• Title/Summary/Keyword: IP 10

Search Result 2,602, Processing Time 0.029 seconds

Multiverse, The Strategy of the Universe Reproduction for Expanding Content IP (멀티버스(Multiverse), 콘텐츠 IP확장을 위한 세계관 재생산 전략)

  • Jang, Min-Gi
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.182-189
    • /
    • 2022
  • As OTT services become popular worldwide, content IP expansion strategy has an important position in the platform media industry ecosystem where new content is constantly distributed. In particular, the method in which a successful narrative expands the elements constituting a specific world, that is, the Universe, is effective in reducing risk factors in content IP expansion and expanding content franchises. This study intends to examine how Marvel's cinematic Universe (MCU) is strategically performing content IP expansion while borrowing the multiverse concept and replicating and reproducing it by itself through narrative analysis of . As a result, the multiverse can reproduce an incomplete state by repeating the completed event, which can exist as another self-fulfilling content. At the same time, it can be an effective content IP expansion strategy in that each story can be produced because a single character can exist in multiple under the multiverse.

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.

TCP/IP Using Minimal Resources in IoT Systems

  • Lee, Seung-Chul;Shin, Dongha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.125-133
    • /
    • 2020
  • In this paper, we design 4-layer TCP/IP that utilizes minimal memory and processor resources in Internet of Things(IoT) systems. The TCP/IP designed in this paper has the following characteristics. First, memory resource is minimized by using minimal memory allocation. Second, processor resource is minimized by using minimal memory copy. Third, the execution time of the TCP/IP can be completed in a deterministic time. Fourth, there is no memory leak problem. The standard in minimal resources for memory and processor derived in this paper can be used to check whether the network subsystems of the already implemented IoT systems are efficiently implemented. As the result of measuring the amount of memory allocation and copy of the network subsystem of Zephyr, an open source IoT kernel recently released by the Linux Foundation, we found that it was bigger than the standard in minimal resources derived in this paper. The network subsystem of Zephyr was improved according to the design proposed in this paper, confirming that the amount of memory allocation and copy were decreased by about 39% and 67%, respectively, and the execution time was also reduced by about 28%.

Relationship Analysis between the Ownership of Intellectual Property and the Business Revenue of Disaster-Safety Industry Enterprises (지식재산권과 재난안전산업 기업매출의 연관성 분석)

  • Im, Sujung;Park, Dugkeun
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.432-445
    • /
    • 2019
  • Since industry and technology are being developed through interactions, intellectual property (IP), which are used as a substitute for technology, are found to have a close relationship with industry. The current status of IP and the business revenue differences of enterprises of south Korea are analyzed in the disaster-safety industry. Only 2.66% out of 49,538 firms have IP, indicating that most companies do not have IP. The difference in sales due to the ownership of IP is not statistically significant in middle-standing enterprises, but that of medium and small-sized enterprises (SMEs) is statistically significant. It is also found that 17 Divisions, which have IP, out of 21 Divisions in the Disaster-Safety Industry Special Classification of Korea have higher business revenue, and 10 Divisions of those 17 Divisions indicate statistical significance. In conclusion, the ownership of IP is one of the factors affecting the difference in business revenue for SMEs in Korea, implying that it is important to focus on creating and securing IP.

Implementation of Tone Control Module in Anchor System for Improved Audio Quality

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.10-21
    • /
    • 2024
  • Recently, audio systems are changing the configuration of conventional sound reinforcement (SR) systems and public address (PA) systems by using audio over IP (AoIP), a technology that can transmit and receive audio signals based on internet protocol (IP). With the advancement of IP technology, AoIP technologies are leading the audio market and various technologies are being released. In particular, audio networks and control hierarchy over peer-to-peer (Anchor) technology based on AoIP is a system that transmits and receives audio signals over a wide bandwidth without an audio mixer, creating a novel paradigm for existing audio system configurations. Anchor technology forms an audio system by connecting audio sources and output equipment with On-site audio center (OAC), a device that can transmit and receive IP. Anchor's receiving OAC is capable of receiving and mixing audio signals transmitted from different IPs, making it possible to configure a novel audio system by replacing the conventional audio mixer. However, Anchor technology does not have the ability to provide audio effects to input devices such as microphones and instruments in the audio system configuration. Due to this, when individual control of each audio source is required, there is a problem of not being able to control the input signal, and it is impossible to individually affect a specific input signal. In this paper, we implemented a tone control module that can individually control the tone of the audio source of the input device using the audio processor core in the audio system based on Anchor technology, tone control for audio sources is possible through a tone control module connected to the transmitting OAC. As a result of the study, we confirmed that OAC receives the signal from the audio source, adjusts the tone and outputs it on the tone control module. Based on this, it was possible to solve problems that occurred in Anchor technology through transmitting OAC and tone control modules. In the future, we hope that the audio system configuration using Anchor technology will become established as the standard for audio equipment.

Trend of Lawful Interception Regulation on IP Service in U.S.A. (미국의 IP 서비스 감청 규제 동향)

  • Park, S.Y.;Kim, E.S.;Kang, S.G.
    • Electronics and Telecommunications Trends
    • /
    • v.21 no.5 s.101
    • /
    • pp.185-195
    • /
    • 2006
  • 미국에서는 감청을 수행하는 데 있어 통신기술의 발달에 대응하기 위하여, 1994년 10월에 통신사업자의 감청 수행을 위한 장비설치의무를 핵심 내용으로 하는 CALEA를 제정하였다. 그 이후, 인터넷전화 등의 IP 서비스가 발달함에 따라 CALEA의 적용범위확대에 대한 이슈가 제기되기 시작하였다. 이에 대하여 FCC는 2005년 9월, CALEA를 설비기반 광대역 인터넷 접속서비스 제공업자와 상호연동 VoIP 서비스 제공업자에게 적용한다는 내용을 담은 order를 발표하였다. 이를 시행하기 위해서는 비용보전, 유예기간의 준수 등 여러 가지 이슈들이 해결되어야 하는데, 이를 위하여 FCC는 2006년 5월에 두번째 order를 발표하였다. 이 order에서는 위 두 종류의 사업자에게 CALEA를 적용하기 위해 해결되어야 할 주요 이슈들에 대한 검토 결과 등을 다루고 있다. 본 문서에서는 FCC order를 중심으로 미국의 IP 서비스 감청 규제 동향을 분석한다.

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.

IP Sharing Router Debate: On the struggle between network and terminal (IP공유기 논쟁: 네트워크와 단말기 사이의 분투와 종결)

  • Kim, Ji-Yeon
    • Journal of Science and Technology Studies
    • /
    • v.10 no.1
    • /
    • pp.73-106
    • /
    • 2010
  • Internet users want to use IP sharing routers for reducing their cost and managing their terminals easy. Network service providers(NSPs) forced their subscribers pay extra charges to use extra terminal like IP router, since 1998 in Korea. The NSPs asserted that IP sharing routers would harm their networks or would impose extra load on their networks, but they were unable to prove their assertion. Users and manufacturing companies insisted on the legitimacy of IP routers, because the IP router is a kind of terminal for end-users, and as such, the right of selection of an IP router belongs to the user. The interest in and beliefs of the relevant social groups about IP router will be deduced through their interpretation. It draws the technological frame of two social groups, NSPs and IP router-manufacturing companies. The rough struggle between two social groups come from their frames. The article shows how society constructs a particular information technology.

  • PDF

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.