions for Distributed Spatial Data Stream Processing (분산 공간 데이터 스트림 처리에서 질의 영역의 겹침을 고려한 공간 연산 배치 기법)

  • Chung, Weon-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2713-2719
    • /
    • 2012
  • According to increasing of various location-based services, distributed data stream processing techniques have been widely studied to provide high scalability and availability. In previous researches, in order to balance the load of distributed nodes, the geographic characteristics of spatial data stream are not considered. For this reason, distributed operations for adjacent spatial regions increases the overall system load. We propose a operation allocation scheme considering the characteristics of spatial operations to effectively processing spatial data stream in distributed computing environments. The proposed method presents the efficient share maximizing approach that preferentially distributes spatial operations sharing the common query regions to the same node in order to separate the adjacent spatial operations on overlapped regions.

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.

The Trustable Billing System for Mobile Internet (무선 인터넷에서 신뢰할 수 있는 과금 시스템)

  • 장석철;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.298-306
    • /
    • 2002
  • As the mobile communication related services are becoming popular, the payment issues on charging for the content services are getting more and more attention. Many contents providers are having difficulties for correctly charging services they provide, because they do not have appropriate payment systems yet. There are also the privacy protection issues, security problems that arise during transactions, and the authentication issues for both the user and the business, to be taken care of. In this paper, the billing system in the mobile internet environment will be discussed. Topics related to the key distribution for exchanging data, and the authentication mechanism for communications will be discussed. Based on this, a trustworthy billing system will be proposed.

  • PDF

Efficient Resource Allocation Algorithm for Multiuser OFDM Systems (다중 사용자 OFDM 시스템에서의 효율적인 자원 할당 알고리즘)

  • Lee, Jung-Yoon;Yoon, Dong-Weon;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4A
    • /
    • pp.344-350
    • /
    • 2007
  • Start after striking space key 2 times. Lately, a lot of researches have been done on the resource allocation for multiuser OFDM(Orthogonal Frequency Division Multiplexing) systems due to its spectral efficiency for high-rate multimedia data services. For multimedia services in which every user is guaranteed to have minimum required bit rate and bit error probability, it is critical to utilize the limited resources efficiently to improve the performance of the system. The introduced allocation method improves spectral efficiency to use the left subcarriers in Zhang's algorithm. By using this method, the system can provide services to more users constantly, except for a bit increasing complexity and memory for deciding the left subcarriers and reallocating the subcarriers.

A Key Distribution Protocol for Secure Multicasting in Large Dynamic Groups (대규모 동적 그룹에서 안전한 멀티캐스트를 위한 키 분배 프로토콜)

  • Kim, Tae-Yeon;Kim, Young-Kyoon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.597-604
    • /
    • 2002
  • Changing group key is necessary for the remaining members when a new member joins or a member leaves the group in multicast communications. It is required to guarantee perfect forward and backward confidentiality. Unfortunately, in large groups with frequent membership changes, key changes become the primary bottleneck for scalable group. In this paper, we propose a novel approach for providing efficient group key distribution in large and dynamic groups. Unlike existing secure multicast protocols, our protocol is scalable to large groups because both the frequency and computational overhead of re-keying is determined by the size of a subgroup instead of the size of the whole group, and offers mechanism to prevent the subgroup managers with group access control from having any access to the multicast data that are transfered by sender. It also provides security service for preserving privacy in wireless computing environments.

A Universal Middleware-based Small Satellite Payload Power Module Design (유니버설미들웨어기반 소형위성 탑재체 전력모듈설계)

  • Lee, Hae-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.487-494
    • /
    • 2019
  • A Small-Sat Power System Design and Development should be depend on space environment such as solar wind with Electromagnetic field by hurdle of techniques. It is surmount solution of trend that will unitize and converge with power module in these days. The level of modularize means that applying Universal Middleware for payload power module requirements. The scope of target system is a main power provider module and operational subunit that can be implemented with the final power module distribution loads to consume for continuous process. A Universal Middleware strengthen to build power module from satellite power system should be accuracy and consuming data. A Power Service Module and dynamic system drive interactive management between power distribution and consumer module by Range Control. Consequently, suggesting evaluation, unexpecting payload system power consumer that makes fine variable resources in the development design process and efficiency.

Image Watermarking using Wavelet Transform and Human Visual System (웨이블릿 변환 및 인간 시각 시스템을 이용한 원문 워터마킹)

  • 김상국;김태중;황재호;이재광
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.3
    • /
    • pp.61-70
    • /
    • 2004
  • As multimedia data and their applications are rapidly distributed on the Web, the research on watermark insertion and integrity assurance vigorously increases. In this paper, Discrete Wavelet Transformation dissolves an original image into the three level of low, middle, and high bandwidths. Human Visual System with the significant coefficients extracted from the middle obtains enhanced image quality and robustness using watermark insertion. Experimental results show that various attacks cannot destroy pre-inserted watermark and recovered image is of good quality by measuring PSNR.

  • PDF

Edge Computing-Based Unmanned Market Case Study: Maximizing Resource Distribution (엣지 컴퓨팅 기반 무인 마켓 사례 연구: 자원 분배 효율성 극대화)

  • Park, Ji-Hoon;Ryu, Hyeong-Oh;Kim, KyoungRul;Kim, Saehwa
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.221-224
    • /
    • 2019
  • 본 논문에서는 엣지 컴퓨팅을 무인 마켓에 도입하여 엣지 컴퓨팅의 효율성을 확인하고, 로컬 네트워크의 효율적인 대역폭 할당을 위한 두 가지 방법을 제안한다. 무인 마켓과 같이 엄청난 양의 데이터를 필요로 하고 만들어내는 서비스에서는 데이터들을 클라우드로 전송하여 소비자가 불편함을 느끼지 못하도록 빠르게 처리하는 것은 불가능에 가깝다. 그래서 우리는 Amazon Go 를 벤치마킹한 무인 마켓에 엣지 컴퓨팅을 도입하여 이를 구현한다. 그리고 구현한 시스템에서 엣지 컴퓨팅 외에 클라우드 컴퓨팅, 모바일 장치를 적용하여 처리할 때의 응답 시간을 분석하여 엣지 컴퓨팅의 높은 성능을 확인한다. 또한, 구현한 무인 마켓에서 데이터 전송의 효율성을 더욱 높이기 위해 카메라 단위와 매대 단위의 대역폭 할당 기법을 제안한다. 카메라 단위로는 모션 인식기술을 활용하여 움직임이 감지될 때만 각 이미지 프로세스에서 요구되는 고해상도로 송신하는 기법을 제안한다. 매대 단위로는 네트워크에서 수용 가능한 대역폭 임계치에 도달하지 못하게 하기 위해 매대 별 우선순위에 따른 대역폭 할당 스케줄링 기법을 제안한다. 그 결과로 평균 소모대역폭과 최대 소모대역폭을 비교하여 제안한 두 가지 기법이 기존의 방법에 비해 성능을 향상시키는 것을 보인다.