• Title/Summary/Keyword: MESSAGE model

Search Result 652, Processing Time 0.024 seconds

A Security Framework for Archiving the Permission of Mobile Terminal in Wireless Environment

  • Byun, Byung-Kil;Lee, Ki-Young
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.187-192
    • /
    • 2011
  • Traditional voice traffic over mobile communication has been changed into data and media contents traffic, which makes traffic amount increases and speedy data transfer required. In the near future ubiquitous mobile terminal environment will be common so that security issues will arise due to many heterogeneous equipments and connections. In this paper, many previous methods used for terminal authentication are examined. And we propose new system model which uses our novel user authentication protocol based on strong one-time password (OTP) and short message service (SMS). We verify our system model and protocol by implementation.

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Emergency Detection Method using Motion History Image for a Video-based Intelligent Security System

  • Lee, Jun;Lee, Se-Jong;Park, Jeong-Sik;Seo, Yong-Ho
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.39-42
    • /
    • 2012
  • This paper proposed a method that detects emergency situations in a video stream using MHI (Motion History Image) and template matching for a video-based intelligent security system. The proposed method creates a MHI of each human object through image processing technique such as background removing based on GMM (Gaussian Mixture Model), labeling and accumulating the foreground images, then the obtained MHI is compared with the existing MHI templates for detecting an emergency situation. To evaluate the proposed emergency detection method, a set of experiments on the dataset of video clips captured from a security camera has been conducted. And we successfully detected emergency situations using the proposed method. In addition, the implemented system also provides MMS (Multimedia Message Service) so that a security manager can deal with the emergency situation appropriately.

PERFORMANCE ANALYSIS OF CONGESTION CONTROL ALGORITHM IN COMMON CHANNEL SIGNALING NETWORKS

  • Park, Chul-Geun;Ahn, Seong-Joon;Lim, Jong-Seul
    • Journal of applied mathematics & informatics
    • /
    • v.12 no.1_2
    • /
    • pp.395-408
    • /
    • 2003
  • Common Channel Signaling(CCS) networks need special controls to avoid overload of signaling networks and degradation of call process-ing rate, since they play an important role of controlling communication transfer networks. Congestion control and flow control mechanisms are well described in ITU-T recommendation on Signaling System No.7(SS7). For the practical provisions, however, we need an analysis on the relation among service objects, system requirements and implementation of congestion control algorithms. SS7 provides several options for controlling link congestion in CCS networks. In this paper we give a general queueing model of congestion control algorithm which covers both the international and national options. From the queuing model, we obtain the performance parameters such as throughput, message loss rate and mean delay for the international option. To show the performance of the algorithm, some numerical results are also given.

Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme

  • Li, Jiguo;Huang, Xinyi;Mu, Yi;Wu, Wei
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.10-17
    • /
    • 2008
  • In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificateless public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.

An Analysis on strategies of creativity in advertising design applicable to AIDA model (AIDA Model을 적용한 광고디자인의 표현전략분석)

  • 나윤화
    • Archives of design research
    • /
    • v.14
    • /
    • pp.9-18
    • /
    • 1996
  • This is a study for importance of creativity in design. In the modern industrial developments in Korea has brought increase of consumptional products, by this reason. we are interested in the advertising industry for purpose of booming currents. But Comparing with the development of general advertising industry, it is not so long that understanding of advertising design has become important problm and spacially importance of creativity. Therefore According as the usefulness of advertisement is growing, we are concerned of the study of advertising effects. Now creatived expression is required without a moment delay because of the point of discrimination about too many advertisements. So, Advertising design has a role of positive communication which is passed into the life of modern man deeply. So for the dffective and impactive communication in the short time and on the limit space against implicative message, the study for importance of creativity in advertising expression has common purpose contact floody advertising everyday. Therefore this thesis try to seek Strategies of creativity in order to effective advertising expression.

  • PDF

On the Assessment of Compressibility Effects of Two-Equation Turbulence Models for Supersonic Transition Flow with Flow Separation

  • Sung, Hong-Gye;Kim, Seong-Jin;Yeom, Hyo-Won;Heo, Jun-Young
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.14 no.4
    • /
    • pp.387-397
    • /
    • 2013
  • An assessment of two-equation turbulence models, the low Reynolds k-${\varepsilon}$ and k-${\omega}$ SST models, with the compressibility corrections proposed by Sarkar and Wilcox, has been performed. The compressibility models are evaluated by investigating transonic or supersonic flows, including the arc-bump, transonic diffuser, supersonic jet impingement, and unsteady supersonic diffuser. A unified implicit finite volume scheme, consisting of mass, momentum, and energy conservation equations, is used, and the results are compared with experimental data. The model accuracy is found to depend strongly on the flow separation behavior. An MPI (Message Passing Interface) parallel computing scheme is implemented.

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

Development of Test Cases of STEP AP216 for the Exchange of Hullform Data (선형정보 교환을 위한 STEP AP216 Test Case 개발)

  • 이순섭;김용대;서정우;김수영
    • Korean Journal of Computational Design and Engineering
    • /
    • v.8 no.3
    • /
    • pp.141-149
    • /
    • 2003
  • The ship STEP is an international standard for the computer-interpretable representation of ship product information and for the exchange of ship product model data. The ship STEP consists of several APs(Application Protocol), such as AP215(ship arrangement), AP216(ship moulded form), AP218(ship structures), AP226(ship mechanical systems), and AP234(operating logs, records, message). The STEP AP216(ISO 10303) are an application protocol for the exchange of ship arrangement and ship moulded forms. The AP216 specifies the geometric shape and the hydrostatic properties of the ship moulded form. This paper introduces the state-of-the-art of ship STEP AP216 and develops the test case for the validation of data structure of AP216.

Traffic based Estimation of Optimal Number of Super-peers in Clustered P2P Environments

  • Kim, Ju-Gyun;Lee, Jun-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1706-1715
    • /
    • 2008
  • In a super-peer based P2P network, the network is clustered and each cluster is managed by a special peer, which is called a super-peer. A Super-peer has information of all the peers in its cluster. This type of clustered P2P model is known to have efficient information search and less traffic load than unclustered P2P model. In this paper, we compute the message traffic cost incurred by peers' query, join and update actions within a cluster as well as between the clusters. With these values, we estimate the optimal number of super-peers that minimizes the traffic cost for the various size of super-peer based P2P networks.

  • PDF