• Title/Summary/Keyword: 주소 데이터

Search Result 389, Processing Time 0.024 seconds

Wall Cuckoo: A Method for Reducing Memory Access Using Hash Function Categorization (월 쿠쿠: 해시 함수 분류를 이용한 메모리 접근 감소 방법)

  • Moon, Seong-kwang;Min, Dae-hong;Jang, Rhong-ho;Jung, Chang-hun;NYang, Dae-hun;Lee, Kyung-hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.127-138
    • /
    • 2019
  • The data response speed is a critical issue of cloud services because it directly related to the user experience. As such, the in-memory database is widely adopted in many cloud-based applications for achieving fast data response. However, the current implementation of the in-memory database is mostly based on the linked list-based hash table which cannot guarantee the constant data response time. Thus, cuckoo hashing was introduced as an alternative solution, however, there is a disadvantage that only half of the allocated memory can be used for storing data. Subsequently, bucketized cuckoo hashing (BCH) improved the performance of cuckoo hashing in terms of memory efficiency but still cannot overcome the limitation that the insert overhead. In this paper, we propose a data management solution called Wall Cuckoo which aims to improve not only the insert performance but also lookup performance of BCH. The key idea of Wall Cuckoo is that separates the data among a bucket according to the different hash function be used. By doing so, the searching range among the bucket is narrowed down, thereby the amount of slot accesses required for the data lookup can be reduced. At the same time, the insert performance will be improved because the insert is following up the operation of the lookup. According to analysis, the expected value of slot access required for our Wall Cuckoo is less than that of BCH. We conducted experiments to show that Wall Cuckoo outperforms the BCH and Sorting Cuckoo in terms of the amount of slot access in lookup and insert operations and in different load factor (i.e., 10%-95%).

A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet (브라우저 익스텐션 기반 암호화폐 지갑의 디지털 포렌식 아티팩트 수집 및 분석 연구)

  • Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.471-485
    • /
    • 2023
  • Recently, due to the nature of blockchain that guarantees users' anonymity, more and more cases are being exploited for crimes such as illegal transactions. However, cryptocurrency is protected in cryptocurrency wallets, making it difficult to recover criminal funds. Therefore, this study acquires artifacts from the data and memory area of a local PC based on user behavior from four browser extension wallets (Metamask, Binance, Phantom, and Kaikas) to track and retrieve cryptocurrencies used in crime, and analyzes how to use them from a digital forensics perspective. As a result of the analysis, the type of wallet and cryptocurrency used by the suspect was confirmed through the API name obtained from the browser's cache data, and the URL and wallet address used for the remittance transaction were obtained. We also identified Client IDs that could identify devices used in cookie data, and confirmed that mnemonic code could be obtained from memory. Additionally, we propose an algorithm to measure the persistence of obtainable mnemonic code and automate acquisition.

ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer (Rijndael 알고리즘을 이용한 물리 계층 ATM 셀 보안 기법)

  • Im Sung-Yeal;Chung Ki-Dong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.83-94
    • /
    • 2006
  • This paper describes ATM cell encipherment method using Rijndael Algorithm adopted as an AES(Advanced Encryption Standard) by NIST in 2001. ISO 9160 describes the requirement of physical layer data processing in encryption/decryption. For the description of ATM cell encipherment method, we implemented ATM data encipherment equipment which satisfies the requirements of ISO 9160, and verified the encipherment/decipherment processing at ATM STM-1 rate(155.52Mbps). The DES algorithm can process data in the block size of 64 bits and its key length is 64 bits, but the Rijndael algorithm can process data in the block size of 128 bits and the key length of 128, 192, or 256 bits selectively. So it is more flexible in high bit rate data processing and stronger in encription strength than DES. For tile real time encryption of high bit rate data stream. Rijndael algorithm was implemented in FPGA in this experiment. The boundary of serial UNI cell was detected by the CRC method, and in the case of user data cell the payload of 48 octets (384 bits) is converted in parallel and transferred to 3 Rijndael encipherment module in the block size of 128 bits individually. After completion of encryption, the header stored in buffer is attached to the enciphered payload and retransmitted in the format of cell. At the receiving end, the boundary of ceil is detected by the CRC method and the payload type is decided. n the payload type is the user data cell, the payload of the cell is transferred to the 3-Rijndael decryption module in the block sire of 128 bits for decryption of data. And in the case of maintenance cell, the payload is extracted without decryption processing.

Fast Handover Mechanism for Efficient Mobility Support in ZigBee Networks (지그비 네트워크에서 효율적인 이동성 지원을 위한 빠른 핸드오버 방안)

  • Jeong, Woo-Jin;Kim, Ki-Beom;Choi, Chang-Soon;Yoon, Dong-Weon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.78-84
    • /
    • 2006
  • This paper proposes a method to endow the mobility to the Zigbee protocol which is a short distance wireless communication technology among the standards of wireless sensor networks. The Zigbee has a low price, long life battery, simple structure and connectivity. So it is a suitable standard for the short distance wireless communication of $10m{\sim}70m$. As the Zigbee does not support the mobility, additional factors should be studied to deal adeptly with the diverse change in the real field. By solving the problem that the previous connection and binding table of the Zigbee end device should be reset due to the Zigbee end device address variation when the Zigbee end device moves from the present router to another router, this paper presents the method to communicate without data loss or disconnection.

Improvement of Handoff Performance Using Prefetched AP Information in IEEE 802.11 (IEEE 802.11 환경에서 사전 AP 정보를 이용한 핸드오프 성능 개선)

  • Lee, Han-Na;Kim, Hyang-Mi;Kim, Sangkyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2401-2409
    • /
    • 2015
  • This paper proposes the improved handoff mechanism for IEEE 802.11 wireless LANs. When a wireless mobile node moves out of the coverage of its currently associated AP(Access Point) and needs to be re-associated with a new AP, a handoff procedure is initiated. Channel scanning process during a handoff procedure occupies over 90% of total handoff latency. Long latency leads to many packet losses and service discontinuity, which degrades wireless network performance. This paper describes about the new mechanism to improve handoff performance by skipping channel scanning during a handoff procedure. In oerder for that, acquires neighboring AP information such as its address, location, channel number in use, the number of associated nodes before handoff, and delivers the information to its associated mobile nodes. The mobile nodes can reduce handoff latency and perform more exact handoff using the delivered AP information. We have conducted simulations to analyze our proposal's performance and confirmed that handoff latency and the number of handoff occurrences are decreased.

The Analyst of Inavi Navigation user Information by Digital Forensic (디지털 포렌식 관점에서의 아이나비 내비게이션 사용정보 분석)

  • Choi, Yong-Seok;Seo, Ki-Min;Lim, Kyung-Soo;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.327-334
    • /
    • 2010
  • The operated type of navigation is composed of hardware or software. The navigation based on software is stored and ran in the external storage(e.g. SD card). For the convenience of users, Many car navigation systems store user information such as frequently visited place, route, and so on. Those can be used to proving the alibi of users as well as their relationship between the actual owner of the vehicle through data and time information analysis. Therefore, if it is analyzed datas of navigation, we can get a lot of information such as user's movement, route of car. There are important implications in the digital forensics because it's available for investigating the various crimes. This paper demonstrates the necessary information in the digital investigation through the analysis of stored data in the navigation.

A Study on Asynchronous MAC Protocol with Dynamic Preamble Length in Wireless Sensor Networks (WSN에서 프리앰블 다이나믹을 이용한 비동기 MAC 프로토콜 연구)

  • Han, Hyeon-Ho;Hong, Yeong-Pyo;Lee, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3563-3570
    • /
    • 2010
  • MAC protocol has been studied for reducing energy consumption in wireless sensor networks. The overhearing and idle In the existing asynchronous MAC Protocol will occur due to unnecessary energy consumption. In this paper, to solve these problems, the Preamble to change the structure of the destination address, the Preamble of the end times, the data including the length of the Preamble and Data Overhearing reduce the length of the Check Interval Data generated according to the presence of the Dynamic Value dynamically adjustable by changing the DPL (Dynamic Preamble Length)-MAC protocol was proposed. Moreover, the existing asynchronous MAC protocol of wireless sensor networks and DPL-MAC protocol proposed in this paper to simulate the energy consumption and latency were assessed in terms of comparative analysis.

An Efficient Checkpoint Protocol in Wireless Sensor Network for Reliability (무선 센서 네트워크에서 신뢰성 향상을 위한 효율적인 체크포인트 프로토콜)

  • Jung, Dong-Won;Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.583-594
    • /
    • 2006
  • The reliability concept of wireless sensor network is essential to get exactly actual data from the ubiquitous environment. A rollback technique for the self-healing helps to increase it. However, a fault can occur in wireless sensor network when to use a previous rollback technique because it is designed just for the local system. So, checkpoint protocols are suggested in order to use a rollback technique in the network without the fault. However, there is trade-off among performance overhead, power consumption, and memory overhead for each of protocols. Hence, we suggest a novel global checkpoint protocol, so called address log based protocol(ALBP), based on an asynchronous protocol. It is a platform based protocol to reduce power consumption, performance overhead, and memory overhead which are the most of consideration in wireless sensor network.

Design of Securer Electronic payment system based on ECC algorithm (타원 곡선 암호를 이용한 안전한 메일 기반 전자지불시스템 설계)

  • 김성일;최문석;신병철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.817-820
    • /
    • 2003
  • With a great improvement of computers and Network communication skills, we can exchange information quickly. There have been many researches on the subject how to guarantee the information security by security mechanism and cryptography schemes. Nowadays, many people in this area show their interest in money transfer systems between accounts, which can provide a secure mechanism in which people can send money to the legitimate party or person safe. However, we have teamed many ways to distort messages and repudiate the malicious activity in mail systems based on SSL mechanism. It is very likely that important information which must be kept in secret is laid exposed to un_authorized user. Accordingly, to provide stronger security service, researches on electronic payment system which tan guarantee the security characteristics such as confidentiality, integrity, user authentication, Non-repudiation, are strongly needed. In this paper, we analize the characteristics of the previous researches in this field, and also propose a securer electronic payment system based on ECC algorithm.

  • PDF

Design of SC-FDE Transmission Structure to Cope with Narrow Band Interference (협대역 간섭신호 대응을 위한 SC-FDE 전송 구조 설계)

  • Joo, So-Young;Jo, Sung-Mi;Hwang, Chan-Ho;Jeong, Eui-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.787-793
    • /
    • 2018
  • In this paper, we propose a new single carrier - frequency domain equalization (SC-FDE) structure to cope with narrow band interference. In the conventional SC-FDE structure, when a high-power narrow band interference exists, channel estimation and data recovery is difficult. To relieve from this problem, this paper proposes a new SC-FDE frame structure to enable frequency-domain channel estimation in the environments that exist narrow band interference. Specifically, in the conventional method, the channel estimation is performed in time-domain first and from that, the frequency-domain channel is obtained by Fourier transform. In contrast, we proposed a new SC-FDE structure to enable frequency-domain channel estimation directly from received signals without time-domain channel estimation. The receiver performance improvement is verified through computer simulation. According to the results, the proposed technique can detect the signal with less than 2 dB loss compared with jammer-free environments, while the conventional method does not communicate with each other.