• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.029 seconds

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

An exploratory study of Aab alternative role: In consideration of environment level of engagement and message direction (Aad의 대안적 역할에 대한 탐색적 연구 : 환경 관여도와 메시지 방향성을 중심으로)

  • Park, Jin-Woo
    • Management & Information Systems Review
    • /
    • v.24
    • /
    • pp.97-124
    • /
    • 2008
  • This study aimed to explore how the involvement of environment influenced eight subjects group. Thus, experiment was performed to clarify the role that the attitude of university student consumer plays in the communication process depending on the level of engagement of consumer in the environment and method to raise donation for preservation of environment. Analyzing as per the type of appeal, the mark in altruistic appeal type was higher in all variables than egoistic appeal type. Finally, checking the average mark of each variable as per the condition of donation, the value in unconditional donation was higher than in all variables than conditional donation. It was found 3 groups composed of 2 groups with high level of environmental engagement and 1 group with low level of environmental engagement were suitable to double mediation model among the 8 experimental groups. The group where double mediation model best corresponds than any other group was high level related to environment and the group that contacts altruistic appeal and the message in the form of conditional donation. It was also found that the group that has low level of environmental engagement and contacts egoistic appeal type and conditional donation shows the group that corresponds to double mediation model in the second place among the 8 groups. Finally, it was found that the group that has high level of environmental engagement and is stimulated by altruistic appeal and unconditional donation corresponds to double mediation model. Depending on the condition of message stimulation, unconditional donation is found to better correspond to double mediation model than conditional donation. However, opposite phenomena is observed when the level of environmental engagement is high and appeal type is egoistic. Namely, it was found that conditional donation better corresponds to double mediation model than unconditional donation.

  • PDF

Hardware-In-the-Loop Simulation of ECU using Reverse Engineering (역공학을 이용한 ECU의 Hardware-In-the-Loop Simulation)

  • Park, Ji-Myoung;Ham, Won-Kyung;Ko, Min-Suk;Park, Sang-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.1
    • /
    • pp.35-43
    • /
    • 2016
  • Increasing the proportion of an embedded system in automotive industry, test methods for evaluation and fault detection of the embedded system have been researched. HILS is a test method that is used in the development and test of complex real-time embedded systems. In this study, we defined the HILS method of the ECU, one of the embedded systems used in automobiles. Our method is to create a test model that can provide a virtual vehicle environment to the ECU on the basis of the actual vehicle data. The test model has reference information that can transmit the sensor signal and CAN Message into the ECU from HILS tester. In this study, the HILS can detect faults of the target ECU.

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

A Secure Tunnel Broker for the IPv6 based Wireless Ad-hoc Network (IPv6 기반 이동 Ad-hoc 네트워크를 위한 안전한 터널 브로커)

  • Yang Jong-Won;Kim Won-Joo;Seo Chang-Ho;Kim Seok-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.41-49
    • /
    • 2006
  • Wireless AD-hoc network can construct a network itself without any arbitrator. Therefore, it is difficult to make preparation for disguised assault from an illegal node, and because lots of packets from disguised assault spread over whole network, it influences the network usability and livability. This thesis proposed a safe IPv6 tunnel broker (TB) based on TSP (Tunnel Setup Protocol) to improve safety of the wireless Ad-hoc network, and to solve security problem of a tunnel broker that makes a linkage IPv4 and IPv6. To communicate between client and the tunnel broker, proposed method does not base on HTTP, but S-HTTP (Secure-HTTP) and it uses encryption/decryption to send and receive XML document. Finally, this method encrypts (decrypts) important information by applying IPSec between client and TS (Tunnel Server).

An Efficient Multi-Channel MAC Protocol for Cognitive Ad-hoc Networks with Idle Nodes Assistance (무선 인지 애드 혹 네트워크를 위한 휴지 노드를 활용하는 효율적인 다중 채널 MAC 프로토콜)

  • Gautam, Dinesh;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.39-45
    • /
    • 2011
  • In this paper, we propose an efficient multichannel MAC protocol with idle nodes assistance to avoid the multi-channel hidden terminal problem in cognitive radio ad hoc network and further to improve the performance of the network. The proposed MAC protocol can be applied to the cognitive radio adhoc network where every node is equipped with the single transceiver and one common control channel exists for control message negotiation. In the proposed protocol, the idle nodes available in the neighbour of communication nodes are utilized because the idle nodes have the information about the channels being utilized in their transmission range. Whenever the nodes are negotiating for the channel, idle nodes can help the transmitting and receiving nodes to select the free data channel for data transfer. With the proposed scheme, we can minimize the hidden terminal problem and decrease the collision between the secondary users when selecting the channel for data transfer. As a result, the performance of the network is increased.

Effect That Type Gets in Consumer Communication : Product Participation Level and Internet Word-of-mouth -Laying stress on purchase review of product and Internet shopping mall by FCB Model- (제품 관여수준과 인터넷 구전메시지 유형이 소비자 커뮤니케이션에 미치는 영향 -FCB 모델에 따른 제품과 인터넷 쇼핑몰의 구매 댓글을 중심으로-)

  • Chin, Hong-Kun;Lee, Eun-Joo
    • Management & Information Systems Review
    • /
    • v.22
    • /
    • pp.85-115
    • /
    • 2007
  • Following is discovered in this study by some. First, attribute(product/non- product) of that truth that get through experiment of this study is WOM deduced result that have statistical meaning in dependent variable which is public trust only in this study. Specially, information by word of mouth type received High positive response more with non-product information by word of mouth attribute than the product attribute in all experiment products that is parted according to involvement. Consumer's response by involvement level of product can affect for site attitude, public trust, and intention to purchase by second. For example, consumer's site attitude has induced the most positive response, and can confirm positive response of High consumer most in that involvement sensitivity product in that participation reason type product and could confirm response that is the most positive in that involvement reason product even if there is for intention to purchase. Result of this study is grasped that have High mean value relatively in site attitude, product attitude, information by word of mouth effect, public trust, brand attitude, purchase intention etc. generally that product involvement and information by word of mouth attribute are interrelation by third. This can change fairly data processing process according to consumer's Involvement Level, behavior deterministic process, consumer's action with attitude formation process, and involvement for products. High occasion than is low incline more efforts in information retrieval and is discreet result such as study finding of produce.

  • PDF

QoS-Oriented Handoff Algorithm in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜에서 서비스 질(QoS) 지향적인 핸드오프 알고리즘에 관한 연구)

  • Choi Haeng-Keol;Kim Il-Hwan;Seo Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.338-348
    • /
    • 2005
  • Currently, IEEE 802.11 Wireless LAN (WLAN) is rising as the most popular means for the broadband wireless access network. In this thesis, we propose a QoS(Quality of Service)-Oriented mechanism using handshaking method of scanning phase in IEEE 802.11 handoff. In conventional process for handoff, the major criterion to select the best AP(Access Point) among candidates is normally based on the RSS(Received Signal Strength), which does not always make the selected network guarantee the maximum achievable performance. Even though the link quality with a neighboring AP is excellent, the AP may not be a good candidate to handoff to simply because MAC(Medium Access Control) protocol of IEEE 802.11 standard is contention-based such as CSMA/CA. Therefore, if we apply network level information to AP selection criteria, we can achieve better handoff efficiency rather than before. The analysis and simulation results applied to our new mechanism show clearly better performance than AP selection based on traditional handoff method.

Reliable Time Synchronization Protocol in Sensor Networks (센서 네트워크에서 신뢰성 있는 시각 동기 프로토콜)

  • Hwang So-Young;Jung Yeon-Su;Baek Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.274-281
    • /
    • 2006
  • Sensor network applications need synchronized time extremely such as object tracking, consistent state updates, duplicate detection, and temporal order delivery. This paper describes reliable time synchronization protocol (RTSP) for wireless sensor networks. In the proposed method, synchronization error is decreased by creating hierarchical tree with lower depth and reliability is improved by maintaining and updating information of candidate parent nodes. The RTSP reduces recovery time and communication overheads comparing to TPSN when there are topology changes owing to moving of nodes, running out of energy and physical crashes. Simulation results show that RTSP has about 20% better performance than TPSN in synchronization accuracy. And the number of message in the RTSP is $20%{\sim}60%$ lower than that in the TPSN when nodes are failed in the network. In case of different transmission range of nodes, the communication overhead in the RTSP is reduced up to 40% than that in the TPSN at the maximum.

An Improved Handoff and Resource Reservation Scheme Using Triggers in Wireless Network (이동망에서 트리거를 이용한 향상된 핸드오프 메커니즘 및 자원예약 방안)

  • Lee, Don-Su;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.630-637
    • /
    • 2007
  • In this paper, we propose an effective handoff mechanism using events at the layer 2 and a tunnel-based mechanism that is performed by sharing information of a mobile node and anticipated-based handoff. Also, we propose a novel anticipated-reservation mechanism using the events triggered at layer 2 to make easy a resource reservation procedure. Comparing with the existing mobile IPv6 handoff mechanism, our proposed handoff mechanism can reduce an amount of handoff latency and traffic volume between access routers where handoff is performed. In the anticipated-reservation mechanism, the amount of signaling traffics between an mobile node and the correspondent nodes can be reduced and then the allocation of resource can be accomplished. We present the performance of our proposed handoff mechanism in the wireless network environment by ns-2 simulation. Although the anticipated-reservation mechanism including a proxy agent is explained without performance evaluation, we can validate the operation of our proposed model only by the procedure of message flow.