• Title/Summary/Keyword: Middle Server

Search Result 71, Processing Time 0.027 seconds

A NTRU-based Authentication and Key Distribution Protocol for SIP (SIP에서 NTRU 기반 인증 및 키 분배 프로토콜)

  • Jeong, SeongHa;Park, KiSung;Lee, KyungKeun;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1768-1775
    • /
    • 2017
  • The SIP(Session Initiation Protocol) is an application layer call signaling protocol which can create, modify and terminate the session of user, and provides various services in combination with numerous existing protocols. However, most of cryptosystems for SIP cannot prevent quantum computing attack because they have used ECC(Elliptic Curve Cryptosystem). In this paper, we propose a NTRU based authentication and key distribution protocol for SIP in order to protect quantum computing attacks. The proposed protocol can prevent various attacks such as quantum computing attack, server spoofing attack, man-in-the middle attack and impersonation attack anonymity, and our protocol can provide user's anonymity.

C-C Connector : The Middle Ware for distributing the Cost of Server In Spatial Database (C-C Connector : 공간 데이터 베이스에서 서버 처리 비용의 분산을 위한 미들웨어)

  • 강동재;정보홍;박동선;배해영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.74-76
    • /
    • 2000
  • 공간 데이터와 같은 대용량의 데이터를 처리하는 시스템이나 다수의 클라이언트의 요구가 발생하는 시스템에서는 데이터에 대한 처리 비용 및 전용 비용으로 인한 서버 사이드의 병목 현상 및 질의 처리 속도의 저하라는 문제점을 갖는다. 본 논문에서는 이러한 문제점을 개선하기 위한 방법으로 미들웨어인 C-C Connector의 Method 및 프로토콜을 제안한다. 제안하는 C-C(Client To Client) Connector는 질의의 분석과 CIT(Client Information)의 검색을 통하여 인접한 클라이언트들의 캐쉬 데이터를 이용한 질의 처리의 가능 여부를 판단하며 인접 클라이언트와 요구 클라이언트 사이의 Connection을 형성함으로서 클라이언트-클라이언트의 질의 처리 및 데이터 전송 기능을 지원한다. 그리고 이러한 기능의 지원을 위한 서버, C-C Connector, 클라이언트 사이에서 수행되어지는 질의 처리의 프로토콜을 정의한다. 제안된 C-C Connector의 Method 및 프로토콜은 서버 사이드의 처리 비용을 현재 서버에 접속중인 클라이언트들에게 분배함으로서 서버 사이드의 병목현상과 질의 처리 시간의 지연이라는 문제점을 개선할 수 있으며 클라이언트 사이드에서의 반응 속도의 향상과 현재 연결된 시스템의 처리 성능을 최대한 활용할 수 있다는 장점을 갖는다.

  • PDF

One-time Pattern Mutual Authentication Method by using Digital Holography (디지털 홀로그래피를 이용한 one-time pattern 상호 인증 방법)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.20 no.3
    • /
    • pp.291-294
    • /
    • 2016
  • A new optical one-time pattern password(OTPT) mutual authentication method is proposed, which presents a two-factor authentication by 2-step phase-shifting digital holography and performs a two-way authentication by a challenge-response handshake of the optical OTPT in both directions. Because a client and a server use OTPT once as a random number and encrypt it for mutual authentication, it protects against a replay or a man-in-the middle attack and results in higher security level.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

Network structure for Shared Virtual Environments (가상 공유 공간을 위한 네트워크 구조)

  • Choi, Hwal-Ian;Lee, Arthur
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.89-100
    • /
    • 1998
  • A multi-user virtual reality system supports shared environments for concurrent accesses by multiple users. The performance of these systems depends heavily on the network environments. This paper experiments an effective network model for shared virtual environments. This model has a middle layer called groups placed between the server and its clients, and the tasks of server are distributed to these groups. Using groups solves some of the problems of existing systems such as lack of scalability, message overheads, and latency due to message passing among locally communicating entities in the virtual environment. Some experiments show lower overhead than existing distributed virtual environment systems in WAN as well as LAN environments. This model also supports a method that can be used to construct application specific network environments using message handler which allows user-defined message formats.

  • PDF

Design and implementation of TELNET protocol supporting security functionalities (보안 기능을 지원하는 TELNET 프로토콜의 설계 및 구현)

  • Seong, Jeong-Ki;Seo, Hye-In;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.769-776
    • /
    • 2016
  • TELNET is vulnerable to network attack because it was designed without considering security. SSL/TLS and SSH are used to solve this problem. However it needs additional secure protocol and has no backward compatibility with existing TELNET in this way. In this paper, we have suggested STELNET(Secured Telnet) which supports security functionalities internally so that has a backward compatibility. STELNET supports a backward compatibility with existing TELNET through option negotiation. On STELNET, A client authenticates server by a certificate or digital signature generated by using ECDSA. After server is authenticated, two hosts generate a session key by ECDH algorithm. And then by using the key, they encrypt data with AES and generate HMAC by using SHA-256. After then they transmit encrypted data and generated HMAC. In conclusion, STELNET which has a backward compatibility with existing TELNET defends MITM(Man-In-The-Middle) attack and supports security functionalities ensuring confidentiality and integrity of transmitted data.

A Study on the Industrial Data Processing for Control System Middle Ware and Algorithm RFID is Expected (RFID을 이용한 산업용 제어 관리시스템에 적합한 미들웨어 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.451-459
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.

Location-based Mashup service for elementary, middle and high school information (위치 기반 초·중·고 학교 정보 매쉬업 서비스)

  • Kim, Hae-Jin;Kim, Hae-Ran;Han, Soon-Hee;Cho, Hyug-Hyun;Ceong, Hee-Taek
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.651-656
    • /
    • 2010
  • In the homepage of 16 municipal provincial office of education, school information service displays text-based results through search step or presents the simple information of the selected area when an area is clicked on the static image map. And it has several problems such as server load and slow transfer speed by the search of the synchronous transfer. Thus, in this study, we used the open API of Google map to provide location-based school information and implemented the mash up service for school information with the Ajax program of asynchronous transfer to reduce server load and to increase transmission speed. This service gives the efficiency and convenience to students, teachers, parents and education family members of various levels because it includes the location with school information on a dynamic map.

Design and Implementation of Distributed Metadata Searching System using XML Web Service and JDBC (XML 웹서비스와 JDBC를 이용한 분산 메타데이터 검색 시스템의 설계 및 구현)

  • Choe, Hyunjong;Hwang, Sungwuk;Kim, Taeyoung
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.2
    • /
    • pp.25-34
    • /
    • 2004
  • Sixteen provincial Research Institute of Education and Science(RISE) in the country have provided good qualified multimedia educational materials that was produced by some special skilled teachers to elementary, middle and high school teachers using web services. And moreover KERIS and KICE have also produced educational materials and have a plan to integrate distributed multimedia educational materials that RISE produced. The development of KERIS's KEM metadata in 2001 and the making of educational material metadata of RISE is the first step of integration plan. These metadata can be used to make integration plan possible. But before taking integration plan, the study of how to integrate and manage it should be performed. Therefore, this paper introduces the technique of XML web service and JDBC with 3-tier system as the method of integrate distributed educational material metadata. The evaluation shows these two methods have similar response time with MS SQL Server 2000 and Oracle 9i. Thus, we conclude that JDBC and XML web service can be the proper solution to search XML-formatted metadata.

  • PDF

Implementation of EPICS based control system for KSTAR Current Lead System (KSTAR 전류전송제어시스템의 원격운전을 위한 EPICS 기반 제어계 구축)

  • Kim, Myung-Kyu;Baek, S.H.;Kim, K.H.;Park, M.K.
    • Journal of the Korean Vacuum Society
    • /
    • v.17 no.1
    • /
    • pp.58-66
    • /
    • 2008
  • The KSTAR Current Lead System(CLS) with network based real-time distributed control system is implemented using an EPICS as a middle-ware software. The current lead system transfers current from magnet power supplies to superconducting magnet system and simultaneously supply the coolant to maintain superconducting state. To control the CLS at main control room an EPICS IOC server is installed in local control area. Using this server, it is able to be controlled and monitored the system in main control room through operator interface(OPI) which uses "caget" to read status and "caput" to write command with a unique name called PV. The EPICS IOC is developed using "ether-ip" driver to communicate with PLC. Also we achieved satisfactory results in operation and stability aspects from a long period commissioning test.