• Title/Summary/Keyword: IPV

Search Result 1,084, Processing Time 0.026 seconds

Design and Implementation of Realtime Information Service based on Ubiquitous Sensor Network Using MySQL and Tiny-DB (Tiny-DB와 MySQL을 이용한 유비쿼터스 센서 네트워크 기반의 실시간 정보 서비스 설계 및 구현)

  • Kang, Kyoung-Ok;Kim, Yong-Woo;Kwon, Hoon;Kim, Bu-Rim;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.175-181
    • /
    • 2006
  • Wireless sensor network forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability and wireless communication ability. The recent sensor network is study for low-power, micro, low cost of node is proceeded. Recently, the research of application services in wireless sensor networks is proceeded. Therefore, in this paper, we design the prototype of the real-time information service that support a user the information of temperature, illumination etc. And, we implement the alarm application service fer the disaster prevention on Internet base on IPv4/IPv6. We develop the module of the extract information using the query processing based on TinyOS, and the module of the server's database using MySQL data base management system and JDBC. Additionally, we develop the client module that receive the real-time sensing data using ODBC in Internet based on IPv4/IPv6.

  • PDF

Handover Monitoring with Flow-based Traffic Measurement in Mobile IPv6 Routers (모바일 IPv6 라우터에서 플로우 측정을 이용한 핸드오버 모니터링)

  • Son, Hyeon-Gu;Choi, NaK-Jung;Choi, Yang-Hee;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.5
    • /
    • pp.397-404
    • /
    • 2009
  • In this paper, we propose a method of monitoring traffic and analyzing information of handover in mobile IPv6 networks. Our proposed method analyzes handover latency through monitoring packets at routers without installing monitoring applications at mobilenodes. For this purpose, we employ a flow-based traffic monitoring standard called IPFIX to perform the traffic measurement function the packets at the routers. Therefore, our method is useful in that we could easily obtain information regarding handover of mobile nodes by only monitoring traffic at the routers. In order to verify the proposed method, we carried out experiments in a real 802.11-based mobile IPv6 network testbed. From our experimental results, it was shown that the calculated handover latency for uploading traffic is accurate with less accuracy of analyzing the handover latency for downloading traffic.

Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks

  • Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.341-347
    • /
    • 2022
  • This research is designed to help and offer hold up to complete the requirements of aged and disable in a home. The control approach and the tone approach are used to manage the house appliances. The major organize system implementation in technology of wireless to offer distant contact from a phone Internet Protocol connectivity for access and calculating strategy and appliance remotely. The planned system no need a committed server PC with value of parallel systems and offers a new communication-protocol to observe and control a house environment with more than just the switch functionality. To express the possibility and efficiency of this system, devices like as lights switches, power plugs, and motion-sensors have been included with the planned home control system and supply more security manage on the control with low electrical energy activate method. The rank of switches is corresponding in all this control system whereby all user interfaces indicate the real time existing status. This system planned to manage electrical-appliances and devices in house with reasonably low cost of design, user friendly interface, easily install and provide high security. Research community generally specified that the network "Reconnaissance Attacks" in IPv6 are usually impossible due to they will take huge challenge to carry out address scanning of 264 hosts in an IPv6 subnet."It being deployed of IPv6 shows that it definitely enhances security and undermines the probability". This research of the IPv6 addressing-strategies at present utilizes and planned a new strategy and move toward to "mitigate reconnaissance attacks".

The status of intimate partner violence against pregnant women in contemporary China: a scoping review

  • Xue Mei Fan;Hae Won Kim
    • Women's Health Nursing
    • /
    • v.30 no.1
    • /
    • pp.41-55
    • /
    • 2024
  • Purpose: This review explored the status of publications on intimate partner violence (IPV) against pregnant women in contemporary China. Methods: The PubMed, Cochrane Library, Embase, CINAHL, and PsycInfo databases were searched using the terms "IPV," "pregnant woman," "Chinese," and synonyms in English, along with related keywords for Chinese publications. All literature pertaining to IPV during pregnancy, conducted in China, and published between 1987 and September 2023 was included. Results: A total of 37 articles from 30 studies were selected. The prevalence of IPV during pregnancy ranged from 2.5% to 31.3%, with psychological violence being the most common form. Frequently identified risk factors included unintended pregnancy, poor family economic conditions, male partners engaging in health risk behaviors, poor employment status of women or their partners, low education levels among women, physical or mental health issues, strained couple relationships, and in-law conflicts. IPV during pregnancy primarily led to mental health problems for the victims and could result in adverse obstetric outcomes, as well as negative effects on the temperament and development of the offspring. Victims in China demonstrated a low willingness to seek help from professionals. Furthermore, relevant research in mainland China is scarce, with a limited number of studies and non-standardized research methodologies. Conclusion: Future research should investigate IPV in pregnancy from various perspectives, identify factors unique to IPV during pregnancy, and focus on high-risk groups. Considering the conditions in China, there is a pressing need to increase public awareness of IPV and to investigate interventions aimed at addressing this issue.

Implementation of IPv6 Neighbor Discovery Protocol supporting CGA

  • Kim Joong Min;Park In Kap;Yu Jae Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.571-575
    • /
    • 2004
  • Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.

  • PDF

Implementation of IPv6 Bluetooth Access Point (IPv6를 지원하는 블루투스 엑세스 포인트 구현)

  • Choi, Hyun-Seok;Moon, Choon-Kyoung;Kim, Pyung-Soo;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.435-437
    • /
    • 2004
  • In this paper, we aim to design and implement supporting IPv6 Bluetooth Access point(AP) in Linux. Bluetooth is a cable replacement technology designed for short range ad-hoc connections, which most likely change the way we handle and access information in the near future. In Personal Area Network(PAN) mobile devices need many IP address space, then we need next generation Internet Protocol(IPv6). We designed Bluetooth Access Point with Bluetooth stack and MAC bridge function in Linux. The implementation tested on Linux system based on Bluetooth Access Point with other Bluetooth devices.

  • PDF

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

Evolution of E-commerce Protocols in IPv6 (IPv6 기반의 전자상거래 보안 프로토콜의 진화)

  • Choi, Jung-Sun;Kim, Geon-Ung;Park, Ryoung-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.1565-1568
    • /
    • 2001
  • 인터넷의 보급으로 전자상거래가 활성화 되고 있는 시점에서 무엇보다 중요한 것이 보안 문제인데, 현재의 인터넷에서 전자상거래와 관련하여 이용되고 있는 보편적인 보안 프로토콜이 SET와 SSL이다. IPv4의 여러 가지 한계를 극복하고자 진행되고 있는 IPv6에서 무엇보다도 주목한 점은 망 차원에서의 보안기능이 강화되고 있다는 점인데, 본 논문에서는 이러한 IPv6외 IPsec과 SET 그리고 SSL의 기능 및 역할을 고찰하구 향후 차세대 인터넷에서의 전자상거래 관련 보안 프로토콜의 진화 방향을 제시한다.

  • PDF