• Title/Summary/Keyword: 로밍

Search Result 158, Processing Time 0.025 seconds

A Study on User Authentication for Roaming in Mobile Device (모바일 디바이스의 로밍을 위한 사용자 인증에 관한 연구)

  • Kang, Seo-Il;Park, Choon-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.343-350
    • /
    • 2008
  • In ubiquitous environment, a user has been provided with service and mobility using various devices. The users' network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc${\cdots}$) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment (무선 네트워크 로밍 환경에서 이기종 네트워크간 연동을 위한 AAA 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.481-492
    • /
    • 2008
  • With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.

Network Search Algorithm for Fast Comeback to Home Network in Roaming Environment (이동통신 로밍 환경에서 빠른 홈망 복귀를 위한 망탐색 알고리즘)

  • Ha, Won-Ki;Koh, Seok-Joo
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.149-152
    • /
    • 2012
  • In the roaming case, the cost of using the visited network is larger than that of home network. So, if a mobile terminal is connected to the visited network, even though it actually came back to the home network, the user may unduly pay for communication. Such a problem frequently occurs when many networks are overlapped in the same region, as shown in the case of Poland. In this paper, we propose a network search algorithm to support the fast comeback to home network in the roaming environment. In the proposed scheme, which is based on the 3GPP specification, the mobile terminal tries to search the home network by using a database of network information, as fast as possible. For performance evaluation, we construct a virtual testbed with real terminal and network equipment to emulate the service providers in Poland. From the experimental results, we can see that the proposed scheme can reduce the time of comeback to the home network by 3~60 minutes, compared the existing 3GPP scheme.

The Study on developing on the Roaming simulator to estimate of the communication performance of Communication-Based Train Control system (무선통신기반 열차제어시스템의 통신성능평가를 위한 로밍시뮬레이터 개발에 관한 연구)

  • Lee, Kang-Mi;Jo, Hyun-Jeong;Shin, Kyung-Ho;Kim, Jong-Ki;Kim, Baek-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.1454-1460
    • /
    • 2006
  • This paper assesses communication performance using a roaming simulator when roaming occurs between onboard and ground wireless communication devices for communication based train control system (CBTC). Generally, CBTC is defined as the system regularly collecting location and speed data from each train, transmitting distance information to a train, and optimizing train speed according to train performance. When a train is moving, roaming is also performed to continuously transmit and receive train control information between the ground controller and the train. To operate CBTC, packet loss rate should be less than 1%, roaming time less than 100ms during roaming. We developed a roaming simulator to check communication performance before installing ground and onboard equipments on actual wireless sections. The roaming simulator to be introduced in this paper is for roaming simulation before conducting CBTC field test, which is the project to develop Urban Rail Signaling System Standards, being conducted in KRRI. The simulation consists of one onboard wireless communication device and three ground wireless communication devices, and the roaming simulator estimate packet loss rate occurring during roaming process of the two devices. Therefore, if you use the roaming simulator before the field test, you can predict various problems to occur in actual environment and reduce time, cost and people necessary to resolve these problems.

  • PDF

Design and Implementation of User Authentication Schemes for Roaming in Public Wireless LAM Systems (공중 무선랜 시스템에서 로밍을 고려한 사용자 인증방식의 설계 및 구현)

  • Lee, Hyun-Woo;Kim, Jeong-Hwan;Ryu, Won;Yoon, Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.755-761
    • /
    • 2004
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAM access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802. 1x standards and related protocols likeEAPoL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG.(Intelligent Wireless Internet Gateway).

A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment (무선 랜 환경에서 안정적인 로밍을 위한 선행 인증기법 설계)

  • Hong, Soon-Ja;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.33-41
    • /
    • 2006
  • Wireless LAN is intrinsically weak in security of transmissions. WPKI (Wireless Public Key Infrastructure) is a well known Method to deal with the security issues in wireless LAN. The authentication required by the method becomes a source of unrellability of the hand-off performance. This paper suggests a solution to overcome the instability while using the WPKI technique, Prior to getting into the next region, a station is provided with the keys of the surrounding regions so that the possible delay problem can be avoided during the actual hand-off time. Thereby the hand-off instability can be solved in the WPKI framework.

  • PDF