• Title/Summary/Keyword: Forwarding

Search Result 695, Processing Time 0.029 seconds

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Design and Performance Evaluation for VPNs based (MPLS 기반 VPN 제공을 위한 설계 및 성능 분석)

  • Yu, Young-Eel;Chon, Byoung-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.7
    • /
    • pp.1-11
    • /
    • 2002
  • This paper proposes that an efficient routing entry sending method between routing controller FE. based on this method, we organize IP VPN support method based on MPLS network and design MPLS-VPN service control module, MPLS-VPN processing, VPN group configuration and LSP setup processing. We evaluate the performance about the VPN based on proposed MPLS, at the result of evaluation. We figure out that based on proposed IPC method, lost packets number reduces and delay increases more slowly in case of VPN based on MPLS comparing with the VPN based on ATM which has rapid delay increasement. Therefore we confirm that the VPN based on MPLS has high speed of packet processing and high utilization of buffers through the performance evaluation.

Family Planning and Maternal-Child Health Services that Disciplined Itself in Primary Health Care Post from 1980 to 2009 (보건진료소 가족계획 및 모자보건사업(1980년~2009년))

  • Son, Gye-Soon
    • Journal of Korean Academy of Rural Health Nursing
    • /
    • v.3 no.2
    • /
    • pp.104-115
    • /
    • 2008
  • Purpose: A study of the family planning and Maternal-Child Health Services that disciplined itself in primary health care post form 1980 to 2009. Method: Investigation studies family planning in primary health care post and a change process of a Maternal-Child Health Services into case by case until 2009 from 1980. Results: Our country family planning business began at economic development dimensions in order to solve a poverty issue. This business goal were childbirth decrease of pregnancy possibility couple aged 19~49 and improve to mother and child health. For this goal, all kinds of health education included sex education and contraception education, contraception service, comprehensive maternal and child health service that management of front and back of childbirth etc. are provided. According to fail down a birthrate from 6.0(1962) to 1.25(2009), the nation reached to a dilemma called childbirth encouragement policy. Conclusions: Decrease of labor supply by low birthrate, decrease numerical an employed person by aging was brought a labor shortage and decrease of productivity of labor of industrial manpower. Deterioration phenomenon of financial income and expenditure by consumption and investment contraction caused decrease of slowdown of economic growth and potential growth rate, and a social cost burden is increased by deterioration financial old man support burden increase by this and pensions and health insurance, a sharp increase of social welfare cost etc. Now, in order to solve a low birth issue, the government establishes a whole nation forwarding system and establishes basic plan social low birth and advanced age, and to prepare for childbirth fault factors removal and advanced age society shall endeavor.

OpenFlow Network Performance Evaluation under Heterogeneous Traffic (혼합트래픽 환경에서 Open Flow 네트워크 성능 평가)

  • Yeom, Jae Keun;Lee, Chang-Moo;Choi, Deok Jae;Seok, Seung Jun;Song, Wang Cheol;Huh, Jee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.46-53
    • /
    • 2012
  • The traffic in research network for the new structure of the network and new service research has the various properties. From the perspective of a specific traffic point of view, transmission of traffic with different requirements using a single routing protocol is an obstacle to satisfy requirements. In this study, we classify the properties of the traffic into two types. We propose the way that we can get the overall optimization effect, the experiment proves it by providing independent multiple forwarding path by applying optimized algorithm by types. In order to distinguish each type of traffic we use the ports on the switch and in order to implement independent path we apply OpenFlow system. In other words, we present the measure that can be implemented to improve the satisfaction of the traffic by making multiple paths by OpenFlow controller according to the type of traffic and by enforcing in Forwarder.

A Routing Protocol for Network Lifetime Extension in MANET (MANET에서 네트워크 수명 연장을 위한 라우팅 프로토콜)

  • Kim, Kyoung-Ja;Han, Sang-Hoon;Koo, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.120-129
    • /
    • 2010
  • MANET(Mobile Ad Hoc NETwork) is a collection of mobile nodes that are free to move and organize themselves in an arbitrary manner without any fixed infrastructures. These mobile nodes are connected by wireless links and act as routers for all other nodes in the network. As a router each node in MANET consumes its batteries when forwarding a message, and the selection of the best path to minimize the total power needed to route packets is needed to maximize the lifetime of all nodes. In this paper, we propose a routing protocol considering the remaining battery capacity of nodes in the routing paths. The proposed scheme prevents the battery of each node from being overused and increases the lifetime of the network.

Inland Logistics Forwarding System based on Supply Chain Management : ILOF (공급사슬기반의 육상물류중개시스템 개발에 관한 연구)

  • 박남규;최형림;김현수;박영재;손형수
    • Journal of Information Technology Application
    • /
    • v.3 no.2
    • /
    • pp.67-82
    • /
    • 2001
  • The ILOF project addresses the needs of logistics industrial organizations to reduce information processing time, improve added and residual value of information and reduce processing and transportation costs. It deals with the information supply chain information systems shared by vertical partner as important entity, whose performance and optimization very significantly affects the efficiency and performance of logistics industries. This paper deals with logistics information exchange systems based on supply chain management, focusing on sharing database and processes between partners such as shipper, logistics broker, transportation company, shipping company etc., for smoothing the information flow, enhancing consumer service and reducing communication fee and labour costs. The significance of contribution of this research is the provision of a model for logistics information exchange including entity relationship diagram, data flow diagram and functions which is able to facilitate the formulation of a customer driven supply chain information network, there by enhancing the competitive edge of companies in logistics industries on local and global basis.

  • PDF

An Internet Stopper Using ARP Spoofing with Automatic Node Identification (자동 노드 인식 기능을 갖는 ARP 스푸핑을 이용한 인터넷 차단기)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.93-106
    • /
    • 2011
  • In this paper we describe an efficient and easy to use internet stopper, which is called AINS (Automatic Internet Stopper), which uses ARP spoofing scheme. Instead of forwarding packets to router for the case of hacking, in ARP spoofing, the AINS ignores all the packets so that internet stopping operates. The AINS program needs to be installed only in manager computer that does not require additional agent program. In addition to setting manually the stopping computer list, it is able to indentify network nodes automatically by analyzing broadcasting packets. The experimental results show that less than 4 secs for spoofing interval is enough for blocking internet usage regardless the number of computers and therefore network overhead is negligible. The AINS can indentify and control network nodes not only on same subnet but also on different subnet only if they are connected onto same ethernet switch physically. It is being used for an efficient tool for controling internet usage of university computer laboratory and also for an efficient network management.

QoS-guaranteed Routing for Wireless Sensor Networks (무선 센서 네트워크를 위한 QoS 보장 라우팅)

  • Heo, Jun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.23-29
    • /
    • 2011
  • In some applications of wireless sensor networks, requirements such as energy efficiency, real-time, and reliable delivery need to be considered. In this paper, we propose a novel routing algorithm for wireless sensor networks. It provides real-time, reliable delivery of a packet, while considering energy awareness. In the proposed algorithm, a node estimates the energy cost, delay and reliability of a path to the sink node, based only on information from neighboring nodes. Then, it calculates the probability of selecting a path, using the estimates. When packet forwarding is required, it randomly selects the next node. A path with lower energy cost is likely to be selected, because the probability is inversely proportional to the energy cost to the sink node. To achieve real-time delivery, only paths that may deliver a packet in time are selected. To achieve reliability, it may send a redundant packet via an alternate path, but only if it is a source of a packet. Experimental results show that the proposed algorithm is suitable for providing energy efficient, real-time, reliable communications.

Performance Analysis of Cooperative Diversity on the Usage of Opportunistic Relay (기회주의적인 중계기 사용에 대한 협력 다이버시티의 성능 분석)

  • Kim, Tae-Wook;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.7-12
    • /
    • 2014
  • The data forwarding transmission is an important function of the relay in cooperative communication in wireless communication systems. However, additional relay cause the waste of power consumption and cost. Therefore, in this paper, we consider how to use the user mobile devices in stead of relays to deal with this problem. In this paper, we proposed the protocol that divide each relay into two states of idle and non-idle. The receiver has two functions of base station and user mobile device. In this case, it is possible that no additional cost, and improve the spectral efficiency and network capacity. We verified BER performance for the proposed protocol over Rayleigh fading through Monte-Carlo simulation.

Implementation and TCP Performance Measurement of RED scheduler using NetFPGA platform (NetFPGA 플랫폼 기반 RED스케줄러 구현 및 TCP 성능평가)

  • Oh, Min-Kyung;Min, Seok-Hong;Kim, Byung-Chul;Lee, Jae-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.3
    • /
    • pp.27-36
    • /
    • 2012
  • With the increase of various user's requirements, lots of interesting applications on the Internet have been emerging recently. However, Internet has many limitations for providing upcoming new services because it was only designed to provide basic connectivity between research networks and simplified forwarding functions at the first time. Internet has many problems in the aspects of routing scalability, mobility, security and QoS, so lots of researches are being actively performed in many countries to solve these problems. In this paper, we implement RED(Random Early Detection) scheduler using NetFPGA platform and local testbed to provide active queue management. Using the implemented RED scheduler, packets are dropped according to the specified drop probability, so Global Synchronization coming from simultaneous TCP segment losses in a congestion condition can be prevented. With the comparison to the Drop-Tail scheme in the basic router, we show TCP performance can be enhanced in the congestion situation using the NetFPGA-based RED scheduler.