• Title/Summary/Keyword: 임시망

Search Result 60, Processing Time 0.027 seconds

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.

Dynamic Source Multi-path Routing Protocol for Wireless Ad-hoc Network Environments (무선 에드-혹 네트워크 환경을 위한 동적다중경로라우팅 프로토콜)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.336-346
    • /
    • 2001
  • A wireless ad-hoc network is a temporal network formed by a collection of wireless mobile nodes without the aid of any existing network infrastnlcture or centralized administration. Currently, numerous routing protocols have been developed for changing messages between nodes in a wireless ad-hoc network. Applications of wireless ad-hoc network technology are various and proper routing protocol must be used according to application domain or network size. In a wireless ad-hoc network. some hosts want services from fixed networks. For supporting such services, it is necessary to interconnect wireless ad-hoc networks and fixed networks. The DSMIHDynamic Source Multipath Routing) protocol, proposed in this paper, focuses on supporting seamless communication services between the nodes within a wireless ad-hoc network and providing fixed networks to the mobile hosts in wireless an-hoc networks. In DSMR protocol, each node need not broadcast routing messages periodically. and mobile hosts that to send data packets initiate route request and route establishment procedure. By maintaining multiple paths in each node. faster route re-establishment is also possible in our scheme.

  • PDF

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

Analysis of Power-Saving Protocols for Multi-hop Ad Hoc Networks (다중 홉 Ad Hoc 망에서 Power-Saving 프로토콜의 성능분석)

  • 김동현;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.203-207
    • /
    • 2003
  • Mobile Ad Hoc Network is a kind of network technology, that mobile hosts can compose networks freely and temporarily where the base networks don't exist and where its establishment is difficult or as occasion demands. Ubiquitous computer network is prograssing in the forms of miniaturization, lightweight or portability. So far, MANET was studied in the point how to route it efficiently, but its power saving problems are been issuing nowadays. We try to not only compare and analyze power saving protocols in multi-hop Ad Hoc network but also present their efficiencies in this thesis.

  • PDF

A Study on Improving TCP Performance in Wireless Network (무선 네트워크에서 TCP성능향상을 위한 연구)

  • Kim, Chang-Hee
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.279-289
    • /
    • 2009
  • As the TCP is the protocol designed for the wired network that packet loss probability is very low, because TCP transmitter takes it for granted that the packet loss by the wireless network characteristics is occurred by the network congestion and lowers the transmitter's transmission rate, the performance is degraded. In this article, we suggest the newly improved algorithm using two parameters, the local retransmission time value and the local retransmission critical value to the BS based on the Snoop. This technique adjusts the base stations local retransmission timer effectively according to the wireless link status to recover the wireless packet loss rapidly. We checked that as a result of the suggested algorithm through various simulations, A-Snoop protocol improve more the wireless TCP transmission rate by recovering the packet loss effectively in the wireless link that the continuous packet loss occur than the Snoop protocol.

  • PDF

An Efficient Multi-Hop Cluster Routing Protocol in Mobile Ad Hoc Network (이동 임시무선망에서의 효율적인 다중 홉 클러스터 라우팅 프로토콜)

  • Kim Si-Gwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2005
  • An ad hoc wireless networks forms temporary network without the aid of fixed networks or centralized administration with a collection of wireless mobile hosts. In this case, it is necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. This paper presents an efficient cluster-based routing protocol scheme for ad hoc networks. The cluster is used for path setup and data delivery. Our cluster-based routing algorithm is designed for the improvement of the load balance. Our simulation results show the improved performance for low mobility networks comparing with the previous works.

  • PDF

Development of a Framework for Certification and Audit of ASP (ASP 인증ㆍ감리를 위한 프레임워크 개발)

  • 안재근;양정환;임춘성
    • Proceedings of the CALSEC Conference
    • /
    • 2000.08a
    • /
    • pp.255-263
    • /
    • 2000
  • 네트워크를 통해 어플리케이션을 임대해주는 정보시스템 서비스 모델인 ASP 모델이 IT 시장에서 새로운 비즈니스 모델로 등장하였다. 그러나 ASP 모델은 기존의 정보시스템 모델에 비해 특정 서비스에 많은 서비스제공자가 임시적으로 결합되고, 정보자산이 공중망과 데이터센터에 위치하는 특징을 가지고 있다. 그러므로 ASP 서비스를 성공적인 수행하기 위해서는 ASP 사업자가 서비스의 제공능력이 있는지에 대한 인증활동과 ASP 서비스 도입 및 운영과정이 적절하게 이루어지고 있는가에 대한 감리활동이 요구된다. 따라서 본 연구는 ASP의 특징을 분석하고, ASP 인증ㆍ감리 프레임워크를 설계를 수행하고자 한다. 이를 위해, 기존연구를 바탕으로, 분류기준을 기술적 계층, 수명주기, 공급자/고객의 관점이라는 세 가지 차원에서 정의하며, 각각의 세부항목 및 내용을 정의하고자 한다.

  • PDF

Performance of VoIP Traffics over MANETs under DDoS Intrusions (DDoS 침해가 있는 MANET에서 VoIP 트래픽의 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.493-498
    • /
    • 2011
  • In this paper, Transmission performance over MANET(Mobile Ad-hoc Networks) under DDoS Intrusions is evaluated. Intrusion counterplan requirement, which have to be used for MANET under DDoS intrusions, is suggested through this evaluation. VoIP simulator based on NS-2 network simulator is used for performance measurement. MOS, network delay, packet loss rate and call connection rate is measured with this simulation. Finally, requirement of intrusion continuing time shorter then 10 seconds is suggested for VoIP service over MANETs under DDoS intrusions.

Transient Stability Analysis on Nuclear Power System- Shin Kori 1 Unit (대규모 원전 건설에 따른 과도 안정도 해석.신고리1호기 중심)

  • Zhu, O.P.;Kim, B.K.;Lee, S.K.;Oh, P.S.;Kim, K.J.
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.59-61
    • /
    • 2008
  • 본 논문에서 개발된 TSDAP(Transient Stability Dynamic Analysis Program)을 이용하여 신고리1호기 건설에 따른 과도 안정도 채석을 수행하였다. 개발된 TSDAP파 PSS/E프로그램을 비교하여 프로그램의 유용성을 입증하였고, 2011년 765kV건설지연에 따라 임시로 운용되는 345kV 송전망의 과도 안정도를 살펴 보았다.

  • PDF

Support of IPv4 Service using the DSTM in IPv6 Netwroks (IPv6망에서 DSTM을 이용한 IPv4 서비스 제공방안)

  • 이승민;민상원;이숙영;신명기;김용진
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.535-537
    • /
    • 2001
  • IPv6 초기 도입단계에서는 IPv4와 IPv6 (Internet protocol version 6)의 혼용이 예상됨에 따라 초기 IPv6 네트워크는 기존 IPv4와의 연동 및 호환을 위해 트랜지션 (transition) 메커니즘과 상호공존 (coexistence mechanism) 메커니즘을 필요로 한다. 이를 위해 다양한 트랜지션 메커니즘들이 제안되고 있는데 크게 터널링 (tunneling)과 변환 (translation) 방식으로 구분할 수 있다. 본 논문은 이러한 메커니즘 중에서 터널링을 이용한 DSTM (dual stack transition mechanism)을 분석한 후 제안된 DSTM의 각 연결별 임시 IPv4 주소할당에 대한 비합리적인 문제점을 개선한 모델을 제시하였다. 본 논문예서 제안한 모델은 기존의 NAT (network address translation) 방식과 유사하게 단일 IPv4 주소와 포트 넘버를 이용하여 각 연결을 식별할 수 있도록 한다. 그리고 DSTM 시스템 구현을 위한 효율적인 알고리즘 설계를 통해 IPv4 패킷을 IPv6 패킷으로 캡슐화 (encapsulation)하여 전송할 수 있는 인터페이스를 구현하여 결과를 분석하였다.

  • PDF