• Title/Summary/Keyword: MAC Address

Search Result 114, Processing Time 0.026 seconds

Implementation of IPv6 Bluetooth Access Point (IPv6를 지원하는 블루투스 엑세스 포인트 구현)

  • Choi, Hyun-Seok;Moon, Choon-Kyoung;Kim, Pyung-Soo;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.435-437
    • /
    • 2004
  • In this paper, we aim to design and implement supporting IPv6 Bluetooth Access point(AP) in Linux. Bluetooth is a cable replacement technology designed for short range ad-hoc connections, which most likely change the way we handle and access information in the near future. In Personal Area Network(PAN) mobile devices need many IP address space, then we need next generation Internet Protocol(IPv6). We designed Bluetooth Access Point with Bluetooth stack and MAC bridge function in Linux. The implementation tested on Linux system based on Bluetooth Access Point with other Bluetooth devices.

  • PDF

보는 대로 바로 연결하는 시선(視選)통신 기술

  • Kim, Seon-Ae;Kim, Yeong-Hun;Kim, Su-Chang;Lee, Mun-Sik;Bang, Seung-Chan
    • Information and Communications Magazine
    • /
    • v.31 no.1
    • /
    • pp.89-93
    • /
    • 2013
  • 본 고에서는 수많은 기기들이 산재하는 무선 통신환경에서 근접거리 내의 디바이스 및 서비스 발견 과정 시에 사용자 개입을 최소화하여 빠르고 편리하게 통신대상에 연결하기 위한 시선(視選)통신 기술에 대하여 알아본다. 시선통신(Look-and-Link) 은 사용자가 통신대상의 식별자(전화번호, MAC address 등)를 모르더라도 스마트폰의 화면에서 대상을 보고 선택하면 바로 연결시켜주는 기술이다. 사용자는 스마트폰의 화면을 통해 통신대상을 선택하는 최소한의 관여만으로도 사용자가 원하는 통신대상(프린터, TV, 상점, 사람)을 사용자의 기기가 자동으로 통신대상을 인식하고 해당 디바이스의 통신식별자를 획득해서 손쉽고 빠르게 통신대상과 접속 할 수 있다. 시선통신 기술은 무선 트래픽이 폭증하는 최근 통신환경에서 별도의 네트워크 도움 없이 주변 단말과 직접통신을 통해 사용자에게 근접인식 기반의 다양한 모바일 서비스를 제공한다.

Illumination Variations in Near-Equatorial Orbit Imaging: A Case Study with Simulated Data of RAZAKSAT

  • Hassan, Aida-Hayati-Mohd;Hashim, Mazlan;Arshad, Ahmad-Sabirin
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1052-1054
    • /
    • 2003
  • RAZAKSAT is a second micro-satellite mission by Malaysian Satellite Program and is expected for launch in June 2004. Designed to orbit the earth at low-equatorial orbit, RAZAKSAT will meet Malaysia’s immediate needs to rapid data acquisition (real time and more repetitions) to address many operational issues of remote sensing applications, which require availability of current data sets. RAZAKSAT will be among the first remote sensing satellite to orbit the earth at low inclination along the equator, 9$^{\circ}$ with 685km altitude, hence, allows optimal geographical information and environment change within equatorial region be observed with a unique revisit characteristics. The satellite primary payload is MAC, a push-broom type camera with 2.5m of ground sampling distance (GSD) in panchromatic band and 5m of GSD in four multi-spectral bands. This paper describes on the variation of illumination anticipated from simulated RAZAKSAT image, examine its implication to its ground leaving radiances for major applications.

  • PDF

Protocol Implementation for Ethernet-Based Real-Time Communication Network (이더넷 기반 실시간 통신 네트워크 프로토콜 구현)

  • Kwon, Young-Woo;Nguyen, Dung Huy;Choi, Joon-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.247-251
    • /
    • 2021
  • We propose a protocol for Ethernet-based industrial real-time communication networks. In the protocol, the master periodically transmits control frames to all slaves, and the ring-type network topology is selected to achieve high-speed transmission speed. The proposed protocol is implemented in the form of both firmware and Linux kernel modules. To improve the transmission speed, the MAC address table is disabled in the firmware implementation, and the NAPI function of the Ethernet driver is removed in the Linux kernel module implementation. A network experiment environment is built with four ARM processor-based embedded systems and network operation experiments are performed for various frame sizes. From the experimental results, it is verified that the proposed protocol normally operates, and the firmware implementation shows better transmission speed than the Linux kernel module implementation.

Design of a Static ARP Table Management xApp for an E2 Interface Security in Open RAN (Open RAN에서의 E2 인터페이스 보호를 위한 정적 ARP 테이블 관리 xApp 설계)

  • Jihye Kim;Jaehyoung Park;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.381-382
    • /
    • 2024
  • Open RAN(Radio Access Network)을 선도적으로 연구하고 있는 O-RAN Alliance에서는 Open RAN의 E2 인터페이스에서 발생 가능한 보안 위협 중 하나로 MitM(Man-in-the-Middle) 공격을 명시하였다. 그러나 이에 대응하기 위한 보안 요구사항으로는 3계층 보안 프로토콜인 IPsec 사용을 명시하고 있으며, 2계층 공격인 ARP(Address Resolution Protocol) 스푸핑에 대한 요구사항은 명시하고 있지 않다. 따라서 본 논문에서는 MitM 공격 중 하나인 ARP 스푸핑으로부터 E2 인터페이스를 보호하기 위해, Near-RT RIC의 ARP 테이블에서 E2 인터페이스로 연결되는 장비에 대한 MAC 주소를 정적으로 설정할 수 있는 xApp을 제안한다.

Low-power 6LoWPAN Protocol Design (저 전력 6LoWPAN 프로토콜 설계)

  • Kim, Chang-Hoon;Kim, Il-Hyu;Cha, Jung-Woo;Nam, In-Gil;Lee, Chae-Wook
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.274-280
    • /
    • 2011
  • Due to their rapid growth and new paradigm applications, wireless sensor networks(WSNs) are morphing into low power personal area networks(LoWPANs), which are envisioned to grow radically. The fragmentation and reassembly of IP data packet is one of the most important function in the 6LoWPAN based communication between Internet and wireless sensor network. However, since the 6LoWPAN data unit size is 102 byte for IPv6 MTU size is 1200 byte, it increases the number of fragmentation and reassembly. In order to reduce the number of fragmentation and reassembly, this paper presents a new scheme that can be applicable to 6LoWPAN. When a fragmented packet header is constructed, we can have more space for data. This is because we use 8-bits routing table ill instead of 16-bits or 54-bits MAC address to decide the destination node. Analysis shows that our design has roughly 7% or 22% less transmission number of fragmented packets, depending on MAC address size(16-bits or 54-bits), compared with the previously proposed scheme in RFC4944. The reduced fragmented packet transmission means a low power consumption since the packet transmission is the very high power function in wireless sensor networks. Therefore the presented fragmented transmission scheme is well suited for low-power wireless sensor networks.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

An Approach for Improving Mobile WiMAX Security - ROSMEX Architecture (안전한 모바일 와이맥스 네트워크를 위한 보안 구조 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Choi, Hyo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.25-34
    • /
    • 2010
  • The IEEE 802.16-2004 standard has a security sub-layer in the MAC layer called, Privacy Key Management (PKM). However, several researches have been published to address the security vulnerabilities of IEEE 802.16-2004. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handoffs and roaming capabilities. PKMv2 in Mobile WiMAX includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, Mobile WiMAX still has a problem of security architecture such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication because Mobile WiMAX security has mainly concentrated on between SS and BS communication. Based on the investigation results, we propose a novel mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX), to prevent the new security vulnerabilities.

Design and Implementation of Indoor Location Recognition System based on Fingerprint and Random Forest (핑거프린트와 랜덤포레스트 기반 실내 위치 인식 시스템 설계와 구현)

  • Lee, Sunmin;Moon, Nammee
    • Journal of Broadcast Engineering
    • /
    • v.23 no.1
    • /
    • pp.154-161
    • /
    • 2018
  • As the number of smartphone users increases, research on indoor location recognition service is necessary. Access to indoor locations is predominantly WiFi, Bluetooth, etc., but in most quarters, WiFi is equipped with WiFi functionality, which uses WiFi features to provide WiFi functionality. The study uses the random forest algorithm, which employs the fingerprint index of the acquired WiFi and the use of the multI-value classification method, which employs the receiver signal strength of the acquired WiFi. As the data of the fingerprint, a total of 4 radio maps using the Mac address together with the received signal strength were used. The experiment was conducted in a limited indoor space and compared to an indoor location recognition system using an existing random forest, similar to the method proposed in this study for experimental analysis. Experiments have shown that the system's positioning accuracy as suggested by this study is approximately 5.8 % higher than that of a conventional indoor location recognition system using a random forest, and that its location recognition speed is consistent and faster than that of a study.

Energy-Efficient Voice Data Broadcast Method in Wireless Personal Area Networks for IoT (IoT-WPAN 환경에서 에너지 효율적 음성 데이터 Broadcast 기법)

  • Lee, Jaeho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2178-2187
    • /
    • 2015
  • Bluetooth Low Energy (Bluetooth LE) is a representative break-through communication technology for wireless personal area networks on nowaday. In this environment, most of significant performance should be aiming to energy efficiency due to the policy for manufacturing light-weighted communication devices derived from requirement of world IoT market, and many researches have been developed to satisfy this requirement. While Bluetooth LE has been leading the low power communication technology required from the current market by employing duty cycle and frequency hopping approaches, it couldn't address the problem of reliability on broadcast transmissions. The main goal of this paper is aiming to addressing this problem by suggesting a new method. Furthermore analytic evaluations would also be proceeded to find objective results in the view point of broadcast transmission efficiency from Master device.