• Title/Summary/Keyword: Home agent

Search Result 307, Processing Time 0.028 seconds

A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability among Heterogeneous Home Network Middlewares (이질적인 홈 네트워크 미들웨어 상호 연동성 지원을 위한 사용자 중심의 시나리오 기반 통합 구조)

  • Kim, Min-Chan;Lee, Hark-Jin;Kim, Sung-Jo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.59-73
    • /
    • 2007
  • Although there exist many middlewares such as Havi, Jini, LonWorks, UPnP, and SLP, new middlewares specialized for diverse information appliances are expected to appear continuously as home networks evolve. In this paper, we examine an integrated architecture for supporting interoperability among heterogeneous middlewares under home network, we also propose and implement a scenario-based user-oriented integrated architecture for efficient home automation which is different from existing methods. HOMI(Homenetwork Middleware for Interoperability) architecture proposed in this paper provides interfaces that assist users with designing and modifying desirable scenarios using a script interpreter language HOMIL(HOMI Language). Different from an existing integrated middleware architecture, HOMI improves efficiency and convenience of interoperation between heterogeneous appliances for home automation allowing users to design and organize scenarios through these interfaces. HOMI classifies interoperation services into time contort, synchronization context, and asynchronization context and helps to execute next services considering contexts when a specific event occurs. Applying modified scenarios immediately to home network environment, HOMI provides users with seamless services without installing new applications, updating the server, or rebooting in order to adopt new scenarios. Lastly, distribution agents into several devices, we solved the overhead problem occurred in a centralized architecture for integrated middleware.

Secure MAP Discovery Schemes in Hierarchical MIPv6 (계층적 Mobile IPv6에서의 안전한 MAP 검색 기법)

  • Choi, Jong-Hyoun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.41-47
    • /
    • 2007
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anther Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.

A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment (모바일 IPv6 환경에서 제한된 계산 능력을 갖는 모바일 노드를 지원하는 바인딩 갱신 인증 프로토콜에 관한 연구)

  • Choi, Sung-Kyo;You, Il-Sun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.11-25
    • /
    • 2005
  • In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.

  • PDF

A Study on the Behavior Related to Brassieres Purchasing Decision Making of Elderly Women (노년여성의 브래지어 구매의사결정 관련행동에 관한 연구)

  • 박은미
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.2
    • /
    • pp.65-79
    • /
    • 1997
  • This research is intended for 418 elderly women who reside in Seoul and the National Capital region. the survey and analysis are on the practical behavior related to purchasing decision making of brassieres for elderly women. The purpose of the survey and analysis is to induce contented and rational purchase activity for elderly women; also, to supply the fundamental sources which can support accomplishing scientific and systematic marketing activity to foundation manufacturing business. The main results of this study are as follows; 1. The elderly women tend to decide on purchase of the brassiere subjectively alone than rely on the informants and to listen to sales women's advice more. The younger, more educated and higher income of family, the elderly women tend more to depend on their own subjective sense than others' recommendations and rely on such mass media as TV and magazines for information source. 2) The elderly women tend to purchase their brassieres personally. In particular, the younger, more educated and higher income they tend more to choose their brassieres alone rather than with others. 3) The companions for elderly women's purchase were their daughter, daughter-in-law and friends. The younger, more educated and higher income, they tend more to accompany friends. The older, less educated and lower income, they tend more to be accompanied by their daughter or daughter-in-lay. 4) The elderly women are aware of the trademarks for brassieres. Although most of them know about their brassiere size, the majority of them tend to purchase their brassieres without trying on them. the older, less educated and lower income, they are less aware of trademarks and their brassiere size, and thus are less influential in their purchasing decision making. 5) The places of purchasing on which elderly women rely most for their brassiere are department stores, agent and markets. Other places are private haberdashery's, discount and pension shop. The department stores are most used by the less younger, more educated and higher income, while the markets are most often visited by those older, less educated and lower income, while the markets are most often visited by those older, less educated and lower income. The agent are favored by the medium class old people between two extremes.

  • PDF

Enhancement of FMIPv6 using Tentative and Early Binding Update to Home Agent (홈에이전트로의 빠른 바인딩 갱신 방법을 통한 FMIPv6 핸드오버 개선 방안)

  • Ryu Seong-Geun;Mun Young-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.121-128
    • /
    • 2006
  • In Mobile IPv6, a handover latency is an important issue. To reduce the handover latency, mipshop working group in IETF has studied the fast handover(FMIPv6) which creates and verifies a new care-of address(NCoA) in advance before a layer 2 handover resulting in reduced handover latency. Even in FMIPv6, the NCoA must be registered in a home agent(HA). This registration still creates a significant amount of delay. To reduce registration latency, we propose a tentative and early binding update(TEBU) scheme that the NCoA is registered in the HA in advance during the layer 2 handover based on FMIPv6. We use cost analysis for the performance evaluation. As a result, we found that the TEBU scheme guarantees lower handover latency than FMIPv6 as much as approximately 21%.

Optimal Neighbor Scope-Based Location Registration Scheme in Mobile IP Networks (이동 IP 망에서의 최적 이웃 스코프 값 기반의 위치 등록 방법)

  • Suh, Bong-Sue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.139-144
    • /
    • 2007
  • The mobile terminal's frequent changes to the access point introduce significant network overhead in mobile IP networks. To solve this problem, we introduce a hierarchical structure with consideration given to the dynamic value of neighbor scope in IP regional registration[1]. When a mobile terminal moves within the neighbor given by the scope value, it makes registration locally without registration with its home agent. We analyze the algorithm mathematically and show the numerical results. As a result, optimization of the scope value for the localized registration under the hierarchical structure makes the proposed scheme outperform the standard mobile IP protocol[2]. This can be explained from the fact that there is only local registration for terminal's movement within the scope region. Moreover, as the signaling cost for home agent increases, the proposed scheme becomes more advantageous.

  • PDF

Authenticated Route Optimization Protocol for Network Mobility Support (네트워크 이동성 지원을 위한 인증된 경로 최적화 프로토콜)

  • Koo, Jung-Doo;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.781-787
    • /
    • 2007
  • Network Mobility (NEMO) basic support protocol doesn't execute the process of route optimization and has not presented the particular security mechanism in other blocks except hi-directional tunnel between Mobile Router (MR) and its Home Agent (HA). Therefore in this paper we process secure route optimization courses through authenticated binding update protocol between MR and its Correspondent Node (CN) and the protocol of the competency of mandate between MR and its Mobile Network Node (MNN); its block also uses an bi-directional tunnel as the block between MR and its HA. The address of each node are generated by the way of Cryptographically Generated Address (CGA) for proving the ownership of address. Finally we analyze the robustness of proposed protocol using security requirements of MIPv6 and existing attacks and the efficiency of this protocol using the connectivity recovery and end-to-end packet transmission delay time.

  • PDF

A Scalable and Practical Authentication Protocol in Mobile IP (Mobile IP에서 확장성과 실용성 있는 인증 프로토콜 제안 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.35-44
    • /
    • 2005
  • In Mobile IP protocol, because a mobile node still uses its home IP address even though it moves to foreign network from home network, authentication among mobile node, foreign network and home network is critical issue. Many researches about this issue have been based on shared secret, for example mobile node and home agent authenticate each other with pre-shared symmetry key. And they missed several security issues such as replay attack. Although public key scheme could be applied to this issue easily, since the public key cryptography is computationally complicated, it still has the problem that it is not practical to realistic environment. In this paper, we describe several security issues in Mobile IP protocol. And we propose new Mobile IP authentication protocol that is applicable to realistic environment using public key algorithm based on certificate. It has scalability for mobile nodes and is applicable to the original Mobile IP protocol without any change. Finally we prove security of the proposed protocol and that it might not affect performance of the original Mobile IP protocol.

Risk Factors and Diet Therapy for Atherosclerosis -Emphasis on quality (P/S ratio) of fat- (동맥경화증과 관련된 대사장애와 예방 및 치료식이 -지방(脂防) (P/S 비율)을 중심(中心)으로-)

  • Lee, Ki-Yull;Ahn, Hong-Seok;Leekim, Yang-Cha
    • Journal of Nutrition and Health
    • /
    • v.12 no.3
    • /
    • pp.9-23
    • /
    • 1979
  • The known risk factors for atherosclerosis include plasma low density lipoproteins (LDL)or Cholesterol, low PUFA in the diet, hypertension, and high Na intake, obesity, diabetes, lack of exercise, cigarette smoking, sugar, low fiber and nicotinic acid in the diet, sources of Protein foods, and Psychological factors. Among various dietary factors, fat is known as the most serious causative agent for atherosclerosis. The genetic factor is a18o known as an important one but is out of scope in this paper. Since atherosclerosis is a progressive disease which may develop for many years before showing any definitive symptoms, it is very important to develop preventive programs especially in the country like Korea that is not quite overdevelopted as some western countries. In this paper all the factors mentioned above were reviewed and the dietary suggestion were made on the basis of the content of polyunsaturated and saturated fat in the diet to prevent or/and to cure this disease. Most of the available data on diet therapy with emphasis. on P/S ratio were tabulated together. after tile patient's habitual dietary intake is analized the guidelines of personalized fat-controlled diet can be recommended. It is of utmost importance to develop Korean diets for beth prevention and cure of atherosclerosis emphasizing individual eating habit in the near future which can be more Practicaly used both at home and in the hospital.

  • PDF

Synthesis and Characterization of Mica Coated with Zinc Oxide Nanoparticles (산화 아연 나노 입자로 도포된 마이카의 합성 및 특성 규명)

  • Kil, Hyun Suk;Kim, Young Ho;Park, Minyoung;Rhee, Seog Woo
    • Applied Chemistry for Engineering
    • /
    • v.23 no.3
    • /
    • pp.271-278
    • /
    • 2012
  • In this work, we have prepared the nanocomposite by the reaction of mica and zinc oxide, and investigated the application of nanocomposite to UV protecting creams. Mica treated with 3-aminopropyltrimethoxysilane (APTMS) reacted with 1,4-phenylenediisothiocyanate (PDC) to give -N=C=S functionalized surface, which was further reacted with zinc oxides coated with APTMS to give mica-zinc oxide nanocomposites. The composites were characterized by EA, EDS, TGA, SEM, zeta potential measurement, powder XRD, and DRS UV/Vis analyses. Finally, we measured transmittances of ultraviolet protection creams manufactured by using mica composite covered with zinc oxides in the range of 280~400 nm. The nanocomposites developed in this work might be applicable as inorganic hybrid materials for UV protecting creams.