• Title/Summary/Keyword: 접속형태

Search Result 488, Processing Time 0.023 seconds

A Cryptographic Model to Protect Private Information against Malicious Proxy in Jini (악의적 지니 프록시로부터 비밀 정보 보호를 위한 암호학적 모델)

  • Yang Jong-Phil;Rhee Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.27-34
    • /
    • 2006
  • In the near future, people will wish to access many kinds of heterogeneous networks to use their services anytime and anywhere. Owing to the heterogeneity of networks, there must be many kinds of protocols to guarantee secure services. The mobile device can depend in a middleware for accessing services in the heterogeneous networks and the middleware helps the mobile device to communicate with services without blowing concrete protocols. If a secure channel is necessary, the middleware may access a private key in the mobile device to perform a security protocol. In this paper, we focus on the security of a private key in the mobile device against malicious middlewares. To do so, we introduce two models for a user to protect his/her private key against malicious middlewares by generating authentication data(e.g., digital signatures) without keeping the private key in the mobile device.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

A Study on Algorithm of the Integrated Communication System in Radio Station (무선국의 통합 시스템에 대한 알고리즘의 연구)

  • 조학현;최조천;김기문
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.545-551
    • /
    • 1998
  • The Radio communication by existing SSB, VHF, etc. in a coast station and a base station for military affairs is still used to a very important the device of information delivery or transmitting and receiving by the remote controller to using to the exclusive cable for a equipment established at a long distance. When a number of consumer to connected and operated by a number of transceiver is essential for a circuit controller of ICS, in KOREA, is devoted by import to considerable quantity because of to be delayed development of this field. This Paper has been realized to optimal algorithm and designing of a circuit connection controller by multi-processor to pre-stage for the development of ICS. The H/W is composed able to remote control to circuit connector with the several slave processor and a processor for master, and this has taken possible through without any obstacle to communication circuits of a control signal by FSK system. The S/W make possible monitoring for communication condition of other circuits by means of a serial communication system by the multi-processing. This paper has been studied for connecting to a circuits wished to rapidly and precisely by the full application to a interrupt technique. A technique to control by remote to a number of transceiver is a way increasing to application for a frequency resource of the limited MF/SF, VHF and the existing radio communication technique. According to, this paper will achieve to be the reduction of energy & equipment and multiplicity of information delivery in the general communication and disposal to rapid and exact for the important communication as distress, urgency and safety on the sea.

  • PDF

An Empirical Analysis of the Influence of Connectivity and Context-Awareness Functions of Ubiquitous Decision Support System (UDSS) on User's Decision Making Process (유비쿼터스 의사결정지원시스템의 접속성과 상황인식기능이 사용자 의사결정과정에 미치는 영향에 관한 연구)

  • Lee, Kun-Chang;Chung, Nam-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.1-20
    • /
    • 2008
  • This study is aimed at proposing a new approach to designing UDSS (Ubiquitous Decision Support System) which allows context-awareness and connectivity. In the previous studies, the need to design UDSS and analyze its performance empirically was raised. However, due to the complexity of empirical approaches, there is no study attempting to tackle this research issue so far. To fill this research void, this study proposes a Mobile Delivery System (MDS) as a form of UDSS, empirically analyzing how users perceive its context-awareness and connectivity functions. Especially, to add more rigor to the proposed approach to know how much it works well in the decision-making contexts, we considered three decision making phases (intelligence, design, choice) in the research model. With the valid questionnaires collected from 340 users of the MDS, we induced statistically proven results showing that both context-awareness and connectivity of the proposed UDSS (or MDS) influence the decision making steps positively and then contribute to improving the decision making quality.

  • PDF

The Effects of the change in Telecommunication Regulation on Advanced Network Investment (규제정책의 변화가 고도 통신망 투자유인에 미치는 영향분석)

  • Jung, Choong-Young;Jung, Song-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1405-1414
    • /
    • 2011
  • This paper analyzes the impact of the change in telecommunication regulation on network investment such as the integration of telecommunication service. The integration of telecommunication service plays a role of separating the behavior regulation from entrance regulation and reducing a entrance constraints. Therefore, it is expected that the market spill over effect is high through the improvement of behavior regulation such as interconnection regulation, facilities provisions, retail price regulation, bundling, number portability of VoIP. This paper discusses the critical factor affecting the decision making process in respect of the firm level and analyzes the impact path guiding investment and innovation. Finally, the paper proposes the guideline for telecommunications policy.

The Repetition Effects of LDP Stimulus Words on Word Completion Tasl and Cued-Recall Task (처리깊이에 따른 학습단어의 반복제시가 단어완성검사와 단서 회상검사에 미치는 효과)

  • Kim, Mi-Ra;Lee, Man-Young
    • Korean Journal of Cognitive Science
    • /
    • v.7 no.3
    • /
    • pp.115-134
    • /
    • 1996
  • The study was designed to investigate implicit and explicit memory for words with processing theory.From experiment 1 to experiment 3,in a study phase,subjects first viewed stimulus words and were required to rate likeness of words of semantic processing task and to count lines of words of perceptual processing task.In a test phase,subjects were tested by implicit word completion task and explicit cued recall task.In experiment 1,levels of processing (LOP)effects were examined.Lop effects were obtained on the explicit memory tasks but not on the implicit memory tasks.In experiment 2,repertition of perceptual processing task influenced onlu implicit memory task.In experiment 3,bepertiotion of semantic processing task affected both implicit memory task and explicit memory task.These findings suggest that repetition effect of stimulus words are explanied better in dual process theory than transfer-appropriate processing theory.

  • PDF

Address Auto-configuration in Broadband Convergence Networks for Supporting Multi-Hop User Access Networks (BcN에서 멀티 홉 사용자 액세스 망 수용을 위한 자동 주소 설정)

  • Park, Il-Kyun;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.809-816
    • /
    • 2005
  • MANET(mobile ad hoc network) cn be one of the access networks of BcN(broadband convergence network), and an user node requires address auto-configuration protocol for mu14i-hop environment. Some address auto-configuration protocols are proposed for independent MANET, but they don't consider BcN-accessable MANET environment. In this paper, new address auto-configuration protocol for wireless nodes is proposed. With this proposal, they ran configure their global addresses automatically in hybrid MANETs as BcN access networks. The autoconfiguration protocol modifies IPv6 NDP(neighbor discovery protocol) messages to deliver global prefix information to all wireless nodes, and avoids message boradcasting to minimize network overhead.

A Service Push System Based on JXTA (JXTA 기반 서비스 푸시 시스템)

  • Cho, Yoon-Sik;Jung, In-Hwan;Hwang, Ki-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1B
    • /
    • pp.56-66
    • /
    • 2009
  • In the traditional Server/Client architecture, the client connects to the known servers and gets information through web searching. However, nowadays, diverse internet devices providing services (get) working on internet easily. The update interval of the services or information provided by the devices is relatively short. And also they tend to be both a server and a client. In this situation, the way of the traditional information searching such as web searching is not appropriate. In this paper we propose a service push model, where it pushes its service profiles to all the other network devices by broadcasting them on the network. When a device connects to the network newly, it can get all service profiles in the network and it gets service profiles newly pushed by service providers in prompt. Also it can call any service among the service profiles within itself. We implemented a prototype system for the service push model on the JXTA platform based on P2P network. Also we measured the service profile pushing delay, the service discovery time, and the response time of service execution by running test applications written on the prototype system.

Implementation of RFID Data Transmission System using Wireless LAN (무선LAN 기반 RFID 데이터 전송시스템 구현)

  • 김종호;김영길;백수열
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.6
    • /
    • pp.1055-1059
    • /
    • 2004
  • A RFID(Radio Frequency Identification) system is a kind of radio frequency communication system and a branch of automatic data collection system. RFID system consists of RFID tags(or transponders) and RFID readers(controllers). This paper deals with the wireless communication that acquires tag IDs through RFID readers, and show the implementation of the target system which transmits tag IDs and related information to the server on the Internet through the wireless local area network. Today's RFID systems are usually implemented with the wired communication environment. In this paper, however, RFID system is effectively realized with the widely deployed wireless local area network and various RFID data can be collected by the readers which are communicating with the wireless access points of the local area network. Through the Internet, users also can have easy access to the server on the web and retrieve, analyze, and utilize tags' information.

A Framework for Multiple Wireless Services in Heterogeneous Wireless Networks (중첩된 이기종 무선망에서의 다중 무선 서비스 프레임워크)

  • Shin, Choong-Yong;Cho, Jin-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.85-94
    • /
    • 2008
  • As a variety of wireless network services, such as WLAN, WiBro, cdma2000, and HSDPA, are provided and the range of users' choices for the wireless services are broaden, MCoA (Multiple Car-of Address) concepts that enable users to use wireless interfaces simultaneously have been presented in IETF MONAMI6 WG. Through this scheme, users can access several networks simultaneously by using multiple wireless interfaces. Such various wireless connection technologies continue to advance as they are connected and integrated to All-IP-based core network, and at the same time, heterogeneous networks are being managed overlaid according to the coverage of the wireless connection technologies. Under such circumstances, needs for an integrated architecture have arisen, and thus Wireless service framework is required that effectively manages heterogeneous networks which coexist with next generation's networks for 4G. In this paper, a wireless service framework is suggested in the consideration of current wireless service environment, and the framework covers the schemes to minimize the packet loss caused by handover, and also modified Multiple Care-of Address that helps to select most effective network by considering characteristics of various interfaces as well as users' preferences.

  • PDF