• Title/Summary/Keyword: Dynamic Access Control

Search Result 273, Processing Time 0.03 seconds

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

Dynamic Thresholding Scheme for Fingerprint Identification (지문 식별을 위한 동적 임계치 설정방법)

  • Kim, Kyoung-Min;Lee, Buhm;Park, Joong-Jo;Jung, Soon-Won
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.9
    • /
    • pp.801-805
    • /
    • 2012
  • This paper proposes dynamic thresholding scheme for fingerprint identification. As a user authentication method by fingerprint recognition technology, verification method based on 1:1 matching was mainly used in the past, but identification method based on 1:N matching is generally used recently. The control of the value of FAR is very important in the application areas such as access control and time attendance systems. This paper proposes dynamic thresholding scheme which could properly control the value of FAR according to the field of applications and size of the fingerprints database.

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

A Usage Control Model based on Context-Awareness for Mobile Devices (휴대 단말기를 위한 상황인식 기반 사용제어 모델)

  • Chang, Hye-Young;Noh, Jin-Uk;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.63-70
    • /
    • 2008
  • As the number of cell phone users become growing, some researchers have presented that the imprudent use of mobile phones exerts harmful influence on electronic devices such as medical appliances, takeoff and landing system of aircraft. In this paper, we propose a usage model based on context-awareness which can be applied to mobile devices. The model controls the usage of both mobile devices themselves and mobile contents according to some context information like location, time, the circumference noise, etc. The proposed usage control model includes a dynamic role-based access control approach. To show the effectiveness of the proposed model, we have implemented a prototype system on an embedded board and PC server, and evaluated the performance of the system.

Dynamic Slot Allocation Algorithm of Wireless ATM (무선 ATM에서의 동적 슬롯 할당 알고리즘)

  • Lee, Ji-Hyun;Yu, So-Young;Seo, Ju-Ha
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.189-198
    • /
    • 2001
  • In recent years, the predominant part in telecommunications is mobile communications. The next generation network is extending today's voice-only mobile networks to multi-service networks. ATM Network is possible to carry such multi-media traffic and it will be expect to use wireless ATM for the future mobile access network. One of manly important aspects for the performance of wireless ATM is the Medium Access Control (MAC) protocol. The MAC protocol must be able to satisfyingly handle the different ATM services (CBR, VBR, ABR and UBR) with their radically different performance requirements. Additionally, the MAC protocol must be able to cope with the complex radio environment where fading, multi-path propagation interference and burst-errors further complicate the situation. In this paper, a dynamic slot allocation algorithm in wireless ATM is proposed for an efficient channel sharing/media access at the MAC layer. We use equivalent capacity in the allocation of slots for VBR traffic which is variable along the time. It is simple and effective slot allocation method for VBR service. In particular, we consider the slot allocation of a session consisted of several connections for requirement of multimedia traffic. Simulation shows that the cell loss ratio is reduced by re-allocation of extra slots in Mobile Terminal (MT).

  • PDF

Dynamic Resource Adjustment for Coexistence of LAA and Wi-Fi in 5 GHz Unlicensed Bands

  • Choi, Jihoon;Kim, Eunkyung;Chang, Sungcheol
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.845-855
    • /
    • 2015
  • To enable the coexistence of Licensed Assisted Access (LAA) and Wi-Fi in 5 GHz unlicensed bands, a new channel access mechanism is proposed. Accounting for the fairness between LAA and Wi-Fi, the proposed mechanism finds the optimal transmission time ratio by adaptively adjusting the transmission durations for LAA and Wi-Fi. In addition, we propose a new analytical model for the distributed coordination function of IEEE 802.11 through some modifications of conventional analytical models for saturation and non-saturation loads. By computing the activity ratio of Wi-Fi, the proposed analytical model is able to control the time ratio between LAA and Wi-Fi, which is required for practical implementation of the proposed access mechanism. Through numerical simulations, the proposed channel access mechanism is compared with conventional methods in terms of throughput and utility.

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Dynamic Bandwidth Allocation Algorithm with Two-Phase Cycle for Ethernet PON (EPON에서의 Two-Phase Cycle 동적 대역 할당 알고리즘)

  • Yoon, Won-Jin;Lee, Hye-Kyung;Chung, Min-Young;Lee, Tae-Jin;Choo, Hyun-Seung
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.349-358
    • /
    • 2007
  • Ethernet Passive Optical Network(EPON), which is one of PON technologies for realizing FTTx(Fiber-To-The-Curb/Home/Office), can cost-effectively construct optical access networks. In addition, EPON can provide high transmission rate up to 10Gbps and it is compatible with existing customer devices equipped with Ethernet card. To effectively control frame transmission from ONUs to OLT EPON can use Multi-Point Control Protocol(MPCP) with additional control functions in addition to Media Access Control(MAC) protocol function. For EPON, many researches on intra- and inter-ONU scheduling algorithms have been performed. Among the inter-ONU scheduling algorithms, IPS(Interleaved Polling with Stop) based on polling scheme is efficient because OLT assigns available time portion to each ONU given the request information from all ONUs. Since the IPS needs an idle time period on uplink between two consecutive frame transmission periods, it wastes time without frame transmissions. In this paper, we propose a dynamic bandwidth allocation algorithm to increase the channel utilization on uplink and evaluate its performance using simulations. The simulation results show that the proposed Two-phase Cycle Danamic Bandwidth Allocation(TCDBA) algorithm improves the throughput about 15%, compared with the IPS and Fast Gate Dynamic Bandwidth Allocation(FGDBA). Also, the average transmission time of the proposed algorithm is lower than those of other schemes.

Design and Implementation of Dynamic TDMA MAC Protocol for Ethernet PON Using OPNET (OPNET을 이용한 Ethernet PON에서의 동적 TDMA MAC 프로토콜의 설계 및 구현)

  • 정상원;장용석;엄종훈;김승호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.175-177
    • /
    • 2002
  • Ethernet PON(Passive Optical Network)의 핵심 기술 충의 하나인 MAC(Media Access Control) 프로토콜은 ONU(Optical Network Unit)들이 상향으로 트래픽을 전송할 때 공유되어 있는 링크상의 충돌을 방지하고, 효율적인 대역폭을 할당하기 위만 스케줄링 알고리즘을 포함하고 있다. 본 논문에서는 차세대 가입자 망인 Ethernet PON의 성능을 최대화하기 위해, 가입자 망의 특성을 고려만 동적 슬롯 할당 TDHA(Time Division Multiple Access) 방식의 MAC 프로토콜을 제안한단. 이를 검증하기 위하여 OPNET 시뮬레이션 도구를 이용해 Ethernet PON 모델을 설계하고 시뮬레이션 한다.

  • PDF