• Title/Summary/Keyword: Home networks security

Search Result 76, Processing Time 0.026 seconds

Capacity Analysis of Internet Protocol Television (IPTV) over IEEE 802.11ac Wireless Local Area Networks (WLANs)

  • Virdi, Chander Kant;Shah, Zawar;Levula, Andrew;Ullah, Imdad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.327-333
    • /
    • 2022
  • Internet Protocol Television (IPTV) has emerged as a personal entertainment source for home users. Streaming IPTV content over a wireless medium with good Quality of Service (QoS) can be a challenging task as IPTV content requires more bandwidth and Wireless Local Area Networks (WLANs) are susceptible to packet loss, delay and jitter. This research presents the capacity of IPTV using User Datagram Protocol (UDP) and TCP Friendly Rate Control (TFRC) over IEEE 802.11ac WLANs in good and bad network conditions. Experimental results show that in good network conditions, UDP and TFRC could accommodate a maximum of 78 and 75 Standard Definition Television (SDTV) users, respectively. In contrast, 15 and 11 High-Definition Television (HDTV) users were supported by UDP and TFRC, respectively. Performance of UDP and TFRC was identical in bad network conditions and same number of SDTV and HDTV users were supported by TFRC and UDP. With background Transmission Control Protocol (TCP) traffic, both UDP and TFRC can support nearly the same number of SDTV users. It was found that TFRC can co-exist fairly with TCP by giving more throughput to TCP unlike UDP.

Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes (인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정)

  • Kim, Hyun-Hee;Lee, Kyoung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

A Novel Framework Based on CNN-LSTM Neural Network for Prediction of Missing Values in Electricity Consumption Time-Series Datasets

  • Hussain, Syed Nazir;Aziz, Azlan Abd;Hossen, Md. Jakir;Aziz, Nor Azlina Ab;Murthy, G. Ramana;Mustakim, Fajaruddin Bin
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.115-129
    • /
    • 2022
  • Adopting Internet of Things (IoT)-based technologies in smart homes helps users analyze home appliances electricity consumption for better overall cost monitoring. The IoT application like smart home system (SHS) could suffer from large missing values gaps due to several factors such as security attacks, sensor faults, or connection errors. In this paper, a novel framework has been proposed to predict large gaps of missing values from the SHS home appliances electricity consumption time-series datasets. The framework follows a series of steps to detect, predict and reconstruct the input time-series datasets of missing values. A hybrid convolutional neural network-long short term memory (CNN-LSTM) neural network used to forecast large missing values gaps. A comparative experiment has been conducted to evaluate the performance of hybrid CNN-LSTM with its single variant CNN and LSTM in forecasting missing values. The experimental results indicate a performance superiority of the CNN-LSTM model over the single CNN and LSTM neural networks.

Security Requirements and Proposals for the Home Server in Ubiquitous Home Networks (유비쿼터스 홈 서버 보안 요구사항 및 구현방안)

  • Kim, J.T.;Beom, M.J.;Park, H.K.;Paik, E.H.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.2 s.92
    • /
    • pp.83-92
    • /
    • 2005
  • 유비쿼터스 환경의 현실화와 일반화의 시발점인 홈 네트워크 기술은 PC와 노트북, 프린터, 냉장고, DTV, 오디오/비디오를 포함하는 댁내의 모든 가전기기들을 하나의 네트워크로 연결함으로써 사용자가 언제 어디에 있든 인터넷을 이용하여 댁내의 상황을 모니터링하고 모든 기기들을 제어할 수 있게 해주는 기술이다. 현재 대부분의 기업들은 각자 회사의 네트워크를 보호하기 위하여 방화벽(firewall)이나 침입탐지시스템(intrusion detection system) 및 가상 사설망(virtual private network) 등의 방어책을 응용하고 있지만, 홈 네트워크는 기업과 비교하여 규모면에서나 보안 기술에 대한 고려 및 응용이 활발하지 않다. 이러한 다양한 보안 정책은 다가올 유비쿼터스 홈 네트워크 환경에서의 중추적 역할을 해야 될 홈 서버의 중요한 역할 중 하나이다. 따라서 본 문서의 유비쿼터스 홈 네트워크 환경에서 홈 서버의 보안 요구사항 및 구현방안들을 살펴 본다.

A Study on the User Authentication and Key Exchange Service for Group Environment (그룹 환경의 사용자 인증 및 키 교환 서비스 프로토콜 연구)

  • Byun, Jin-Wook;Lee, Su-Mi;Lee, Dong-Hoon
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.117-136
    • /
    • 2009
  • Over the years a password has been used as a popular authentication method between a client and a server because of its easy-to-memorize property. But, most password-based authentication services have focused on a same password authentication scheme which provides an authentication and key exchange between a client and a server with the same password. With rapid change of communication environments in the fields such as mobile networks, home networking, etc., the end-to-end security allowing users to hold different password is considered as one of main concerns. In this paper, we consider a new authentication service of how each client with different own password is able to authenticate each other, which is a quite new service paradigm among the existing services. This new service can be used in the current or next generation network environment where a mobile user in cell A wants to establish a secure end-to-end channel with users in ceil B, C, and D using only their memorable passwords. This end-to-end security service minimizes the interferences from the operator controlled by network components. To achieve this end-to-end security, we propose an authentication and key exchange service for group users in different realm, and analyze its security in a formal way. We also discuss a generic construction with the existing authentication schemes.

Lightweight Intrusion Detection for Ubiquitous Home Networks (유비쿼터스 홈네트워크를 위한 경량화된 침입탐지)

  • Yu Jae-Hak;Lee Han-Sung;Chung Yong-Wha;Choi Sung-Back;Yang Sung-Hyun;Park Dai-Hee
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.269-272
    • /
    • 2006
  • 최근 들어, 유비쿼터스 홈네트워크에 대한 관심이 높아지고 있지만, 기능 구현에 초점을 맞추고 있다. 이러한 홈네트워크는 단일 서비스가 아닌 다양한 서비스 집합으로서의 성격이 강하므로 세분화된 보안 요구사항과 제한된 자원에서의 원활한 서비스를 위해 시스템 경량화는 필수적 요소이다. 이에 본 논문에서는 유비쿼터스 홈네트워크 환경에서 요구하는 보안성 및 경량화를 고려한 새로운 침입탐지 모델을 제안한다.

  • PDF

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

A Study on Web Service Security Testing Methodology for Performance Evaluation (웹 서비스 보안 성능 평가 테스트 방법론 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.31-37
    • /
    • 2010
  • The risks and threats in IT security systems to protect, prevent damage and Risk should be minimized. Context of information security products such as information processing, storage, delivery, and in the process of information system security standards, That is the basic confidentiality, availability, integrity and secondary clarity, potential evidence, detection, warning and defense capabilities, to ensure sufficient and should be. Web services are the most important elements in the security, the web nature of port 80 for the service to keep the door open as a structure, Web applications, web sources and servers, networks, and to hold all the elements are fundamental weaknesses. Accordingly, these elements through a set of Web application development errors and set-up errors and vulnerabilities in Web applications using their own home pages and web servers to prevent hacking and to improve the efficiency of Web services is proposed methodology performs security BMT.

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

A Fast Authentication based on Hierarchical Key Structure for Roaming Mobile Nodes Between Domains (모바일 네트워크에서 로밍을 위한 계층적 인증 방법)

  • Hong, Ki-Hun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1288-1296
    • /
    • 2006
  • This paper proposes a fast authentication scheme based on hierarchical key structure (HiFA) for roaming mobile nodes in both intra-domain and inter-domain. The full authentication procedure standardized in IEEE 802.11 and 802.16 is difficult to be applied to a handover since it needs a heavy operation and long delay time during a handover. Though a number of schemes were proposed to solve the problem, the existing schemes might degrade the security of authentication or impose heavy administrative burden on the Pome authentication server. The main contribution of this paper is to reduce the communication and computation overhead of the home authentication sewer without degrading the security strength of the fast roaming authentication using hierarchical authentication key structure. The proposed scheme iii this paper decentralizes the administrative burden of the home authentication server to other network entities such as a local authentication server or access point and supports the security separation of the authentication key among local authentication servers using hash key chain.