• Title/Summary/Keyword: 정보교환 기법

Search Result 689, Processing Time 0.029 seconds

Management Technology of Profiles for Providing Adapted Contents to an User in the Ubiquitous Environment (유비쿼터스 환경에서 사용자에게 적응화된 콘텐츠 제공을 위한 프로파일 관리 기술)

  • Kim, Kyung-Sik;Lee, Jae-Dong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.343-357
    • /
    • 2007
  • In this paper, we propose the techniques for effective management of profiles that necessary to provide adaptation content to an user. The profiles must be configured the related information of the user and can be exchanged according to periodic/aperiodic or event among user device, profile repository, contents adaptation server and contents storage server for providing adaptation content to an user. The profiles also must be supplied the contents services providers that need profiles for the adapted contents services. To support those function, we propose the management technologies of profiles and design profile framework supporting those. The proposed management framework of profiles is supported the profiles that are configurated using the various user's information and is used the Web Services for exchanging and providing regardless of the various devices and platform. The dynamic configuration method, metadata configuration method, and profiles providing methods using weight for effective management in the framework also are applied. The result of evaluation the proposed management techniques show effective profiles processing.

Development a Distributed Power Information System Based on Event using XML (XML을 이용한 이벤트 기반 분산 전력 정보 시스템 개발)

  • Kim, Jung-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.89-96
    • /
    • 2009
  • In the future energy environment, a power information system will meet the real-time capability to process the emergency events, unexpected blackouts or over-load, and the high performance to provide the consumer service events such as remote meter reading. In addition to, it must have facility which is able to process a large information occurred on system effectively. In this paper, we developed a distributed power information system based on event with metadata processing technique which was both load balancing and decreased hot spot using XML that was efficient for information exchange. In order to experiment, we made a reduced future power system with controling power device using wireless communications and we could do experiments through it.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

A Delphi study on how to vitalize the blockchain-based NFT

  • Sang-yub Han;Ho-kyoung Ryu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.77-87
    • /
    • 2024
  • In this paper, we propose a study applying the Delphi technique to domestic blockchain experts to determine urgent and pivotal conditions for NFT proliferation. We examine these conditions from a PEST (Political, Economic, Social, and Technological Analysis of the Macro Environment) perspective, as well as the functions of digital assets (measurement, storage, and exchange). Through two rounds of expert surveys on the seven NFT perspectives, we identify 6 activating factors that can help guide future policy-making for the NFT market. These factors have broad implications for the development of new industries using blockchain technology and tokens. The Delphi method employed in this study is a group discussion technique that gathers opinions from experts anonymously through two rounds and to address drawbacks related to expert selection bias and opinion alignment, additional opinion collection and review of projections were conducted in each round.

A Study on Improved SMETA System and Applying Encryption Function (개선된 SMETA 시스템과 암호화적용에 관한 연구)

  • Hwang, In-Moon;Yoo, Nam-Hyun;Son, Cheol-Su;Kim, Won-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.849-856
    • /
    • 2008
  • As the XML is used as the standard format for information delivery and exchange in various fields, the SVG is frequently used as a user interface or expression tool for the embedded system like an internet based mobile phone. The SVG file must contain additional information specifying the structure of the document and it consumes more transmission time than the actual data sent. The SMETA(Svg transmission MEthod using Semantic meTAdata) system[9] is a study to reduce the size of the SVG file by partitioning the SVG file to a minimal size and assigning meaningful meta data to each portion of the data. In this paper, instead of the meta data exchange method for reducing the size of the file exchanged in the existing SMETA system, we studied an improved version of SMETA system that analyzes the data for each user in the server system and only transmits the data that a user needs. In addition, through our simulation, we verified that it provides better performance than the existing system even if encryption is used.

Cluster and Polarity Analysis of Online Discussion Communities Using User Bipartite Graph Model (사용자 이분그래프모형을 이용한 온라인 커뮤니티 토론 네트워크의 군집성과 극성 분석)

  • Kim, Sung-Hwan;Tak, Haesung;Cho, Hwan-Gue
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.89-96
    • /
    • 2018
  • In online communities, a large number of participants can exchange their opinion using replies without time and space restrictions. While the online space provides quick and free communication, it also easily triggers unnecessary quarrels and conflicts. The network established on the discussion participants is an important cue to analyze the confrontation and predict serious disputes. In this paper, we present a quantitative measure for polarity observed on the discussion network built from reply exchanges in online communities. The proposed method uses the comment exchange information to establish the user interaction network graph, computes its maximum spanning tree, and then performs vertex coloring to assign two colors to each node in order to divide the discussion participants into two subsets. Using the proportion of the comment exchanges across the partitioned user subsets, we compute the polarity measure, and quantify how discussion participants are bipolarized. Using experimental results, we demonstrate the effectiveness of our method for detecting polarization and show participants of a specific discussion subject tend to be divided into two camps when they debate.

Mutual-Backup Architecture of SIP-Servers in Wireless Backbone based Networks (무선 백본 기반 통신망을 위한 상호 보완 SIP 서버 배치 구조)

  • Kim, Ki-Hun;Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.32-39
    • /
    • 2015
  • The voice communications with wireless backbone based networks are evolving into a packet switching VoIP systems. In those networks, a call processing scheme is required for management of subscribers and connection between them. A VoIP service scheme for those systems requires reliable subscriber management and connection establishment schemes, but the conventional call processing schemes based on the centralized server has lack of reliability. Thus, the mutual-backup architecture of SIP-servers is required to ensure efficient subscriber management and reliable VoIP call processing capability, and the synchronization and call processing schemes should be changed as the architecture is changed. In this paper, a mutual-backup architecture of SIP-servers is proposed for wireless backbone based networks. A message format for synchronization and information exchange between SIP servers is also proposed in the paper. This paper also proposes a FSM scheme for the fast call processing in unreliable networks to detect multiple servers at a time. The performance analysis results show that the mutual backup server architecture increases the call processing success rates than conventional centralized server architecture. Also, the FSM scheme provides the smaller call processing times than conventional SIP, and the time is not increased although the number of SIP servers in the networks is increased.

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.

A Time Synchronization Protocol of Sensor Nodes Combining Flooding-Routing Protocol with Bidirectional LTS (플러딩 라우팅 프로토콜과 양방향 LTS를 결합한 센서 노드의 시간 동기화 기법)

  • Shin, Jae-Hyuck;Oh, Hyun-Su;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.119-126
    • /
    • 2011
  • In wireless sensor networks Time synchronization used to be performed after routing tree is constructed. It results in increasing the number of packets and energy consumption. In this paper, we propose a time synchronization algorithm combined with flooding routing tree construction algorithm, which applies LTS (Lightweight Time Synchronization) information packed into the forwarding and backward routing packets. Furthermore, the proposed algorithm compensates the time error due to clock drift using the round time with fixed period. We prove that the proposed algorithm could synchronize the time of among sensor nodes more accurately compared to TSRA (Time Synchronization Routing Algorithm) using NS2 simulation tool.