• Title/Summary/Keyword: MAC address

Search Result 115, Processing Time 0.027 seconds

Practical MAC address table lookup scheme for gigabit ethernet switch (기가비트 이더넷 스위치에서 빠른 MAC 주소 테이블의 검색 방법)

  • 이승왕;박인철
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.799-802
    • /
    • 1998
  • As we know, gigabit ethernet is a new technology to be substituted for current fast ethernet used widely in local area network. The switch used in gigabit ethernet should deal with frames in giga-bps. To do such a fast switching, we need that serveral processes meet the budgets, such as MAC address table lookup, several giga speed path setup, fast scheduling, and etc. Especially MAC address table lookup has to be processed in the same speed with speed of incoming packets, thus the bottleneck in the process can cause packet loss by the overflow in the input buffer. We devise new practical hardware hashing method to perform fast table lookup by minimizing the number of external memory access and accelerating with hardware.

  • PDF

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

Enhanced TDMA based MAC Protocol for Adaptive Data Control in Wireless Sensor Networks

  • Alvi, Ahmad Naseem;Bouk, Safdar Hussain;Ahmed, Syed Hassan;Yaqub, Muhammad Azfar;Javaid, Nadeem;Kim, Dongkyun
    • Journal of Communications and Networks
    • /
    • v.17 no.3
    • /
    • pp.247-255
    • /
    • 2015
  • In this paper, we propose an adaptive time division multiple access based medium access control (MAC) protocol, called bitmap-assisted shortest job first based MAC (BS-MAC), for hierarchical wireless sensor networks (WSNs). The main contribution of BS-MAC is that: (a) It uses small size time slots. (b) The number of those time slots is more than the number of member nodes. (c) Shortest job first (SJF) algorithm to schedule time slots. (d) Short node address (1 byte) to identify members nodes. First two contributions of BS-MAC handle adaptive traffic loads of all members in an efficient manner. The SJF algorithm reduces node's job completion time and to minimize the average packet delay of nodes. The short node address reduces the control overhead and makes the proposed scheme an energy efficient. The simulation results verify that the proposed BS-MAC transmits more data with less delay and energy consumption compared to the existing MAC protocols.

The core information protection mechanism in the BcN(Broadband Convergence Network) (BcN(Broadband Convergence Network) 환경에서의 중요정보에 대한 도청방지 메카니즘)

  • Oh, Sek-Hoan;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.14-26
    • /
    • 2008
  • IP over Ethernet technology widely used as Internet access uses the ARP(Address Resolution Protocol) that translates an ip address to the corresponding MAC address. recently, there are ARP security attacks that intentionally modify the IP address and its corresponding MAC address, utilizing various tools like "snoopspy". Since ARP attacks can redirect packets to different MAC address other than destination, attackers can eavesdrop packets, change their contents, or hijack the connection. Because the ARP attack is performed at data link layer, it can not be protected by security mechanisms such as Secure Shell(SSH) or Secure Sockets Layer(SSL). Thus, in this paper, we classify the ARP attack into downstream ARP spoofing attack and upstream ARP redirection attack, and propose a new security mechanism using DHCP information for acquisition of IP address. We propose a "DHCP snoop mechanism" or "DHCP sniffing/inspection mechanism" for ARP spoofing attack, and a "static binding mechanism" for ARP redirection attack. The proposed security mechanisms for ARP attacks can be widely used to reinforce the security of the next generation internet access networks including BcN.

Extended FDB Application Algorithm Proposal for Overlap VLAN Implementation (중첩 VLAN구현을 위한 확장 FDB적용 알고리즘 제안)

  • 황인섭;공휘식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.84-88
    • /
    • 2001
  • Security and degradation by broadcast is the most important part that must handle in LAN. Virtual LAN can improve LAN's degradation by method to form and manages network group logically. MAC Address VLAN algorithm that propose in this research give overlap special qualify to VLAN adding extension VID field and VID connection extent table to FDB, manage overlap extent dynamically. VLAN that apply this proposal algorithm can share information and resource in network without additional equipment. Application is possible switch or Bridge that this algorithm achieves Layer 2 functions.

  • PDF

EEPB-MAC: Energy Efficient & Priority-Based MAC Protocol for Energy Harvesting Wireless Sensor Networks (에너지 수확 무선 센서 네트워크에서 에너지 효율 및 우선순위 기반의 MAC 프로토콜)

  • Kim, Seong-Cheol;Jeon, Jun-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.755-761
    • /
    • 2013
  • Medium access control (MAC) protocols for wireless sensor networks make sensor nodes on state for energy-efficiency only when necessary. In this paper we present an energy efficient priority-based MAC protocol for energy-harvesting Wireless Sensor Networks (WSNs). For support priority-based packet transmission the proposed EEPB-MAC protocol uses the modified IEEE 802.15.4 beacon frames including priority bit, sender node address, and NAV value fields. A receiver node periodically wakes up, receives sender beacon frames, selects data sending sender, and broadcasts a beacon frame containing the selected sender's address. A receiver node selects sender node according to sender's data priority. A receiver nodes also adjust wake up period based on their energy states. Hence, the energy consumption of receiver node can be minimized. Through simulations and analytical analysis, we evaluate the performance of our proposed the EEPB-MAC protocol and compare it against the previous MACs. Results have shown that our protocol outperforms other MAC in terms of energy consumption, higher priority packet delivery delay.

An ARP-disabled network system for neutralizing ARP-based attack

  • Battulga, Davaadorj;Jang, Rhong-Ho;Nyang, Dae-Hun
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.234-237
    • /
    • 2016
  • Address Resolution Protocol (ARP) is used for mapping a network address to physical address in many network technologies. However, since ARP protocol has no security feature, it always abused by attackers for performing ARP-based attacks. Researchers presented many technologies to improve ARP protocol, but most of them require a high implementation cost or scarify the network performance for using ARP protocol securely. In this paper, we present an ARP-disabled network system to neutralize the ARP-based attacks. "ARP-disabled" means suppress the ARP messages like request, response and broadcast messages, but not the ARP table. In our system, ARP tables are used for managing static ARP entries without prior knowledge (e.g. IP, MAC list of client devices). This is possible because the MAC address was designed to be derived from IP address. In general, our system is safe from the ARP-based attacks even the attacker has a strong power. Moreover, we saved network bandwidth by disabling the ARP messages.

ARP spoofing attack and its countermeasures (도메인 네임 스푸핑 공격과 그 대응책)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.1
    • /
    • pp.47-53
    • /
    • 2014
  • DNS spoofing, the DNS server with the address of a specific web server intercepts them in the process of translating the attacker wants to forge a Web server that is a way to access. ARP spoofing ARP request and response messages for the protocol without authentication vorticity incorrect information as to the ARP Cache Table to store the MAC addresses of their vulnerability using the MAC address of the other computer as if it were a lie technique. These DNS / ARP spoofing attacks in detail to find out about how it looks at ways to prevent. Think about the future research directions.

  • PDF

A Study of Indirect Attack Method with Interlocked Proxy Server in Foreign Country (해외에서 Proxy Server를 연동한 우회적인 공격기법 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.432-435
    • /
    • 2011
  • Hacking 공격자에 대한 수사실무에서는 Proxy Server를 연동한 해외에서의 우회공격에 대한 기법과 기술을 알아야 MAC address 또는 Real IP에 대한 역추적이 가능하다. 즉 Proxy Server를 여러 번 거치면서 자신의 Real IP를 숨기고 ARP Spoofing 기법을 사용하여 MAC address를 속이기 때문이다. 본 논문에서는 해외에서의 해킹 공격자들이 어떻게 공격자의 Real IP를 숨기고, ARP Spoofing 기법을 응용하여 공격을 시도하는 기법과 기술을 연구한다. 또한 Proxy Server를 통한 우회공격에서 ARP Spoofing 공격을 보안하는 방법을 연구한다. 본 논문 연구가 해외로 부터의 Hacking과 방어를 위한 기술 발전에 기여 할 것 이다.

  • PDF

Implementation of Security Algorithm to Preserve Copyright of Education Contents (학원 교육 콘텐츠 S/W 저작권 보호를 위한 알고리즘 구현)

  • Kang, Min-Jae;Pyoun, Do-Kil;Cheong, Sang-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.324-326
    • /
    • 2011
  • As development of education contents has become more active, it is not much that way to preserve copyright of S/W consuming contents. So this paper studied way to preserve copyright of S/W from MAC address of ethernet and hard disk volume serial number. This study realizes the simple but powerful security algorithm to preserve copyright. So this tightens to preserve copyright of S/W of education contents and will contributes to decrease damages because of using illegal S/W.

  • PDF