• Title/Summary/Keyword: IP기반의 모바일 네트워크

Search Result 110, Processing Time 0.051 seconds

Efficient Authentication for Convergence of IoT and Mobile IP (사물인터넷과 모바일 IP의 융합을 위한 효율적 인증 메커니즘)

  • Lee, YunJung;Cho, Jungwon;Kim, Chul-Soo;Lee, Bong-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.13-18
    • /
    • 2019
  • This paper proposes efficient and secure two-way authentication protocol for binding update messages between mobile devices and home agents / correspondent nodes in IoT and Mobile IPv6 (MIPv6) environments with limited computing power and resources. Based on the MIPv6 message exchange, the proposed protocol satisfies both the authentication and the public key exchange optimized for both sides of the communication with minimum modification. In the future, we will carry out a performance analysis study by implementing the proposed protocol in detail.

A scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6 (Fast Mobile IPv6 에서의 mSCTP를 이용한 handoff 지연 감소 기법)

  • Lee, Jae-Min;Lim, Hun-Jung;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1225-1228
    • /
    • 2007
  • 무선 네트워크와 모바일 기술의 발달로 무선상에서의 통신뿐만 아니라, 모바일 기기의 이동성에 대한 요구가 점점 더 커지고 있다. 모바일 기기의 이동성을 지원하기 위해Fast Mobile IPv6 (FMIPv6), Hierarchical Mobile IPv6 (HMIPv6)와 같은IPv6기반의 네트워크 계층 프로토콜이 제안되어 왔으며, 최근에는 트랜스포트 계층에서 동작하는 mobile Stream Control Transport Protocol (mSCTP) 가 제안 되었다. 네트워크 계층에서의 이동성을 지원하기 위한 방안 중 하나인 FMIPv6 의 핸드오프 과정은 엑세스 라우터간 양방향 터널링을 설정 함으로서 엑세스 라우터의 버퍼링 오버헤드가 발생하고, 터널링 과정을 위한 메시지 교환으로 인해 핸드오프 지연이 발생하게 된다. 본 논문에서는 FMIPv6 의 이러한 단점을 해결하기 위해 트랜스포트 계층의 이동성 지원 방안인 mSCTP 를 이용한 통합 핸드오프 기법을 제안한다. 양단의 세션을 유지한 채 새로운 IP 주소를 등록 할 수 있는 mSCTP 를 사용 함으로서 FMIPv6 의 터널링으로 인해서 발생하는 엑세스 라우터의 오버헤드와 핸드오프 지연 시간을 줄이고 전체적인 핸드오프 성능을 향상 시킨다.

  • PDF

IPv6 Global Address Configuration Algorithm for Internet Interconnection in MANET (MANET기반 Internet 연결에서 IPv6 Global Address 할당 방법)

  • Hwang, Soon-Woo;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.68-74
    • /
    • 2006
  • The MANET(Mobile Ad Hoc Network) is an independent network that is oranized by only Mobile Hosts. MANET guarantees the mobility of the node and does not need a backbone network or a base station. Recently, there is a strong demand to connect MANET to the Internet. For the interconnection between MANET and Internet, Mobile hosts of MANET must have global IP address. The well known scheme of the address configuration for MANET is SAA(Stateless Address Autoconfiguration). SAA configurated IP address by node itself. The advantage of SAA is not requiring any server for address configuration. However the SAA has problems of unstable and inefficient interconnection on the AD Hoc Network. To solve this problem we propose a method that assigns an IPv6 Global address to the node through the Internet Gateway. The format of assigned IPv6 address is also defined. The simulation result demonstrates that the proposed method can support the host for fast getting of global IPv6 Address and Mobile IPv6 efficiently.

Performance Analysis of Proxy-AAA Authentication Scheme in PMIPv6 Networks with Forwarding Mode Supporting (Proxy Mobile IPv6 네트워크에서 포워딩 모드를 지원하는 인증기법의 성능분석)

  • Lee, Seung-Hyun;Shin, Dong-Ryeol;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.15-25
    • /
    • 2012
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

Study on the 3GPP International Standard for M2M Communication Networks (M2M네트워크통신을 위한 3GPP 국제표준화 동향연구)

  • Hwang, Jin-ok;Lee, Sang-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1040-1047
    • /
    • 2015
  • This study is investigated for M2M Communication Network Standard based on 3GPP. The environment of M2M communication, we can predict the new mobile service that gathering, handling, controlling, transferring of the data for Intelligence, so that we can consider new direction for a lot of subject of study development issue. This study is shown three types of M2M network structure and four types of use cases on 3GPP International Standard. In Addition, we can introduce the future M2M communication network model, it can be propagate the industry and academic cooperation with 3GPP standards. The suggestion develops multiple applications and multiple devices for industry and academic. With the deployment of network provider, this environment support our current communication market that the standard devices of M2M network and service requirement. We are suggest this study for grasp the initial market with the intellectual property right (IPR) based on International Standards. In the future, we wish the success that grap the initial market or initial academic study with helpful issue.

A Network-based Locator-Identifier Separation Scheme using DHT in SDN (SDN환경에서 DHT를 이용한 네트워크 기반 위치자-식별자 분리 기술)

  • Lee, Chan-Haeng;Min, Sung-Gi;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • An IP address is used as a host identifier and a locator to bind hosts and applications to their location in existing Internet. Several protocols are proposed to eliminate this binding. Most of these protocols use IPv6-based host identifiers to maintain compatibility with existing Internet, but these identifiers cannot be handled by standard IPv6 routers because such identifiers are unroutable. Therefore, host identifiers need to be usually converted to locators at hosts, and the standard IPv6 protocol should be modified to interoperate with these protocols. In this paper, we propose a network-based host identifier locator separating scheme in software-defined networking. The proposed scheme separates the underlying network into Host Identity and IP domains in order to directly forward unroutable identifiers. The Host Identity domain operates as an overlaid network over IP domain, and it makes the unroutable identifiers to be routable using distributed hash table based routing strategy. For the evaluation, we compared the proposed scheme with the previous scheme using signaling costs and packet delivery costs. The result shows that the proposed scheme is more suitable in the recent mobile-based environments.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

GMPLS-based Recovery Scheme Handling the Requirements for Various Service Types (다양한 서비스들의 요구사항을 만족하는 GMPLS 기반 복구 기법)

  • Lee, Yonggyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.714-724
    • /
    • 2022
  • The spread of mobile devices comes to increase explosive data traffic and then results in various types of service demands. In order to satisfy the increment of traffic and the requirements for various services, optical internet technologies that transmit several Tbps through only a single optical fiber have been actively studied. Because of the large bandwidth, an optical link can accommodate a large number of service types. Therefore, new technologies are required to guarantee the survivability of optical internet and handle the requirements of each service. So, in this article, a new scheme based on GMPLS technologies is proposed to deal with the various service demands and survivability issues in IP over WDM networks.