• Title/Summary/Keyword: 모바일 VPN

Search Result 25, Processing Time 0.023 seconds

Supporting Scalability of Tunneling and Mobile Clients in Virtual Private Network (가상사설망에서 터널링의 확장성과 모바일 클라이언트 지원)

  • Kim, Young-Jin;Lee, Joo-Yeon;Song, Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.195-199
    • /
    • 2002
  • Requirements of a well-designed VPNs(Virtual Private Networks) are scalability, performance, reliability, ease of management, interoperability and security. Tunneling is a important technology to support these. This paper researches VPNs tunneling technologies used currently and proposes VPN service models for the scalability that is a problem in VPNs and for the resource limit of Mobile Station in Mobile VPNs environment.

  • PDF

Mobile Game Information Offer Strategy in VPN Environment (VPN환경에서 모바일게임 정보제공 전략)

  • Shin, Seung-Jung
    • Journal of Korea Game Society
    • /
    • v.1 no.1
    • /
    • pp.94-101
    • /
    • 2001
  • Although the latest break-through of mobile industry has limited customers' free time to PC games, today's advancement of wireless mobile communication made this trend move to more specialized and diversified games implemented into cellular phones. Therefore, this paper intends to provide information on mobile games and strategic skills to prove its relative effects.

  • PDF

Design and Implementation of Internal Network and VPN-based NVR System (내부망 및 VPN 기반 NVR 시스템 설계 및 구현)

  • Byeong-Seon Park;Hee-Kwon Lee;Dong-Hwan Hwang;Yong-Kab Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.1-6
    • /
    • 2024
  • In this paper, we designed and implemented the security network NVR system that can flexibly use the internal network and VPN network. In general, the NVR systems that only use internal networks cannot be access from the outside, which has the disadvantage of unnecessary inspections and inability to access from the outside. External access has made possible using the VPN security network, and a NVR system software was designed and implemented so that the existing internal network could be used. We compared with the NVR system usage environment in the internal network through the client and the NVR system. It also has implemented usage environment with the VPN network through the mobile APP, and confirmed that the same NVR was operating normally with the same functions. We also studied on IP based NVR for flexible access with closed loop network based on VPN system.

An Efficient Authentication Protocol Using Single Bit Synchronization for Wireless LAN Environment (단일 Bit 동기화를 이용한 무선 LAN 환경에서의 효율적인 인증 프로토콜)

  • Jo Hea Suk;Youn Hee Yong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.747-754
    • /
    • 2004
  • Today, wireless LANs are widely deployed in various places such as corporate office conference rooms, industrial warehouses, Internet-ready classrooms, etc. However, new concerns have been raised regarding suity. Currently, both virtual private network(VPN) and WEP are used together as a strong authentication mechanism. While security is increased by using VPN and WEP together, unnecessary redundancy occurs causing power consumption increase and authentication speed decrease in the authentication process. In this paper a new synchronization protocol for authentication is proposed which allows simple authentication, minimal power consumption at the mobile station, and high utilization of authentication stream. This is achieved by using one bit per a frame authentication, while main authentication process including synchronization is handled by access points. Computer simulation reveals that the proposed scheme significantly improves the authentication efficiency in terms of the number of authenticated frames and authentication speed compared with an earlier protocol employing a similar authentication approach.

Efficient Implementation of Crypto Processing Based on Pre_Buffered Key Stream Method (Pre_Buffered 키스트림을 이용한 효율적인 암호처리 구현)

  • Kang, Cheol-Oh;Kim, Eun-Chan;Park, Jea-Min;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.989-1000
    • /
    • 2013
  • Mobile devices use VPN solution to transfer information securely through open network in mobile office environment. In this paper, we propose Pre_Buffered mechanism that improves the throughput of IPSec VPN using low performance H/W crypto Token. Pre_Buffered method precompute key stream, store them in Buffer and use them in IPSec engine for IP packet processing. Moreover, Design, analysis, and experimental results prove the efficiency and feasibility of our proposed method.

Method for Remotely Accessing the Home Network in the Mobile Environment (이동환경에서 홈 네트워크와 원격으로 연결하는 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Lee, Youn-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.649-651
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) standard enables easy sharing of multimedia contents in the home network environment. However, with the proliferation of mobile computing devices such as smartphones and tablets, the need for media sharing to expand beyond the boundaries of the home network arose. In this paper, a method for accessing DLNA based home network from the mobile environment is proposed. The proposed method uses mobile Virtual Private Network (VPN), and enables easy access to the resources in the home network from the wireless mobile environment.

  • PDF

Two-Channel Authentication Using a Mobile Application in VPN (VPN 환경에서 스마트폰을 이용한 이중 인증)

  • Kim, Do-yeon;Kim, Yoon-young;Park, Ji-eun;Choi, Go-eun;Hyun, Jeong-hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.237-238
    • /
    • 2016
  • 본 논문은 안전한 통신 환경인 VPN 상에서의 통신을 전제로 하여 보안성에 있어서 취약한 FTP 시스템의 로그인 과정에 일회용 비밀번호(OTP)를 적용한 방법에 관한 논문이다. OTP는 모바일 Application을 통해 사용자의 간단한 개인정보와 시간 값을 조합하여 암호문으로 생성되도록 설계하였다. 사용자가 해당 값으로 FTP 서버에 접근 시 서버는 일치 여부를 판단 승인하여 데이터 공유를 가능하게 한다.

CR-SeMMS: Cost-Reduced Secure Mobility Management Scheme Based on SIP in NEMO Environments (CR-SeMMS : NEMO환경에서 SIP에 기반한 비용절감의 안전한 이동성관리 기법)

  • Cho, Chul-Hee;Jong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.31-47
    • /
    • 2012
  • The mobile Virtual Private Network (MVPN) of Internet Engineering Task Force (IETF) is not designed to support NEwork MObility (NEMO) and is not suitable for real-time applications. Therefore, an architecture and protocol which supports VPN in NEMO are needed. In this paper, we proposed the cost-reduced secure mobility management scheme (CR-SeMMS) which is designed for real-time applications in conjunction with VPN and also which is based on the session initiation protocol (SIP). Our scheme is to support MVPN in NEMO, so that the session is well maintained while the entire network is moved. Further, in order to reduce the authentication delay time which considers as a delaying factor in hands-off operations, the signaling time which occurs to maintain the session is shortened through proposing the hands-off scheme adopting an authentication method based on HMAC based One Time Password (HOTP). Finally, our simulation results show the improvement of the average hands-off performance time between our proposed scheme and the existing schemes.

Decision Support System to Detect Unauthorized Access in Smart Work Environment (스마트워크 환경에서 이상접속탐지를 위한 의사결정지원 시스템 연구)

  • Lee, Jae-Ho;Lee, Dong-Hoon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.797-808
    • /
    • 2012
  • In smart work environment, a company provides employees a flexible work environment for tele-working using mobile phone or portable devices. On the other hand, such environment are exposed to the risks which the attacker can intrude into computer systems or leak personal information of smart-workers' and gain a company's sensitive information. To reduce these risks, the security administrator needs to analyze the usage patterns of employees and detect abnormal behaviors by monitoring VPN(Virtual Private Network) access log. This paper proposes a decision support system that can notify the status by using visualization and similarity measure through clustering analysis. On average, 88.7% of abnormal event can be detected by this proposed method. With this proposed system, the security administrator can detect abnormal behaviors of the employees and prevent account theft.

Design and Performance Analysis of u-TSMVPN for Intelligent Transportation Systems (지능형 교통시스템을 위한 u-TSMVPN의 설계와 성능분석)

  • Jeon, Hae-Nam;Jeong, Jongpil
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.32-45
    • /
    • 2013
  • Globally, intelligent vehicles and telematics research and development through the integration of IT technology in the vehicle are significant increasing. Real-time data communication for intelligent transportation system (ITS) is very important. It collects real-time data from the vehicle and provides the information collected from ITS center. We propose an effective and secure communication scheme for these communication procedures. In particular, our proposed SIP-based MVPN reduces signaling cost and has many advantages in security aspects. In addition, our proposed scheme performs the mobility management applying NEMO (Network Mobility) for the communication between the vehicles. In other words, we propose an ITS communication mechanism of SIP-based mobile VPN and V2V NEMO. Finally, our performance analysis show that the ITS of SIP-based MVPN is significantly reducing the handoff signaling cost.