• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.027 seconds

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

An User Authentication Mechanism in the OSGi Service Platform Environment (OSGi서비스 플랫폼 환경에서의 사용자 인증 메커니즘)

  • 전경석;문창주;박대하;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.191-204
    • /
    • 2003
  • In the home gateway environment, several characteristics for the user authentication mechanism should be reflected separately from the existing distributed service environment. First, the platform of a home gateway is a component based system that its services are installed dynamically. Second, the convenience that user can use several services by authentication of once should be offered. Finally, the system resources of a home gateway are restricted. However, a user authentication mechanism that reflected these characteristics is not shown at the user admin service specification of the OSGi service platform.(OSGi is the representative standardization organization of hone gateway.) Also, there is no existing authentication protocol that satisfies these qualities at the same time. In this paper, we propose a new user authentication mechanism considering those characteristics for the home gateway environment. We also design and implement an independent authentication service bundle based on the OSGi service platform so that it can perform user authentication operations for each bundle service. We supplement and extend the Kerberos Protocol that can apply.

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

A Dynamic Limited Contention-based Algorithm for Fast Registration in UTIS (UTIS에서 효율적인 등록을 위해 동적으로 그룹 크기를 조절하는 제한적 경쟁 알고리즘)

  • Oh Kyung-Sik;Ahn Jong-Suk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.316-318
    • /
    • 2006
  • 본 논문에서는 차세대 지능형 교통시스템인 UTIS(Urban Traffic Information System)의 빠른 접속 요구 조건을 만족하기 위한 DLC(Dynamic Limited Contention) 알고리즘을 제안한다. UTIS 네트워크는 고속으로 이동하는 차량에 설치된 모바일 노드와 도로 변에 설치된 노변 기지국으로 구성되며, 이 네트워크를 통해서 IP 데이터 그램의 전송 서비스, 방송 데이터를 실시간으로 전송하는 실시간 전송 서비스 그리고 차량의 위치를 계속적으로 알려 주는 위치 탐색 서비스를 지원한다. 이러한 전송 서비스를 지원하기 위해서 UTIS는 물리 계층과 MAC 계층으로 구성된다. 그러나 UTIS에서는 차량의 고속 이동으로 인해서 셀(cell)간의 핸드오프가 빈번히 발생하고 또한 위치 추적과 방송 서비스와 같은 실시간 전송 서비스를 지원해야 하기 때문에 기존의 802.11 MAC을 사용할 수 없다. 즉 UTIS에서의 빠른 등록 요구 조건을 충족시키기 위해 기존의 802.11에서 사용하는 경쟁(contention) 방식은 비효율적이다. 본 논문에서는 셀 내에 도착하는 노드 수에 따라 경쟁을 하는 그룹의 크기를 동적으로 조절하는 DLC 알고리즘을 제안한다. 기존의 UTIS에서는 그룹 크기를 정적으로 결정하고 모바일 노드는 자신의 주소에 이 정적 그룹 크기로 modulo하여 자신의 속한 그룹을 초기에 계산한다. 기지국이 접속해야하는 그룹을 폴링 메시지로 지정할 때 그 그룹에 속한 모바일 노드들만이 제한적으로 경쟁하게 된다. 이러한 정적인 그룹 크기는 셀 내에의 노드의 숫자와 그룹 크기의 분포를 고려하지 않는 방식으로 비효율적이다. 본 DLC 알고리즘에서는 전 폴링 주기 동안에 경쟁하는 노드의 빈도수를 계속적으로 추적하여 등록 시점에 경쟁하는 그룹의 개수를 동적으로 조절하게 된다. 이러한 방식은 UTIS와 같이 접속 시간이 제한적이고 접속하려는 노드 수가 빠르게 변화하는 환경 하에서 기존의 802.11 MAC 프로토콜과 정적인 그룹 크기 방식에 비해 효율적이다.

  • PDF

A New Simple Power Analysis Attack on the m-ary Exponentiation Implementation (m-ary 멱승 연산에 대한 새로운 단순 전력 분석 공격)

  • Ahn, Sung-Jun;Choi, Doo-Ho;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.261-269
    • /
    • 2014
  • There are many researches on fast exponentiation algorithm which is used to implement a public key cryptosystem such as RSA. On the other hand, the malicious attacker has tried various side-channel attacks to extract the secret key. In these attacks, an attacker uses the power consumption or electromagnetic radiation of cryptographic devices which is measured during computation of exponentiation algorithm. In this paper, we propose a novel simple power analysis attack on m-ary exponentiation implementation. The core idea of our attack on m-ary exponentiation with pre-computation process is that an attacker controls the input message to identify the power consumption patterns which are related with secret key. Furthermore, we implement the m-ary exponentiation on evaluation board and apply our simple power analysis attack to it. As a result, we verify that the secret key can be revealed in experimental environment.

A Simulation of 3-D Navigation System of the Helicopter based on TRN Using Matlab

  • Kim, Eui-Hong;Lee, Hong-Ro
    • Spatial Information Research
    • /
    • v.15 no.4
    • /
    • pp.363-370
    • /
    • 2007
  • This study has been carried for the development of the basic algorithm of helicopter navigation system based on TRN (Terrain Referenced Navigation) with information input from the GPS. The helicopter determines flight path due to Origination-Destination analysis on the Cartesian coordinate system of 3-D DTM. This system shows 3-D mesh map and the O-D flight path profile for the pilot's acknowledgement of the terrain, at first. The system builds TCF (terrain clearance floor) far the buffer zone upon the surface of ground relief to avid the ground collision. If the helicopter enters to the buffer zone during navigation, the real-time warning message which commands to raise the body pops up using Matlab menu. While departing or landing, control of the height of the body is possible. At present, the information (x, y, z coordinates) from the GPS is assumed to be input into the system every 92.8 m of horizontal distance while navigating along flight path. DTM of 3" interval has been adopted from that which was provided by ChumSungDae Co., Ltd..

  • PDF

Development of NXC Robot Programming Supporting System Based on Types of Programming Error (오류분석에 기반한 NXC 로봇프로그래밍 지원시스템의 개발)

  • Nam, Jae-Won;Yoo, In-Hwan
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.3
    • /
    • pp.375-385
    • /
    • 2011
  • Computer education is moving its focus from skill oriented education to improving students' creativity and problem solving ability. Thus, the importance of programming education is being strengthened. However, programming education was biased to grammar oriented language that has been limits of students' interest. Robot programming is problem solving itself, and by allowing students to directly see the robot which is the output of programming, can help interest and motivate to the students. In fact, it is still observed that the students are facing difficulties due to various kinds of errors during the programming education. Therefore, this study categorizes and analyzes the errors students are facing during robot programming, and based on that, a support tool to help treat errors developed. The developed supporting system for error solving reduces the frequency of errors and provides the set of coding instruction, NXC language and error message in Korean, examples and detailed information for each stage of education, function removing major coding errors, and code sorting and indication of row number. This study also confirmed that the supporting tool is helpful in reducing and solving errors after input.

  • PDF

Development of Remote Ordering and Payment Service Platform Using Smart Phones In Restaurant (스마트폰을 활용한 음식점에서의 원격 주문 및 결제 서비스 플랫폼 개발)

  • Koh, Seok-Joo;Jung, Joong-Hwa;Jang, In-Jae;Lee, Young-Hoon;Kim, Tae-Su;Jang, Hyo-Won;Lee, Yeong-Jong;Lee, Gwang-Bong;Choi, Sang-Il;Kim, Ji-In
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.189-190
    • /
    • 2016
  • 최근 스마트폰의 확산으로 다양한 어플리케이션 개발을 통한 새로운 서비스 시장이 창출되고 있으며, 그 중에서도 스마트폰만으로 가격을 지불할 수 있는 모바일 결제 서비스 시장은 사용자가 일일이 결제 수단을 가지고 다니는 불편함을 해소함으로써 큰 성장을 보이고 있다. 하지만, 대부분의 모바일 결제 서비스는 온라인에서만 사용할 수 있거나, 오프라인 매장에서 사용 시에도 사용자가 직접 계산대로 가야하는 등의 한계점들이 남아있다. 이러한 불편함을 해소하기 위해, 본 논문에서는 음식점에서 QR코드와 스마트폰을 활용해 고객이 앉은 테이블에서 메뉴 확인, 주문 및 결제가 가능한 서비스 플랫폼을 개발했다. 본 논문에서는 제안하는 서비스 플랫폼의 기능 검증을 위해 모바일 어플리케이션과 데이터 서버 플랫폼을 개발하고 메시지 교환을 수행함으로써, 효과적인 모바일 결제 서비스의 제공이 가능함을 확인하였다.

  • PDF

An Anonymous Authentication in the Hierarchy for VANET (VANET 환경을 위한 계층적 구조의 익명 인증 기술)

  • Bae, Kyungjin;Lee, Youngkyung;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.563-577
    • /
    • 2018
  • In order to support secure communication in VANET(Vehicular Ad hoc Network), messages exchanged between vehicles or between vehicle and infrastructure must be authenticated. In this paper, we propose a hierarchical anonymous authentication system for VANET. The proposed system model reduces the overhead of PKG, which is a problem of previous system, by generating private keys hierarchically, thereby enhancing practicality. We also propose a two-level hierarchical identity-based signature(TLHIBS) scheme without pairings so that improve efficiency. The proposed scheme protects the privacy of the vehicle by satisfying conditional privacy and supports batch verification so that efficiently verifies multiple signatures. Finally, The security of the proposed scheme is proved in the random oracle model by reducing the discrete logarithm problem(DLP) whereas the security proof of the previous ID-based signatures for VANET was incomplete.

A Design and Implementation of Real Time Network Monitoring System(NetCop) (실시간 네트웍 감시시스템(NetCop)의 설계 및 구현)

  • Yoon, Chi-Young;Jung, Chun-Bok;Hwang, Sun-Myung
    • Journal of The Korean Association of Information Education
    • /
    • v.5 no.3
    • /
    • pp.374-379
    • /
    • 2001
  • Recently, R & D about Network Monitoring System is needed to be effective network management and to improve computer education. In this work, we propose a real time network monitoring system named NetCop to improve network management and effective use. This system is designed to show any screen to one or more students in interactive learning environment. The system also provides useful functions such as monitoring students' PCs and chat. In additions, our NetCop can provide more effective learning process to students. Finally, we expect that our system can achieve high network performance and provide high educational quality to managers.

  • PDF