• Title/Summary/Keyword: Broadband convergence Network (BcN)

Search Result 82, Processing Time 0.029 seconds

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

모바일 환경에서의 개인정보 위협 분석 연구

  • Park, Hyun-A;Choi, Jae-Tark;Lim, Jong-In;Lee, Dong-Hoon
    • Review of KIISC
    • /
    • v.17 no.4
    • /
    • pp.56-73
    • /
    • 2007
  • 2002년 11월 대한민국 전자정부의 공식출범을 비롯하여 최근 IT 839전략 등에 힘입어 차세대 IT 분야의 급속한 발전은 바야흐로 유비쿼터스 컴퓨팅 시대로의 진입을 가속화 하고 있다. 최근에는 이것을 뒷받침 하는 기술 분야의 하나인 BcN(Broadband Convergence Network) 역시 그 연구에 박차를 가하고 있으며, 이것의 단말기 역할을 하는 이동성 있는 모바일 폰 기술 역시 급속도로 발전하고 있다. 하지만, 이런 기술 발전과는 달리 그 이면에는 개인정보보호의 침해라는 문제가 있다. 기술의 발전에 비례해서 개인정보 침해 역시 고도화, 전문화되어 급속도로 증가하고 있는 것이다. 본 고에서는 개인정보의 개념부터 먼저 살펴본 후, 모바일 폰의 표준화 현황 및 기반 기술과 응용 서비스 기술을 분석하여 문제점을 도출하고 그 대응 방안을 모색한다. 현재 서비스들이 하나의 소형화된 기기로 집적화되어 가고 있는 추세에서 휴대형 정보기기에서의 개인정보보호를 위한 대안이 절대 한 가지 메카니즘 만으로는 부족하며, 종합적인 보안 기술의 집합체를 이루어야 한다는 사실을 알 수 있게 된다.

A Feasibility Study on the Location Based Services under Ubiquitous Environment (유비쿼터스 환경에서 위치기반서비스의 활용성 연구)

  • Baek, Dong-Hyun;Jin, Hee-Chae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.30 no.3
    • /
    • pp.1-11
    • /
    • 2007
  • The purpose of this study is to predict promising Location Based Services under an ubiquitous environment based on their technical characteristics, which is strongly required in rapidly changing circumstances with ubiquitous computing and Broadband Convergence Network (BcN). To begin with, this study proposes a classification scheme of ubiquitous services and defines five technology factors required for ubiquitous services. Next, this study collects a number of ubiquitous services from previous researches and classified them according to the classification scheme of ubiquitous services. And then, technical importance of the collected ubiquitous services are evaluated in terms of technology factors by using service-technology metrics. Finally, a set of important Location Based Services under ubiquitous environments and the correlations between technology factors are identified by using the evaluation results.

A Study on Web-based Service Session Mobility (웹기반 서비스 세션 이동 기술 연구)

  • Kim, Geunhyung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.925-926
    • /
    • 2009
  • All IP 기반 BcN(Broadband Convergence Network)의 발전과 단말 기술의 발전은 언제 어디에서나 임의의 단말을 통해 웹과 같은 데이터 서비스, 통화 서비스, 스트리밍 서비스를 동시에 이용하는 것을 가능하게 하였다. 주로 TV를 통한 멀티미디어 콘텐츠 서비스가 PC와 모바일 단말 상에서도 가능해 졌으며, PC를 중심으로 사용되던 웹 기반 서비스가 TV와 모바일 단말에서도 사용이 가능해지고 있다. 본 논문에서는 서비스 이용환경을 향상시키기 위해 특정 단말에서 이용 중인 서비스를 다른 단말에서 끊김 없이 이용할 수 있도록 하는 서비스 세션 이동성을 보장하는 메커니즘에 대해서 살펴보고, 웹 기반 서비스의 세션 이동성 보장에 관한 기존 연구를 비교 분석하고, 향후 연구 방향을 정립하고자 한다.

Adaptive Input Traffic Prediction Scheme for Absolute and Proportional Delay Differentiated Services in Broadband Convergence Network

  • Paik, Jung-Hoon;Ryoo, Jeong-Dong;Joo, Bheom-Soon
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.227-237
    • /
    • 2008
  • In this paper, an algorithm that provides absolute and proportional differentiation of packet delays is proposed with the objective of enhancing quality of service in future packet networks. It features an adaptive scheme that adjusts the target delay for every time slot to compensate the deviation from the target delay, which is caused by prediction error on the traffic to arrive at the next time slot. It predicts the traffic to arrive at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot. The difference between them is utilized by the delay control operation for the next time slot to offset it. Because the proposed algorithm compensates the prediction error continuously, it shows superior adaptability to bursty traffic and exponential traffic. Through simulations we demonstrate that the algorithm meets the quantitative delay bounds and is robust to traffic fluctuation in comparison with the conventional non-adaptive mechanism. The algorithm is implemented with VHDL on a Xilinx Spartan XC3S1500 FPGA, and the performance is verified under the test board based on the XPC860P CPU.

  • PDF

A Study of Data Security System Based PKI on Wireless Internet Environment (무선 인터넷 환경에서의 PKI 기반 데이터 보호 시스템에 대한 연구)

  • Kim, Young-Ho;Chae, Cheol-Joo;Choi, Sang-Wook;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.233-236
    • /
    • 2008
  • Wire wireless integrated service of BcN(Broadband convergence Network) is expanding. Information Security issue is highlighted for opposing attack of getting information illegally on wire wireless network. The user of PKI(Public Key Infrastructure) cipher system among Information security technology receives various security services about authentication, confidentiality, integrity, non-repudiation and access control etc. A mobile client and server are loaded certificate and wireless internet cryptography module for trusted data send receive. And data sends receives to each other after certification process through validity check of certificate. Certificate and data security system is researched through PKI on wireless network environment and data security system in this paper.

  • PDF

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

A Reliable Web Service Support Mechanism based on Asynchronous Architecture in BcN (광대역통합망에서의 비동기 구조를 이용한 신뢰성 있는 웹 서비스 제공방안)

  • Kim Hyoung-min;Jung Yeu-hun;Kim Hwa-sung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.773-780
    • /
    • 2005
  • Recently, the telecommunication network is in a transition toward the BcN (Broadband convergence Networks) that integrates the Internet, the telecommunication and the broadcasting. The BcN makes it possible to provide of 4he third-party application by using the Open API The Parlay X API is an example of the Open API and the Parlay X API is grafted in the Web Service and is abstracted from the Parlay API. So, the Parlay X API does not only have advantages of a Web Service, but also disadvantages of the Web Service. The main disadvantage of the Web Service is that it does not support the any QoS mechanism. In this paper, we propose the architecture that solves the reliability among the QoS issues for the Web Service. The proposed mechanism adopts the Asynchronous architecture for the reliable Web Service and improves the performance of the retransmission between the client and the server using the expected response time. We perform the performance evaluation through the simulation in older to compare with the existing mechanism. Consequently, we can confirm that the performance of the proposed mechanism performs better than the existing mechanism.

Asynchronous Key Management for Energy Efficiency over Wireless Sensor Network (유비쿼터스 센서네트워크에서 에너지효율을 고려하는 비동기적인 키관리 기법)

  • Yoon, Mi-Youn
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.1011-1022
    • /
    • 2006
  • WSN(Wireless Sensor Network) performs to detect and collect environmental information for one purpose. The WSN is composed of a sink node and several sensor nodes and has a constraint in an aspect of energy consumption caused by limited battery resource. So many required mechanisms in WSN should consider the remaining energy condition. To deploy WSN, tile collected information is required to protect from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. we propose asynchronized key management considering energy efficiency over WSN. The proposed key management is focused on independence and difference of the keys used to deliver the information over several routes over the network, so disclosure of any key does not results in exposure of total key information over the overall WSN. Also, we use hash function to update key information for energy efficiency Periodically. We define the insecurity for requested security Properties and Proof that the security properties are guaranteed. Also, we evaluate and analyze the energy efficiency for the proposed mechanism.

Design of Defence Mechanism against DDoS Attacks in NCP-based Broadband Convergence Networks (NCP 기반의 광대역 융합 망에서 DDoS 공격 대응 기법 설계)

  • Han, Kyeong-Eun;Yang, Won-Hyuk;Yoo, Kyung-Min;Yoo, Jae-Young;Kim, Young-Sun;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.8-19
    • /
    • 2010
  • In this paper, we propose the NCP (Network Control Platform)-based defense mechanism against DDoS (Distributed Denial of Service) attacks in order to guarantee the transmission of normal traffic and prevent the flood of abnormal traffic. We also define defense modules, the threshold and packet drop-rate used for the response against DDoS attacks. NCP analyzes whether DDoS attacks are occurred or not based on the flow and queue information collected from SR (Source Router) and VR (Victim Router). Attack packets are dopped according to drop rate decided from NCP. The performance is simulated using OPNET and evaluated in terms of the queue size of both SR and VR, the transmitted volumes of legitimate and attack packets at SR.