• Title/Summary/Keyword: 재전송 지속성

Search Result 28, Processing Time 0.031 seconds

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

A Study on the Differentiated Services Adaptation Scheme using MPLS over ATM in the Defense Information System Network (국방전산망에서 ATM기반 MPLS를 이용한 차등서비스 적용방안에 관한 연구)

  • Kim, Sung-Soon;Lee, Sung-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.1257-1260
    • /
    • 2003
  • 현재 국방전산망은 인터넷과 마찬가지로 Best Effort 서비스만을 지원하고 있으나 급속도로 발전하는 외부의 미래 네트워크 환경에 대비하여 지속적으로 진화가 추진되고 있다. 본 논문에서는 미래 국방전산망의 요구사항인 서비스의 차별화에 관점을 두고 신속하고 신뢰성 있는 중요 의사결정 자료 전송을 위해 국방전산망에 ATM기반 MPLS 기술을 적용하여 군 기능별 차등서비스 제공방안 및 서비스 우선순위에 따른 트래픽 재 할당에 대하여 제안 하고자 한다.

  • PDF

Enhancement of WiBro PKMv2 EAP-AKA Authentication Security Against Rogue BS based Redirection Attacks (WiBro PKMv2 EAP-AKA 기반 인증 과정에서의 Redirection Attack 에 대한 보안 취약성 및 개선 방안)

  • Lee, Hyun-Chul;Eom, Sung-Hyun;Cho, Sung-Jae;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1210-1213
    • /
    • 2007
  • WiBro는 무선랜과 3G 이동통신의 장점을 결합한 휴대 인터넷 기술로 최근 국내에서 상용화 되었다. WiBro의 장점인 이동성과 고속 무선 통신에 기인하여, 향후 지속적인 발전이 기대된다. 이러한 WiBro의 확산에 따라 개인 사용자에 대한 보안문제가 최근 크게 부각되고 있다. 현재 Wibro는 3G 이동통신 및 무선랜과 효율적인 연동을 위해 EAP-AKA 인증기법을 사용하고 있다. 하지만 EAP-AKA는 단말이 기지국을 인증하지 못하는 치명적인 취약점이 있다. 따라서 공격자는 임의로 rogue BS를 설치할 수 있고, 정상 사용자의 데이터를 이종 네트워크로 보내는 Redirection Attack을 시도할 수 있다. Redirection Attack은 전송 속도 저하, Denial-of-Service (DoS) 을 초래하며, 데이터가 redirection 되는 이종 네트워크에 따라 암호화된 데이터가 노출될 수 있다. 본 논문에서는 EAP-AKA와 Redirection Attack에 대해 분석하고, 그 해결책을 제시한다. 논문은 1) 프로토콜을 일부 수정하여 공격을 막는 방법과 2) traffic 분석을 통한 공격 탐지 방식을 다루고 있으며, 이러한 두 가지 방법을 통해 Redirection Attack에 대한 취약점을 근본적으로 제거할 수 있다.

  • PDF

A Study on IISS Software Architecture of Combat Management System for improving modifiability

  • Park, Ji-Yoon;Yang, Moon-Seok;Lee, Dong-Hyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.133-140
    • /
    • 2020
  • The IISS(Integrated Interface Storage System) software uses communication methods such as DSS(Data Sharing Service), UDP to perform the function of sending all messages from the Combat Management System to the analytical computer. Because IISS software handles all message used in the Combat Management System, the source code is large and has a highly dependent feature on message changes. Modification of software is a task that requires a lot of labor, such as series of software reliability test. so research has been conducted to reduce software development costs, including minimizing software modifications. In this paper, We study the method of messages receiving and architectural structure improvement to minimize reliance on message changes in the Combat Management System and improve the modifiability. Reduced message dependency by changing the way DSS and UDP protocols are communicated to Packet Sniffing. In addition, Factory Method Pattern were applied to improve the software design. Test comparing existing software and development elements have confirmed that the software has improved its modifiability and reuse.

A smartphone toy control system based on bluetooth using stop-and-wait ARQ protocol (Stop-and-Wait ARQ 프로토콜을 적용한 스마트폰의 블루투스 기반 완구 제어 시스템)

  • Song, J.H.;Kim, H.K.;Shin, O.K.
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.6
    • /
    • pp.723-729
    • /
    • 2014
  • When the bluetooth technology of smartphone is applied to a remote control system, communication errors caused by wave attenuation and interference results in the shortening of communication distance, loss of the target device control and malfunctioning. In this study, we propose a method to adopt a retransmission persistence controlled S/W ARQ in bluetooth communication to minimize the effect of the communication failure and to detect and handle the state where the target device gets lost control. We implemented a motor-driven RC car equpped with a bluetooth communication module and a steering application program on smartphone to test the proposed method. The experiments are conducted in three communication environments, and have resulted in the increase of the communication distance by at least 30% when S/W ARQ is applied. Moreover, when the communication was disrupted due to environmental disturbances, the S/W ARQ based system stopped immediately any undergoing operations to avoid possible malfunction.

Enhancement of Power System Stability using Flywheel Energy Storage System (플라이휠 에너지 저장장치를 이용한 전력계통의 안정도 향상)

  • Lee, Jeong-Phil;Han, Snag-Chul;Han, Young-Hee
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.79.2-79.2
    • /
    • 2011
  • 플라이 휠 에너지 저장장치(Flywheel Energy Storage System: FESS)는 전기 에너지를 회전 운동 에너지로 저장하였다가 필요시 회전 운동에너지를 전기 에너지로 변환하여 재사용 가능한 에너지 저장장치 이다. 최근 전력 변환 기술의 발전으로 인하여 플라이휠 에너지 저장 장치의 에너지 입출력 속도가 빨라지고 대용량의 에너지를 저장할 수 있게 되었다. 본 논문에서는 이러한 플라이휠 에너지 저장 장치의 전력 입출력 특성을 이용하여 전력 시스템에서 발생하는 저주파 진동(Low frequency oscillation)을 억제하는 방안을 제시 하여 안정도를 향상 시키고자 하였다. 전력 시스템은 발전조건, 전송조건, 부하조건에 따라 동작 조건이 지속적으로 변하고 있다. 이러한 동작 환경 변화는 전력 시스템에 대한 수학적인 표현과 실제 전력계통간의 차이가 발생하기 때문에 정확한 제어 목적을 달성하기가 힘들다. 따라서 본 논문에서는 제어기 설계 단계에서 전력 계통의 불확실성을 고려할 수 있는 $H_{\infty}$ 제어 기법을 이용하여 플라이휠 에너지 저장장치를 위한 강인 제어기를 설계 하였다. 제안한 플라이휠 에너지 저장장치의 강인 제어기의 유용성을 입증하기 위하여 1기 무한대 모선에 적용한 결과를 비선형 시뮬레이션을 통하여 다양한 외란이 발생한 경우에 외란 억제 성능과 강인성에 대하여 고찰 하였으며, 제안한 방식이 기존의 전력계통 안정화 장치(Power system stabilizer: PSS) 보다 효율적이며 전력계통의 안정도 향상에 크게 기여함을 보이고자 하였다.

  • PDF

Performance Analysis of Seamless Interworking Handover for Supporting MMS Continuity over WLAN and CDMA2000 Networks (WLAN과 CDMA2000 이종 네트워크에서 MMS 서비스의 연속성을 제공하기 위한 새로운 핸드오버의 성능 분석)

  • Kim, Su-Yong;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.2
    • /
    • pp.128-137
    • /
    • 2006
  • Recently, the combination of WLAN and 3G wireless technologies will make MMS service more ubiquitous, bringing benefits to both service providers and their customers. To realize seamless MMS service over WLAN and CDMA2000 networks, we design novel seamless interworking architecture by reusing the existing standards and network elements at the same time. Based on the proposed seamless interworking architecture, we also present seamless notification architecture and seamless handover architecture that can't be possible within current MMS reference architecture. This paper will make a contribution for service providers to provide their customers with seamless MMS service over WLAN and CDMA2000 networks.

  • PDF

Low-power Routing Algorithm using Routing History Cache for Wireless Sensor Network (RHC(Routing History Cache)를 사용한 저전력 소모 라우팅 알고리즘)

  • Lee, Doo-Wan;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2441-2446
    • /
    • 2009
  • Wireless Sensor Network collects a data from the specific area and the control is composed of small sensor nodes. Like this sensors to after that is established at the beginning are operated with the battery, the operational duration until several years must be continued from several months and will be able to apply the resources which is restricted in efficiently there must be. In this paper RHC (rounting history cache) applies in Directed Diffusion which apply a data central concept a reliability and an efficiency in data transfer course set. RHC algorithms which proposes each sensor node updated RHC of oneself with periodic and because storing the optimization course the course and, every event occurrence hour they reset the energy is wasted the fact that a reliability with minimization of duplication message improved.

Wireless Sensor Networks have Applied the Routing History Cache Routing Algorithm (무선센서 네트워크에서 Routing History Cache를 이용한 라우팅 알고리즘)

  • Lee, Doo-Wan;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1018-1021
    • /
    • 2009
  • Wireless Sensor Network collects a data from the specific area and the control is composed of small sensor nodes. Like this sensors to after that is established at the beginning are operated with the battery, the operational duration until several years must be continued from several months and will be able to apply the resources which is restricted in efficiently there must be. In this paper RHC (rounting history cache) applies in Directed Diffusion which apply a data central concept a reliability and an efficiency in data transfer course set. RHC algorithms which proposes each sensor node updated RHC of oneself with periodic and because storing the optimization course the course and, every event occurrence hour they reset the energy is wasted the fact that a reliability with minimization of duplication message improved.

  • PDF

A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments (다중 서버 환경에서 안전성이 향상된 스마트카드 기반 인증 프로토콜 설계에 관한 연구)

  • Bae, Won-il;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.329-341
    • /
    • 2017
  • A multi-server architecture has been proposed to increase the efficiency of resources due to the rapid growth of computer networks and service providing servers. The smartcard-based authentication protocol in the multi-server environments has been continuously developed through various studies. Recently, Chun-Ta Li et al proposed an authentication protocol that solves Xiong Li el al's authentication protocol vulnerability to user impersonation attack and session key disclosure attack. However, Chun-Ta Li et al's authentication protocol has a problem with user impersonation in the vulnerability analysis and has an unsuitable authentication process. Therefore, this paper proposes a smartcard-based authentication protocol in the multi-server environments that solves the denial of service attack and replay attack vulnerabilities of the authentication protocol proposed by Xiong Li et al.