• Title/Summary/Keyword: 세션화

Search Result 223, Processing Time 0.023 seconds

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.

One-key Keyboard: A Very Small QWERTY Keyboard Supporting Text Entry for Wearable Computing (원키 키보드: 웨어러블 컴퓨팅 환경에서 문자입력을 지원하는 초소형 QWERTY 키보드)

  • Lee, Woo-Hun;Sohn, Min-Jung
    • Journal of the HCI Society of Korea
    • /
    • v.1 no.1
    • /
    • pp.21-28
    • /
    • 2006
  • Most of the commercialized wearable text input devices are wrist-worn keyboards that have adopted the minimization method of reducing keys. Generally, a drastic key reduction in order to achieve sufficient wearability increases KSPC(Keystrokes per Character), decreases text entry performance, and requires additional effort to learn a new typing method. We are faced with wearability-usability tradeoff problems in designing a good wearable keyboard. To address this problem, we introduced a new keyboard minimization method of reducing key pitch. From a series of empirical studies, we found the potential of a new method which has a keyboard with a 7mm key pitch, good wearability and social acceptance in terms of physical form factors, and allows users to type 15.0WPM in 3 session trials. However, participants point out that a lack of passive haptic feedback in keying action and visual feedback on users' input deteriorate the text entry performance. We have developed the One-key Keyboard that addresses this problem. The traditional desktop keyboard has one key per character, but the One-key Keyboard has only one key ($70mm{\times}35mm$) on which a 10*5 QWERTY key array is printed. The One-key Keyboard detects the position of the fingertip at the time of the keying event and figures out the character entered. We conducted a text entry performance test comprised of 5 sessions. The participants typed 18.9WPM with a 6.7% error rate over all sessions and achieved up to 24.5WPM. From the experiment's results, the One-key Keyboard was evaluated as a potential text input device for wearable computing, balancing wearability, social acceptance, input speed, and learnability.

  • PDF

In-band Media Synchronization Mechanism Based on MMT Protocol for Hybrid Media Delivery (하이브리드 미디어 전송을 위한 MMT 프로토콜 기반의 대역내 미디어 동기화 기법)

  • Won, Kwang-eun;Ahn, Eun-bin;Kim, Ayoung;Lee, Hong-rae;Seo, Kwang-deok
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.299-305
    • /
    • 2019
  • In ISO MPEG, MPEG-H has been standardized to smoothly deliver huge volume of ultra-high resolution videos over heterogeneous network environments for the consumers. In the MPEG-H standard, MMT(MPEG Media Transport) protocol is the next generation MPEG media transport technology to provide hybrid media delivery over heterogeneous environments. It is important to sustain accurate media synchronization to provide ultra-high resolution video services over heterogeneous network environments. In this paper, we propose and verify an in-band media synchronization scheme to circumvent the problem of additional session setup and excessive traffic problems of the conventional out-of-band media synchronization supported by the MMT technology.

Interactive Visual Analytic Approach for Anomaly Detection in BGP Network Data (BGP 네트워크 데이터 내의 이상징후 감지를 위한 인터랙티브 시각화 분석 기법)

  • Choi, So-mi;Kim, Son-yong;Lee, Jae-yeon;Kauh, Jang-hyuk;Kwon, Koo-hyung;Choo, Jae-gul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.135-143
    • /
    • 2022
  • As the world has implemented social distancing and telecommuting due to the spread of COVID-19, real-time streaming sessions based on routing protocols have increased dependence on the Internet due to the activation of video and voice-related content services and cloud computing. BGP is the most widely used routing protocol, and although many studies continue to improve security, there is a lack of visual analysis to determine the real-time nature of analysis and the mis-detection of algorithms. In this paper, we analyze BGP data, which are powdered as normal and abnormal, on a real-world basis, using an anomaly detection algorithm that combines statistical and post-processing statistical techniques with Rule-based techniques. In addition, we present an interactive spatio-temporal analysis plan as an intuitive visualization plan and analysis result of the algorithm with a map and Sankey Chart-based visualization technique.

Evaluating Quadriceps Muscle Damage after Downhill Running of Different Intensities using Ultrasonography (내리막 달리기 후 국소 근손상의 영상학적 비교분석 : 운동 강도의 영향)

  • Sun, Min Ghyu;Kim, Choun Sub;Kim, Maeng Kyu
    • Journal of the Korean Applied Science and Technology
    • /
    • v.36 no.3
    • /
    • pp.1028-1040
    • /
    • 2019
  • The current study was performed to investigate the magnitude of exercise-induced muscle damage (EIMD) after downhill running (DR) of different intensities and to examine the availability of muscle echo intensity as biomarkers to detect regional damage within quadriceps muscle group (QG) following DR. Healthy college-age men (n=11) were experienced twice DR sessions [$50%HR_{max}$ DR, LDR; $70%HR_{max}$ DR, HDR] separated by a 2-week wash-out period with the random order. After DR, severity of EIMD according to exercise intensity were determined by serum creatine kinase (CK) activity, muscle tenderness, and neuromuscular function indicators such as a maximal voluntary isometric contraction (MVIC) and range of motion (ROM). Transvaginal B-mode imaging had been employed to evaluate regional muscle echo intensity within QG [rectus femoris, RF; vastus lateralis, VL; vastus medialis, VM; vastus intermedius, VI]. After both DR sessions, changes in serum CK activity and muscle tenderness have tended to more increase in HDR compared to those of LDR. There was a significant interaction effect between exercise intensity during DR and the time course of serum CK activity(p<.05). However, there were no statistical differences between sessions in muscle tenderness. The time course of changes in the neuromuscular functions after DR were similar to those of regional muscle echo intensity regardless exercise intensity. Although neuromuscular function showed to decline in HDR more than those of LDR after DR, no statistical differences between sessions. In contrast, there were significant interaction effects between sessions and time course of changes in RF and VL muscle echo intensity(p<.01), but not shown in those of VI and VM. These results indicated that each muscles within the QG show different response profiles for EIMD during DR, exercise intensity influences on these responses as well. In particular, current findings suggested that muscle echo intensity derived from ultrasound imaging is capable of detecting regional muscle damage in QG following DR.

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.

Chaotic Block Encryption Using a PLCM (PLCM을 이용한 카오스 블록 암호화)

  • Shin Jae-Ho;Lee Sung-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.10-19
    • /
    • 2006
  • In this paper, we propose 128-bit chaotic block encryption scheme using a PLCM(Piecewise Linear Chaotic Map) having a good dynamical property. The proposed scheme has a block size of 12n-bit and a key size of 125-bit. The encrypted code is generated from the output of PLCM. We show the proposed scheme is very secure against statistical attacks and have very good avalanche effect and randomness properties.

Design of Network Protocols for Distributed Virtual Environments (분산 가상 환경을 위한 네트워크 프로토콜의 설계)

  • Ko, Dong-Il;Choi, Yang-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.1
    • /
    • pp.1-11
    • /
    • 2000
  • Recently, the explosive popularity of Internet gave birth to researches on Distributed Virtual Environments(DVE). They aim at providing a shared application data environment at realtime for users participating in the same application session across Internet. As more users join the session, and as more multimedia data are shared, because of network resource limitation, it is more difficult to maintain the quality of DVE, such as users' satisfaction level. Previous works mainly tried to solve the scalability, synchronization and data transport issues at the application level, with limited success. We suggest a new network centric solution, that consists of a novel network architecture and protocols upon which any large-scale DVE application can be easily developed. The performance of the proposed scheme, called GAIA, is verified by simulation.

  • PDF

A Resource Management and Allocation Scheme for Multiple Multimedia Service in Heterogeneous Networks (이종 무선망에서 다중 멀티미디어 서비스 지원을 위한 자원 운용 및 할당 알고리즘)

  • Lee, Jong-Chan;Lee, Moon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.141-149
    • /
    • 2012
  • This paper proposes a resource management and allocation algorithm to guarantee QoS continuity of realtime multimedia services and to maximize the resource utilization in heterogeneous wireless networks simultaneously. This scheme reserves the appropriate resources to be used by real-time multimedia services and allocates those resources left unused due to decreased transmission rate of realtime services to non-realtime services. Those resources can be preempted by the need of realtime services later. Performances are analyzed by simulation.

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF