• Title/Summary/Keyword: 메시지 전송 서버

Search Result 226, Processing Time 0.025 seconds

Proxy-Signcryption scheme for Electronic Commerce in Mobile Environment (이동 통신 환경에서의 전자 상거래에 적용할 수 있는 Proxy-Signcryption 방식)

  • 오수현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.43-54
    • /
    • 2000
  • C. Gamage 등은 M. Mambo 의 대리 서명 방시과 Y. Zheng의 signcryption 방식을 이용하여 사용자가 상대 적으로 계산 능력이 뛰어난 서버에 의존하여 암호화 및 서명을 생성할 수 있는 proxy-signcryption 방식을 제안하였다 그러나 그들이 제안한 방식을 실제 응용에 적용할 경우 사용자가 proxy agent를 대신하여 정당한 proxy-signcryption을 생성할 수 있을 뿐만아니라 자신이 전송한 메시지에 대해 부인하는 경우 리를 판단할 수 없으므로 proxy agent를 보호 할 수 없다는 문제점이 있다 따라서 본 논문에서는 대리인 보호형 대리 서명 방식과 N. Asokan 의 S3(Server Supported Signnatures)를 이용하여 proxy agent를 보호할 수 있고 송신자 부인 봉쇄를 제공하여 실제 응용에 적용할 수 있는 proxy-signcryption 방식을 제안하고자 한다. 또한 본 논문에서 제안하는 proxy-signcryption 방식은 한국형 디지털 서명 표준안인 KCDSA(Korean Certificate-based Digital Signature Algorithm)를 이용한다.

SOAP based security message for managing status of Electric Vehicles (자동차 상태정보 관리를 위한 SOAP기반 보안 메시지 정보 전송)

  • Kang, Moo-Sam;Moon, Young-Jun;Kang, Jin-Hyeok;Lee, Jee-Sung;Song, Wang-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.988-991
    • /
    • 2011
  • 본 논문은 자동차에 대한 데이터의 보안성을 위한 시스템을 위한 것으로, 자동차의 데이터를 실시간으로 읽어드려, 이를 인터넷 상에 위치한 Web 서비스를 통하여 DB에 SOAP를 이용하여 서버에 저장하는 시스템이다. 통합된 시스템이 만들어지면, 현재 자동차의 상태정보를 읽어드려, 자동차의 상황정보를 보안이 강화된 통신을 통해 사용자에게 신뢰성이 높은 정보를 안전하게 제공할 수 있을 것이다.

Enhanced Fast Handoff Protocol using Temporary Handoff Key (THK) (임시 핸드오프 키를 이용한 Fast 핸드오프 프로토콜)

  • Cho, Sung-Jae;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1202-1205
    • /
    • 2007
  • 최근 무선랜의 이용이 급격하게 증가하고 있는 추세이다. 무선랜은 이동통신에 비해 빠른 데이터 전송이 가능하여 화상통신, VoIP, 동영상 스트리밍 등 멀티미디어 서비스에 적합하다. 하지만 무선랜은 서비스 제공 영역이 작기 때문에 사용자가 자주 이동할 경우 핸드오프가 발생하여 딜레이가 증가한다. 딜레이에 민감한 멀티미디어의 경우 서비스 품질에 영향을 받을 수 있으므로 이에 대한 고려가 필요하다. 본 논문에서는 핸드오프의 인증 과정에서 발생하는 딜레이를 줄이기 위해 핸드오프 할 때 사용되는 임시 키인 THK 의 사용을 제안한다. THK 를 이용할 경우 인증 서버를 이용하지 않고도 인증이 가능하며 사용하는 메시지의 양도 작기 때문에 딜레이 감소가 가능하다. 시뮬레이션 결과는 우리가 제안한 프로토콜을 이용할 경우 현재 사용 중인 프로토콜에 비해 최고 2 배의 성능 향상을 얻을 수 있음을 보여준다.

Design of a MAC protocol for Urgent Events in Wireless Sensor Networks (긴급 메시지의 우선 처리를 위한 무선센서네트워크 MAC 프로토콜 설계)

  • Lee, Ju-Hyeon;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.803-808
    • /
    • 2010
  • Wireless Sensor Networks are widely applied for organizing real-time monitoring systems. Unlike general kinds of sensor networks, it is important to preferential send emergency data to the control server when urgent events are occurred. But IEEE 802.15.4 MAC protocol which is generally deployed for wireless sensor network does not support algorithm for urgency data handling. Therefore, we proposed a MAC protocol which consider the priority for the urgency data handling.

Design of Merchandise Recommendation System Using Environmental Information (주변 환경정보를 이용한 상품추천시스템 설계)

  • Kim, Sung-Jin;Lee, Ju-Eun;Kim, Chae-Yeon;Lee, Eun-Sol;Jang, Jae Suk;Lee, Jun-Dong;Choi, Jae-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.129-131
    • /
    • 2019
  • 본 논문에서는 다양한 아두이노 무선센서 모듈과 Raspberry Pi, 웹서버를 이용한 IOT 기반 환경정보 수집 시스템을 구현하고, 상품추천시스템을 제안한다. 이 시스템은 사용자가 주변 환경의 데이터를 정확하게 확인하고 활용할 수 있도록 한다. 상품추천 시스템에서는 상점 외부에 부착된 다양한 무선센서 모듈들을 이용해 상점 주변의 환경데이터를 수집하고, 무선통신을 통해 Raspberry Pi로 데이터를 전송한다. 전송된 데이터는 Server로 보내져 Server DB에 저장되고 Server에서 센서값들의 평균값을 계산해 Raspberry Pi로 다시 보내주면 Raspberry Pi에 연결된 모니터를 통해 실시간으로 주변의 데이터와 주변 상황에 맞는 경고 메시지를 보여주고, 이후 필요한 물건을 추천해준다.

  • PDF

A System Development for Remotely Controlling Windows and Doors in Mobile Environment (모바일 환경에서의 원격 창호 관제시스템 개발)

  • Cho, Yong-Hyun;Ryu, Sung-Won;Ahn, Kyung-Gyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.334-341
    • /
    • 2015
  • This paper develops a new system for remotely monitoring and controlling the windows and doors in mobile environment. We design and implement the opening and shutting unit, the gateway, and the control server system, respectively. The opening and shutting unit consists of the driver using DC motor and the motion controller which monitors the state and transfers the control information. The gateway supports TCP/IP and CDMA protocol, which is the interface of wire and wireless communication for transferring the current state and control information. The control server consists of the program to store and process the control information, the middleware to support the processing of various state message, and DB for monitoring the state and remotely controlling the system. Especially, an application software and the Web-based user interface have also been developed to support the mobile environment. The operation performances, environment influences, driving persistences, and operation failure ratio, which are based on PC and smart-phone, have been tested in 2 authorized agencies. The test results show that the developed system has a superior performance.

ECbA(Elliptic Curve based Authentication) System on the wireless network environment (무선 네트워크 환경에서의 ECbA(Elliptic Curve based Authentication)시스템 설계)

  • Jeong, Eun-Hee;Yang, Seung-Hae;Kim, Hak-Chun;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.1
    • /
    • pp.67-74
    • /
    • 2008
  • As wireless network market is increasing rapidly, the biggest issue is to transfer safe data and to authenticate users. This paper proposes ECbA(Elliptic Curve based Authentication) which consists of the mutual authentication mechanism that users can ascertain the identity of an authentication server and the user authentication mechanism that an authentication server can make sure users' identity, by using Elliptic Curve algorithms. The proposed ECbA system diminishes the message quantity and the execution time by using the small elliptic curve algorithm with the small key length in authentication. In addition, as this paper reduces the authentication steps of existing EAP_TLS into 6 authentication steps, the communication cost and mutual authentication time can be saved. As this paper distributes new keys, whenever authenticating users by using key exchange mechanism, it provides safe encryption communication and prevents DoS attack by controlling the users authentication request by authentication server.

  • PDF

Development of Interactive Content Services through an Intelligent IoT Mirror System (지능형 IoT 미러 시스템을 활용한 인터랙티브 콘텐츠 서비스 구현)

  • Jung, Wonseok;Seo, Jeongwook
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.472-477
    • /
    • 2018
  • In this paper, we develop interactive content services for preventing depression of users through an intelligent Internet of Things(IoT) mirror system. For interactive content services, an IoT mirror device measures attention and meditation data from an EEG headset device and also measures facial expression data such as "sad", "angery", "disgust", "neutral", " happy", and "surprise" classified by a multi-layer perceptron algorithm through an webcam. Then, it sends the measured data to an oneM2M-compliant IoT server. Based on the collected data in the IoT server, a machine learning model is built to classify three levels of depression (RED, YELLOW, and GREEN) given by a proposed merge labeling method. It was verified that the k-nearest neighbor (k-NN) model could achieve about 93% of accuracy by experimental results. In addition, according to the classified level, a social network service agent sent a corresponding alert message to the family, friends and social workers. Thus, we were able to provide an interactive content service between users and caregivers.

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

Node ID-based Service Discovery for Mobile Ad Hoc Networks (모바일 애드-혹 네트워크를 위한 노드 ID 기반 서비스 디스커버리 기법)

  • Kang, Eun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.109-117
    • /
    • 2009
  • In this paper, we propose an efficient service discovery scheme that combines peer-to-peer caching advertisement and node ID-based selective forwarding service requests. P2P caching advertisement quickly spreads available service information and reduces average response hop count since service information store in neighbor node cache. In addition, node ID-based service requests can minimize network transmission delay and can reduce network load since do not broadcast to all neighbor node. Proposed scheme does not require a central lookup server or registry and not rely on flooding that create a number of transmission messages. Simulation results show that proposed scheme improved network loads and response times since reduce a lot of messages and reduce average response hop counts using adaptive selective nodes among neighbor nodes compared to traditional flooding-based protocol.