• Title/Summary/Keyword: 모바일 키

Search Result 258, Processing Time 0.023 seconds

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

A Comparative Study on the Recall and Recognition with Sponsor and Non-sponsor in 2008 Beijing Olympic Games : focusing on the case of Korea and China (2008북경올림픽 스폰서 및 비(非)스폰서의 회상(recall)과 인식(recognition) 측정 비교 연구: 한국과 중국을 중심으로)

  • Ha, In-Joo
    • International Area Studies Review
    • /
    • v.13 no.3
    • /
    • pp.613-636
    • /
    • 2009
  • This paper examines the performance of assessing sponsors and non-sponsors recall and recognition at the 2008 Beijing Olympic Games perceived by Korean and Chinese university students. Using a sample of 1,573 respondents, a survey was administered in Seoul and Beijing before and after Games to compare the recall and recognition that changed between two periods. The findings reveal that the effectiveness of the 2008 Beijing Olympic sponsorship has was lower than we expected. Results were founded that while Samsung(mobile), Coca-cola, McDonald's, and Visa achieved the desired sponsorship marketing effectiveness in Korea. On the other hand, non-sponsors of Nike, Dell, AIG, Samsung(computer) and Hyundai led to obtain the benefit and resulted in increasing consumer confusion as to who is a sponsor. In China, Samsung, Coca-cola, Lenovo, Volkswagen, Visa, and PICC achieved the desired sponsorship marketing effectiveness. On the other hand, Lining, Nokia, KFC, China Merchants Bank had some impact on the effectiveness of a rival brand from an official sponsor's product category. The paper concludes by considering some issues for sponsorship marketers.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

User authentication using touch positions in a touch-screen interface (터치스크린을 이용한 터치 위치기반 사용자 인증)

  • Kim, Jin-Bok;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.135-141
    • /
    • 2011
  • Recent advances in mobile devices and development of various mobile applications dealing with private information of users made user authentication in mobile devices a very important issue. This paper presents a new user authentication method based on touch screen interfaces. This method uses for authentication the PIN digits as well as the exact locations the user touches to input these digits. Our method is fully compatible with the regular PIN entry method which uses numeric keypads, and it provides better usability than the behavioral biometric schemes because its PIN registration process is much simpler. According to our experiments, our method guarantees EERs of 12.8%, 8.3%, and 9.3% for 4-digit PINs, 6-digit PINs, and 11-digit cell phone numbers, respectively, under the extremely conservative assumption that all users have the same PIN digits and cell phone numbers. Thus we can guarantee much higher performance in identification functionality by applying this result to a more practical situation where every user uses distinct PIN and sell phone number. Finally, our method is far more secure than the regular PIN entry method, which is verified by our experiments where attackers are required to recover a PIN after observing the PIN entry processes of the regular PIN and our method under the same level of security parameters.

제철플랜트용 전기제품의 변천과 전망

  • 대한전기협회
    • JOURNAL OF ELECTRICAL WORLD
    • /
    • s.286
    • /
    • pp.64-69
    • /
    • 2000
  • 20세기에 있어서의 비약하는 산업계의 주축으로서 철강시장은 급속히 확대되었고 그와 더불어 신기술의 개발과 도입에서도 선도적 역할을 다하여 왔다. 특히 이 4반세기는 반도체기술의 진보와 함께 컴퓨터, 플랜트 컨트롤러, 드라이브 시스템 등 전기제품은 비약적인 진화를 이루어 왔다. 현재는 중국$\cdot$아시아$\cdot$남미를 중심으로 철강제품의 수요가 증가하여 설비투자도 확대되고 있다. 그러나 북미$\cdot$유럽$\cdot$일본에서는 생산능력과 수요와의 사이에 수급공백이 있어 이전과 같은 시장만큼의 신장은 기대할 수 없는 실정이다. 이와 같은 상황하에서 철강유저의 투자목적을 합리화$\cdot$성력화$\cdot$제품품질의 향상에 두고 있어, 미쓰비시전기는 ''경쟁력 있는 제품을 만들기와 총투자코스트의 최소화''를 서포트하는 제철플랜트용 전기제품의 제공을 지향하여, 그림에 표시하는 것과 같은 4개의 어프로치로 이에 대응하고 있다. 고품질화와 자동화에 대하여는 종래의 품질제어를 능가하는 초안정화 시스템의 적용, 프로세스의 이상 검지와 자동복구에 의한 완전 노터치 오퍼레이션의 실현, 인텔리전트 센서에 의한 프로세스의 가시화로 오퍼레이터가 최종판단을 용이하고 정확하게 할 수 있는 환경을 제공한다. 고효율화$\cdot$에너지 사용합리화에 대하여는 고역률 전원을 추구하여 고효율 드라이브장치와 모터를 제공한다. 글로벌 스탠더드화에의 대응으로서는 네트워크의 오픈화에 의한 멀티벤더 환경, 범용 하드웨어에 의한 오픈 HMI(Human Machine Interface)을 제공하고 있다. 플랜트의 신속한 가동과 리모트 메인터넌스 환경을 실현하기 위하여 플랜트 시뮬레이션 시험의 실시로 공장출하 품질의 향상을 도모한다. 또한 연구센터로부터의 원격감시와 트러블해석 서포트를 쉽게 할 수가 있다. 나아가 최근에는 급격한 기세로 신장되어 온 멀티미디어 기술, 인터넷 기술, 인트라넷 기술, 모바일단말, 화상압축기술 등에 의하여 원격집중감시, 현장과 중앙 쌍방향 협조보수작업, 버추얼 리얼리티 응용시스템이 현실화 되고있는 실정이다. 이들 IT(Information Technology)솔류션은 금후의 제철플랜트의 시스템을 크게 바꾸어 나가는 것은 물론 사업 경쟁력 강화의 키 테크놀로지가 될 것이다. 앞으로 미쓰비시전기는 제철플랜트에 대하여 유저니즈를 IT 솔루션으로 전개, 제공해 나가고자 한다.

  • PDF

Design of Encryption/Decryption Core for Block Cipher HIGHT (블록 암호 HIGHT를 위한 암·복호화기 코어 설계)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.778-784
    • /
    • 2012
  • A symmetric block cryptosystem uses an identical cryptographic key at encryption and decryption processes. HIGHT cipher algorithm is 64-bit block cryptographic technology for mobile device that was authorized as international standard by ISO/IEC on 2010. In this paper, block cipher HIGHT algorithm is designed using Verilog-HDL. Four modes of operation for block cipher such as ECB, CBC, OFB and CTR are supported. When continuous message blocks of fixed size are encrypted or decrypted, the desigend HIGHT core can process a 64-bit message block in every 34-clock cycle. The cryptographic processor designed in this paper operates at 144MHz on vertex chip of Xilinx, Inc. and the maximum throughput is 271Mbps. The designed cryptographic processor is applicable to security module of the areas such as PDA, smart card, internet banking and satellite broadcasting.