• Title/Summary/Keyword: 식별자-위치 네트워크 프로토콜

Search Result 7, Processing Time 0.023 seconds

A Network-based Locator-Identifier Separation Scheme using DHT in SDN (SDN환경에서 DHT를 이용한 네트워크 기반 위치자-식별자 분리 기술)

  • Lee, Chan-Haeng;Min, Sung-Gi;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • An IP address is used as a host identifier and a locator to bind hosts and applications to their location in existing Internet. Several protocols are proposed to eliminate this binding. Most of these protocols use IPv6-based host identifiers to maintain compatibility with existing Internet, but these identifiers cannot be handled by standard IPv6 routers because such identifiers are unroutable. Therefore, host identifiers need to be usually converted to locators at hosts, and the standard IPv6 protocol should be modified to interoperate with these protocols. In this paper, we propose a network-based host identifier locator separating scheme in software-defined networking. The proposed scheme separates the underlying network into Host Identity and IP domains in order to directly forward unroutable identifiers. The Host Identity domain operates as an overlaid network over IP domain, and it makes the unroutable identifiers to be routable using distributed hash table based routing strategy. For the evaluation, we compared the proposed scheme with the previous scheme using signaling costs and packet delivery costs. The result shows that the proposed scheme is more suitable in the recent mobile-based environments.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

A Technical Trend of Device Identification in WLAN (무선랜 환경에서 디바이스 식별 기술 동향)

  • An, G.I.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.3
    • /
    • pp.57-66
    • /
    • 2013
  • 무선랜이 폭발적으로 증가함에 따라, 기술 발전에 힘입은 네트워크 품질은 많이 향상되었지만, 보안 품질은 아직도 요원한 상황이다. 본고에서는 무선랜상에서 아이디 보안 취약성을 이용한 공격들과 이를 탐지하고 방어할 수 있는 디바이스 식별 기술에 대한 동향을 파악한다. 무선랜상에서 아이디 보안 취약성을 이용하는 MAC 속임 공격은 공격자의 존재를 속일 수 있을 뿐만 아니라, 네트워크 및 시스템 권한을 획득할 수 있기 때문에 네트워크 보안에 큰 위협이 되고 있다. 무선디바이스 식별 기술로서는 인증 방식, 프로토콜 분석 방식, 위치확인 방식, RF 지문 방식 등 많은 기법들이 있다. 본고에서는 이러한 기술들 중에서 현재 가장 활발하게 연구되고 있는 RF 지문 기술을 시스템 구조, 디바이스 식별 방법, 보안 취약성, 그리고 보안 응용 관점에서 자세히 분석한다.

  • PDF

A Study on Evolution of Internet Architecture based on ID and Locator split (Identifier와 locator 분리 기반의 인터넷 구조 확장 연구)

  • You Tae-Wan;Lee Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.986-989
    • /
    • 2006
  • 앞으로의 네트워크는 Convergence와 Integrate라는 키워드를 기반으로 IP 중심의 통합된 망으로 발전되고 있다. IP 중심의 망은 각각의 다양한 access 기술을 포함하며, voice, multimedia, 그리고 새롭게 정의되는 서비스가 모두 제공될 수 있어야 한다. 따라서 점차 인터넷을 중심으로 하는 하나의 통합된 망의 형태로 진화 될 것이다 이러한 차세대 네트워크상의 단말은 소형화, 지능화, 그리고 이동성을 지니고 있으며, 다양한 access 기술을 사용하기 위한 multiple 인터페이스를 가진 멀티호밍 환경에 놓여있다. 따라서 이 네트워크는 기본적으로 이동성과 멀티호밍을 지원해야 하는 것이다. 그러나 현재 인터넷의 핵심인 Internet Protocol 구조는 이를 지원하지 못한다. 현재 IP 주소는 최종 단말의 식별자 (Identifier)와 단말의 위치 식별자 (locator)의 의미를 함께 사용하고 있어, 통신 중인 단말이 이동하면 IP 주소도 변경되어 통신 중인 세션이 끊기는 문제가 발생한다. 멀티호밍 환경에서도 역시 통신 중인 노드들의 경로를 바꾸게 되면 세션이 끊기게 되는 문제가 발생한다. 본 논문은 이와 같은 린 구조의 근본적인 문제를 해결하기 위해 Identifier와 locator를 분리하며, 단순하게 단말에 스택으로 존재하는 L3SHIM을 소개하고, 모든 단말에 이 기능이 지원되었을 때 기존의 인터넷 프로토콜의 확장과 인터넷의 구조에 어떤 영향을 줄 수 있는지에 대해 선행 연구를 하였다.

  • PDF

A Study on an Efficient Routing Algorithm for Wireless Sensor Network (무선 센서네트워크에서 효율적인 라우팅 알고리즘에 관한 연구)

  • Kim, Byoung-Chan;Yim, Jae-Hong;Choi, Hong-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.887-898
    • /
    • 2009
  • Conventional routing protocols proposed for wireless sensor networks (WSNs) cannot fully accommodate the characteristics of WSNs. In particular, although it is possible to largely obtain benefits in the solution of energy consumption and global identification problems through applying position information, there are few protocols that actively apply such position information. In the case of geographical and energy aware routing (GEAR) that is a typical algorithm, which uses position information, it does not fully represent the characteristics of WSNs because it is limited to forward query messages and assumed as fixed network environments. The routing protocols proposed in this paper defines the direction of data, which is routed based on the position information of individual and target nodes, in which each node configures its next hop based on this direction and routes signals. Because it performs data-centric routing using position information, it does not require certain global identifications in order to verify individual nodes and is able to avoid unnecessary energy consumption due to the forwarding of packets by defining its direction.

Mobility Management for ILNP-based Tactical Network (전술 네트워크를 위한 ILNP 기반 환경에서의 이동성 관리 기술)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.246-256
    • /
    • 2020
  • In the future Network Centric Warfare(NCW), changing to IPv6 based network environment is required to enable various future technologies such as the Internet of Things(IoT) and cloud technology which are expected to be introduced to the tactical network evolution. With the change to the IPv6 network, an ID/LOC(Identifier/Location) separation protocol that decomposes context of the IP address to location and identifier can enhance network capacity of increasing number of device and provide efficient mobility management in the tactical network that changes topology dynamically. In this paper, we choose ILNP(Identifier-Locator Network Protocol) as an ID/LOC separation for tactical network environment. In addition to ILNP-based tactical network design, this paper proposes a network-based mobility management scheme for providing efficient mobility management. Through numerical performance analysis, we show that the proposed scheme can reduce network loads more effectively than the conventional IP-based mobility management scheme and common handover procedure in ILNP.

A Comparative Study on Off-Path Content Access Schemes in NDN (NDN에서 Off-Path 콘텐츠 접근기법들에 대한 성능 비교 연구)

  • Lee, Junseok;Kim, Dohyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.319-328
    • /
    • 2021
  • With popularization of services for massive content, the fundamental limitations of TCP/IP networking were discussed and a new paradigm called Information-centric networking (ICN) was presented. In ICN, content is addressed by the content identifier (content name) instead of the location identifier such as IP address, and network nodes can use the cache to store content in transit to directly service subsequent user requests. As the user request can be serviced from nearby network caches rather than from far-located content servers, advantages such as reduced service latency, efficient usage of network bandwidth, and service scalability have been introduced. However, these advantages are determined by how actively content stored in the cache can be utilized. In this paper, we 1) introduce content access schemes in Named-data networking, one of the representative ICN architectures; 2) in particular, review the schemes that allow access to cached content away from routing paths; 3) conduct comparative study on the performance of the schemes using the ndnSIM simulator.