• Title/Summary/Keyword: Multimedia message

Search Result 270, Processing Time 0.032 seconds

A Survey on Hybrid Wireless Mesh Protocol Security

  • Tan, Whye-Kit;Lee, Sang-Gon;Lam, Jun-Huy
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.81-82
    • /
    • 2012
  • Wireless Mesh Network (WMN) functionality had been included into IEEE 802.11s. For WMN, the routing message is one of the most important parts that need to be protected. Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for WMN. In this paper, the attacks and vulnerabilities of HWMP had been identified and the requirements needed to protect HWMP had also been discussed. Existing HWMP security had been compared with the requirements.

  • PDF

A MPLS Group Restoration using an Aggregation Tree (집성 트리를 이용한 MPLS 그룹 복구)

  • Lee, Kil-Hung
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.358-364
    • /
    • 2007
  • This paper suggests MPLS restoration method that use an aggregation tree. For the restoration of the MPLS network, this paper presents a scheme that reconstruct multiple path through aggregation tree that grow from many node to a target node. Contrary to a multicast tree where a message that send at one node is passed to a group of node, an aggregation tree is a tree that data is passed from many node to one destination node. Through an experiment we confirmed that the restoration scheme that uses aggregation tree shows taster speed comparing with the existing other restoration scheme.

  • PDF

A Method for Short Text Classification using SNS Feature Information based on Markov Logic Networks (SNS 특징정보를 활용한 마르코프 논리 네트워크 기반의 단문 텍스트 분류 방법)

  • Lee, Eunji;Kim, Pankoo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1065-1072
    • /
    • 2017
  • As smart devices and social network services (SNSs) become increasingly pervasive, individuals produce large amounts of data in real time. Accordingly, studies on unstructured data analysis are actively being conducted to solve the resultant problem of information overload and to facilitate effective data processing. Many such studies are conducted for filtering inappropriate information. In this paper, a feature-weighting method considering SNS-message features is proposed for the classification of short text messages generated on SNSs, using Markov logic networks for category inference. The performance of the proposed method is verified through a comparison with an existing frequency-based classification methods.

Community-Based Travel Information System Using Augmented Reality (증강현실을 이용한 커뮤니티 기반 여행 정보 시스템)

  • Kwon, Soon-Kak;Jo, Su-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.97-105
    • /
    • 2015
  • When people go to travel, sometimes one writes many articles about the destination. Existing travel information services such as Blog, Internet Cafe, and SNS are difficult to provide realistic information since the provided information may not be a place directly on the road. This paper presents a travel information system including recommended courses, theme courses, and travel map. In addition, the proposed system can provide the functions of writing, reading, and deleting a message note that stores the travel information based on the augmented reality if a defined marker among the community members is recognized in a smartphone App. Therefore, this paper can present an implementation method for new community system using augmented reality and image processing as well as providing the conventional travel information services, and allows the user to take advantage of the realistic and accurate information.

Design and Implementation of RPL-based Distributed MQTT Broker Architecture (RPL 기반 분산 MQTT 브로커 구조 설계 및 구현)

  • An, Hyunseong;Sa, Woojin;Kim, Seungku
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.9
    • /
    • pp.1090-1098
    • /
    • 2018
  • MQTT is a lightweight messaging protocol that can be used for low power IoT devices. The MQTT basically uses single MQTT broker to indirectly share message information between publishers and subscribers. This approach has a weakness in regard to traffic overflow, connection fault, security, etc. In this paper, we propose a distributed MQTT broker architecture that solves the problems in single MQTT broker structure. The distributed MQTT broker architecture is expected to support new application services that cannot be supported by a conventional MQTT architecture. We have designed and implemented a distributed MQTT broker architecture based on the RPL protocol that has been widely used for IoT network. The experiment results show that the proposed MQTT broker architecture represents better publishing/subscribing latency and network stability than the conventional MQTT broker architecture.

A Study on Improving the Security Vulnerabilities of Modbus-Based SCADA Control Systems (Modbus 기반 SCADA 제어 시스템의 보안 취약성 향상에 관한 연구)

  • Cagalaban, Giovanni A.;Kim, Seok-Soo;Ha, Kyung-Jae
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.421-424
    • /
    • 2009
  • SCADA control systems and protocols are developed based on reliability, availability, and speed but with no or little attention paid to security. Specifically in Modbus protocol, there are inherent security vulnerabilities in their design. The lack of common security mechanisms in the protocol such as authentication, confidentiality and integrity must be addressed. In this paper, security vulnerabilities of Modbus-based SCADA controls systems will be studied. An in-depth analysis of the message frame formats being sent between master and slave will be discussed to expose the security vulnerabilities. This will enable SCADA users to find ways to fix the security flaws of the protocol and design mitigation strategies to reduce the impact of the possible attacks. Security mechanisms are recommended to further enhance the security of SCADA control systems.

  • PDF

A Study on Attacker trace techniques applying 2-MAC authentication packet in Distribution Network (분산 네트워크 환경에서 2-MAC 인증 패킷을 이용한 공격자 추적기법)

  • 서대희;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.326-329
    • /
    • 2003
  • 최근 인터넷을 대상으로 한 사이버 공격의 공격 경향은 분산 환경에서 다수 공격자의 대규모 분산 서비스 거부 공격(DoS)의 출현 및 해외 해커들의 국내 전산망을 우회 루트로 활용한 사례의 증가 등 고도화된 불법 행위가 점차 범죄의 강력한 수단으로 이용되는 추세에 있다. 본 논문은 기존 네트워크에서 해당 네트워크의 침입자의 트래픽 차단 방법의 취약점을 보완하여 2-MAC 인증 패킷을 이용한 효율적인 공격자 추적기법을 제안하였다. 제안된 방식은 기존 시스템에서의 NIC(Network Interface Card)의 물리적 주소인 MAC(Media Access Control)과 메시지 인증코드(MAC: Message Authentication Code)를 이용한 방식을 제안하였다.

  • PDF

Traffic based Estimation of Optimal Number of Super-peers in Clustered P2P Environments

  • Kim, Ju-Gyun;Lee, Jun-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.12
    • /
    • pp.1706-1715
    • /
    • 2008
  • In a super-peer based P2P network, the network is clustered and each cluster is managed by a special peer, which is called a super-peer. A Super-peer has information of all the peers in its cluster. This type of clustered P2P model is known to have efficient information search and less traffic load than unclustered P2P model. In this paper, we compute the message traffic cost incurred by peers' query, join and update actions within a cluster as well as between the clusters. With these values, we estimate the optimal number of super-peers that minimizes the traffic cost for the various size of super-peer based P2P networks.

  • PDF

Efficient OTP(One Time Password) Generation using AES-based MAC

  • Park, Soon-Dong;Na, Joong-Chae;Kim, Young-Hwan;Kim, Dong-Kyue
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.6
    • /
    • pp.845-851
    • /
    • 2008
  • The ID/password method is the most classical method among authentication techniques on the internet, and is performed more easily and successfully than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To overcome this problem, OTP technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. As recent researches show the weakness of the hash function, we need a new algorithm to replace HOTP. In this paper we propose a new OTP algorithm using the MAC(Message Authentication Code) based on AES. We also show that the new OTP outperforms HOTP experimentally.

  • PDF

Pair-nodes Selection Algorithm for PBS (Pairwise Broadcast Synchronization) (PBS(Pairwise Broadcast Synchronization)를 위한 노드 쌍 선택 알고리즘)

  • Bae, Shi-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.11
    • /
    • pp.1288-1296
    • /
    • 2018
  • PBS(Pairwise Broadcast Synchronization) is a well-known synchronization scheme for WSN(Wireless Sensor Networks). As PBS needs the set of node-pairs for network-wide synchronization by over-hearing, GPA(Group-Wise Pair Selection Algorithm) was also proposed after PBS. However, GPA is complex and requires too many message transmissions, leading to much power consumption. Besides, GPA is not appropriate to topology change or mobile wireless sensor networks. So, we propose a new and energy-efficient pair-node selection algorithm for PBS. The proposed scheme's performance has been evaluated and compared with GPA by simulation. The results are shown to be better than GPA.