• Title/Summary/Keyword: 세션 이동

Search Result 209, Processing Time 0.023 seconds

Ubiquitous Workspace Synchronization in a Cloud-based Framework (클라우드 기반 프레임워크에서 유비쿼터스 워크스페이스 동기화)

  • Elijorde, Frank I.;Yang, Hyunho;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.14 no.1
    • /
    • pp.53-62
    • /
    • 2013
  • It is common among users to have multiple computing devices as well as to access their files or do work at different locations. To achieve file consistency as well as mobility in this scenario, an efficient approach for workspace synchronization should be used. However, file synchronization alone cannot guarantee the mobility of work environment which allows activities to be resumed at any place and time. This paper proposes a ubiquitous synchronization approach which provides cloud-based access to a user's workspace. Efficient synchronization is achieved by combining session monitoring with file system management. Experimental results show that the proposed mechanism outperforms Cloud Master-replica Synchronization in terms of number of I/O operations, CPU utilization, as well as the average and maximum latencies in responding to client requests.

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

Dynamic QoS Mechanism for supporting VoIP Service in Tactical Communication Environment (전술환경에서의 VoIP 서비스를 위한 Dynamic QoS 기법 연구)

  • Shin, Dong-Yun;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.2078-2083
    • /
    • 2012
  • Tactical communication environment evolving for the purpose of providing services such as voice, video and text based on ALL-IP. Therefore, To be able to guarantee QoS level which meets the required level of subscriber for these services in the constrained tactical communication infrastructure, it is required to take the characteristics such as wireless transmission link, mobility of troops or personal into service quality scheme. In this paper, to support differentiated QoS for each individual or mission in the tactical communication environment, we presents a technique that can provide same QoS level which was served originally regardless of the situation to user's move through dynamically determining the QoS level to be provided at the time of the service request on VoIP-Switch.

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

An Efficient Password-based Authentication and Key Exchange Protocol for M-Commerce Users (M-Commerce 사용자를 위한 효율적인 패스워드 기반 인증 및 키교환 프로토콜)

  • Park Soo-Jin;Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.125-132
    • /
    • 2005
  • Wireless access always has to include the authentication of communication partners and the encryption of communication data in order to use secure M-Commerce services. However, wireless systems have limitations compared with the wired systems, so we need an efficient authentication and key exchange protocol considering these limitations. In this paper, we propose an efficient authentication and key exchange protocol for M-Commerce users using elliptic curve crypto systems. The proposed protocol reduces the computational load of mobile users because the wireless service provider accomplishes some parts of computations instead of the mobile user, and it uses the password-based authentication in wireless links. Also, it guarantees the anonymity of the mobile user not to reveal directly the real identity of the user to the M-Commerce host, and preserves the confidentiality of communication data between the M-Commerce host and the user not to know the contents of communication between them to others including the wireless service provider.

Seamless handover protocol to reduce handover latency (핸드오버 지연 시간을 줄일 수 있는 심리스 핸드오버 프로토콜 제안 및 성능 분석)

  • Jang, Jong-Min;Lee, Yu-Tae;Lee, Soong-Hee;Kim, Dong-Il;Choi, Sam-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.277-284
    • /
    • 2009
  • With significant development in wireless communication technologies, the needs to handover from one network to another have grown dramatically. Recently IETF developed MIPv6 and FMIPv6 which are used to handover between different access networks. These handover mechanisms have some known weaknesses. MIPv6 can not serve time-critical application because it causes long handover latency and packet loss. By these reasons, MIPv6 does not guarantee session continuity. FMIPv6 uses handover preparation phase to reduce DAD latency. However FMIPv66 still suffers from long handover latency, because it must perform binding update at the end of handover procedure. In this paper we propose new handover mechanism FMIPv6-PBU which eliminates binding update latency. The proposed mechanism has compatability with lagacy FMIPv6. In this paper propose FMIPv6-PBU handover procedure and explain its procedures and evaluate it with MIPv6 and FMIPv6.

An Efficient Network Slice Configuration Method in 5G Mobile Networks

  • Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.101-112
    • /
    • 2022
  • In this paper, we analyze 5G network slicing and propose an efficient network slice configuration method in 5G mobile networks. Network slicing can be identified and performed based on the network slice instance information in 5G mobile networks. In case of discordance between the UE's network slice instance information and the network's one, the unnecessary signalling overhead occurs, when the UE's PDU Session Establishment request to the network fails. To solve this problem, this paper proposes two efficient network slice configuration methods, the UE-based ENSC(Efficient Network Slice Configuration) method and the Network-based ENSC method. The proposed schemes perform the prompt the configuration and provision of the updated network slice instance information between the UE and network and improve battery and resource efficiency and minimize unnecessary signalling overhead compared to existing methods in 5G mobile networks.

An Efficient Congestion Control Mechanism for Tree-based Many-to-many Reliable Multicast (트리 기반의 다대다 신뢰적 멀티캐스트를 위한 효율적인 혼잡 제어 기법)

  • 유제영;강경란;이동만
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.656-667
    • /
    • 2003
  • Congestion control is a key task in reliable multicast along with error control. However, existing tree-based congestion control schemes such as MTCP and TRAMCC are designed for one-to-many reliable multicast and have some drawbacks when they are used for many-to-many reliable multicast. We propose an efficient congestion control mechanism, TMRCC, for tree-based many-to-many reliable multicast protocols. The proposed scheme is based on the congestion windowing mechanism and a rate controller is used in addition. The feedback for error recovery is exploited for congestion control as well to minimize the overhead at the receivers. The ACK timer and the NACK timers are set dynamically reflecting the network condition changes. The rate regulation algorithm in the proposed scheme is designed to help the flows sharing the same link to achieve the fair share quickly The performance of the proposed scheme is evaluated using ns-2. The simulation results show that the proposed scheme outperforms TRAMCC in terms of intra- session fairness and shows good level of responsiveness, TCP-friendliness, and scalability. In addition, we implemented the proposed scheme by integrating with GAM that is one of many-to-many reliable multicast protocols and evaluated the performance in a laboratory-wide testbed.

Analysis on Scalability of Proactive Routing Protocols in Mobile Ad Hoc Networks (Ad Hoc 네트워크에서 테이블 기반 라우팅 프로토콜의 확장성 분석)

  • Yun, Seok-Yeol;Oh, Hoon
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.147-154
    • /
    • 2007
  • Network topology in ad hoc networks keeps changing because of node mobility and no limitation in number of nodes. Therefore, the scalability of routing protocol is of great importance, However, table driven protocols such as DSDV have been known to be suitable for relatively small number of nodes and low node mobility, Various protocols like FSR, OLSR, and PCDV have been proposed to resolve scalability problem but vet remain to be proven for their comparative superiority for scalability, In this paper, we compare and amine them by employing various network deployment scenarios as follows: network dimension increase's while keeping node density constant node density increases while keeping network dimension fixed, and the number of sessions increase with the network dimension and the number of nodes fixed. the DSDV protocol showed a low scalability despite that it imposes a low overhead because its convergence speed against topology change is slow, The FSR's performance decreased according to the increase of overhead corresponding to increasing number of nodes, The OLSR with the shortest convergence time among them shows a good scalability, but turned out to be less scalable than the PCDV that uses a clustering because of its relatively high overhead.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.