• Title/Summary/Keyword: Mutual Channel

Search Result 123, Processing Time 0.03 seconds

Improving the Performance of Mutual Authentication and Session Key Agreement Protocols for Mobile Communication (이동 통신 환경에서의 상호인증 및 세션키 공유 프로토콜의 성능 향상)

  • Lee, Seung-Won;Hong, Seong-Min;Yun, Hyeon-Su;Jo, Yu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1391-1400
    • /
    • 1999
  • 이동 통신은 대기를 전달매체로 하고 이동단말기를 사용하기 때문에 가로채기나 불법사용과 같은 공격에 취약하다. 이를 극복하기 위해, 이동 통신 환경에서 이동단말기와 기지국 사이에 안전한 통신을 제공하기 위한 많은 프로토콜들이 제안되어왔다. 그러나 이동단말기의 부족한 계산능력과 전력량 때문에 공개키를 이용한 프로토콜들은 많은 장점에도 불구하고 충분히 활용되지 못했다. 본 논문에서는 이동 통신 환경에서 기지국과 이동단말기 사이의 상호인증 및 세션키 공유 프로토콜들의 성능을 향상시킬 수 있는 기법을 제안한다. 본 논문에서 제안하는 기법은 이동단말기의 비밀 정보를 기지국에게 드러나게 하지 않으면서 많은 계산을 기지국으로 하여금 대신 수행하도록 하는 것이다. 제안된 기법은 기존의 프로토콜들을 최대 5배까지 성능을 향상시키며 해당하는 만큼 이동단말기의 전력량 소모를 감소시킬 수있다.Abstract Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than fixed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, these public-key based protocols have not been fully utilized due to the poor computing power and small battery capacity of mobile stations. In this paper, we propose techniques for accelerating public-key based key establishment protocols between a mobile station and a base station. The proposed techniques enable a mobile station to borrow computing power from a base station without revealing its secret information. The proposed schemes accelerate the previous protocols up to five times and reduce the amount of power consumption of mobile stations.

A Study on big data utilization for implementation of the resident participation type safe community planning of the smart city (스마트시티의 주민참여형 안전도시 계획을 위한 빅데이터 활용에 관한 고찰)

  • Chang, Hye-Jung;Kim, Do-Nyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.478-495
    • /
    • 2016
  • The existing city planning was performed by internal few decision-maker, but the information that an individual could contact with through the evolution of the ICT technology increased in the smart city, and a channel diversified and came to be able to participate in a decision making process by various methods. I show that it is in the collaborative planning process to come to a mutual understanding with residents directly or indirectly if utilize big data in a process of the safe community planning of the smart city. Therefore, I compare the utilization contents between data of Matsubara-shi,Japan and data of certification city of Korea which received the certification of the WHO international safe community. In the area where this study prepares for the approval of the international safe community, it wants you to use it though you utilize the data as the supporting role of the residents participation plan.

Analysis of a Wireless Transmitter Model Considering Retransmission for Real Time Traffic (재전송을 고려한 무선 전송 단에서 실시간 데이터 전송 모델의 분석)

  • Kim, Tae-Yong;Kim, Young-Yong
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.215-217
    • /
    • 2005
  • There are two types of packet loss probabilities used in both the network layer and the physical layer within the wireless transmitter such as a queueing discard probability and transmission loss probability. We analyze these loss performances in order to guarantee Quality of Service (QoS) which is the basic of the future network. The queuing loss probability is caused by a maximum allowable delay time and the transmission loss probability is caused by a wireless channel error. These two types of packet loss probabilities are not easily analyzed due to recursive feedback which, originates as a result at a queueing delay and a number of retransmission attempts. We consider a wireless transmitter to a M/D/1 queueing model. We configurate the model to have a finite-size FIFO buffer in order to analyze the real-time traffic streams. Then we present the approaches used for evaluating the loss probabilities of this M/D/1/K queueing model. To analyze the two types of probabilities which have mutual feedbacks with each other, we drive the solutions recursively. The validity and accuracy of the analysis are confirmed by the computer simulation. From the following solutions, we suggest a minimum of 'a Maximum Allowable Delay Time' for real-time traffic in order to initially guarantee the QoS. Finally, we analyze the required service rate for each type utilizing real-time traffic and we apply our valuable analysis to a N-user's wireless network in order to get the fundamental information (types of supportable real-type traffics, types of supportable QoS, supportable maximum number of users) for network design.

  • PDF

A Proposal of Interoperability between Social Media and Blockchain-based Smart Contract System for Artwork Trading (예술품 거래를 위한 소셜 미디어와 블록체인 기반 스마트 계약 시스템의 연동 제안)

  • Lee, Eun Mi
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.2
    • /
    • pp.109-116
    • /
    • 2020
  • Social media is growing rapidly as a means of promoting artists' artworks and a channel for sales. However, since social media is not fundamentally a platform designed for trading, it has various limitations that make it difficult to ensure trust and security in carrying out transactions. In this paper, it is proposed interoperability between social media and blockchain-based smart contract system that can record and preserve the artist's profile, information related to artworks and details of the contract on the blockchain. The proposed interoperability allows artwork trading participants on social media to maintain mutual trust and to conduct the contract transparently. Also, the proposed interoperability consists of an API provided by the social media developer or an open source API without having to modify existing social media. This study is expected to contribute to the growth of the art trading market on social media by complementing the art trading practices on social media.

Cell Radius & Guard Band Requirements by Mutual Interference Investigation between Satellite Digital Systems using Gap-filler (Gap-filler를 이용하는 위성 DMB 시스템 간의 상호간섭분석에 의한 보호대역 및 적정 셀 반경 설정)

  • Cha Insuk;Park SungHo;Chang KyungHi;You Heung-Ryeol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6A
    • /
    • pp.499-509
    • /
    • 2005
  • The capacity of Satellite DMB(Digital Multimedia Broadcasting) system is limited mainly by the interference. So, to achieve the expected performance of Satellite DMB system and to minimize the interference from other Satellite DMB system, ACI(Adjacent Channel Interference) should be considered carefully. Satellite DMB system uses the Gap-filler for effective transmission in terrestrial environment, and the Gap-filler can use direct amplification or frequency conversion to satisfy the specific requirements. Therefore, amplified signal causes several effects on interference between System A(Eureka 147 DAB) and System E(ISDB : Integrated services Digital Broadcasting). In this paper, by using the outcome of system-level simulation considering the results of link-level simulation, we analyze the interferences between System A and System E under practical situation based on the exact parameters of ITU-R BO. 1130-4. We also propose the appropriate level of guard band and Cell Radius to optimize system capacity by adapting the spectrum mask given in the spec. and utilizing the interference analysis between System A and System E.

A Robust and Secure Remote User Authentication Scheme Preserving User Anonymity (사용자 익명성을 보장하는 안전하고 개선된 원격 사용자 인증스킴)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.81-93
    • /
    • 2013
  • Remote user authentication is a method, in which remote server verifies the legitimacy of a user over an common communication channel. Currently, smart card based remote user authentication schemes have been widely adopted due to their low computational cost and convenient portability for the mutual authentication. 2009 years, Wang et al.'s proposed a dynamic ID-based remote user authentication schemes using smart cards. They presented that their scheme preserves anonymity of user, has the feature of storing password chosen by the server, and protected from several attacks. However, in this paper, I point out that Wang et al.'s scheme has practical vulnerability. I found that their scheme does not provide anonymity of a user during authentication. In addition, the user does not have the right to choose a password. And his scheme is vulnerable to limited replay attacks. In particular, the parameter y to be delivered to the user is ambiguous. To overcome these security faults, I propose an enhanced authentication scheme, which covers all the identified weakness of Wang et al.'s scheme and an efficient user authentication scheme that preserve perfect anonymity to both the outsider and remote server.

A Framework of the Convergent Service Development Process in the Public Sector : The Smart Transportation Card Service of Seoul City and the Call for Collaboration Case in Singapore (공공분야 융합 서비스 개발 Framework에 대한 연구 : 서울시 스마트교통카드 서비스와 싱가포르 CFC 사례를 중심으로)

  • Lee, Jin-Hui;Lee, Suke-Kyu
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.387-410
    • /
    • 2013
  • Due to the development of information technology, Convergence and Creative Economy became hot issues. For example, products become more intelligent and services are likely to be connected and integrated around core services or provided as bundle solution. Meanwhile products and services are integrated in the context of mutual supplementation, which leads to Servitization of Products and Productization of Services in many industries. Previous studies have addressed Convergence with different terms and definitions such as Convergent, Multicategory Multifunctional Product, Clouding Service, Bundle and so on from one perspective such as consumers, suppliers or technology according to a wide range of academic approaches. Thus, this study attempted to suggest the most typical convergence products released in the convergence environment and categorize those products. Furthermore, this study has pointed out the problems in the New Product Development Framework discussed in the studies on marketing by taking the situation of the public sector into account and then suggested "New Service Development Framework in the Public Sector" that are different from traditional e-Gov. approach basically and will enable the government to create public information service and provide them to enterprises or citizens. It also emphasized the importance of Business Conceptualization Stage in the framework; argued that there is a necessity of an integrative study from the perspective of technology on the basis of the approach from the perspective of marketing and Policy such as a study of consumer behaviors, design and marketing channel and Policy Integration for the development and dissipation; and furthermore suggested the cases-the development/Diffusion of Transportation Card Service in Seoul and CFC (Call for Collaboration) in Singapore-in order to verify the framework. There is a need to supplement New Service Development Framework so it is able to reflect the distinct characteristics of the public sector from the academic perspective and be used as practical guidelines for SI (System Integration) business to shift into IT Service business. Last but not the least, this study has suggested the limitations and the directions for the future studies.

A Secure Authentication and Key Agreement Scheme for Smart Grid Environments without Tamper-Resistant Devices (스마트 그리드 환경에서 변조 방지 디바이스를 사용하지 않는 안전한 사용자 인증 및 키 합의 방식)

  • Park, Ki-Sung;Yoon, Dae-Geun;Noh, SungKee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.313-323
    • /
    • 2020
  • With the development of smart grid technologies, a user can use the secure and reliable power services in smart gird environments. However, the users are not secure against various potential attacks because the smart gird services are provided through the public channel. Therefore, a secure and lightweight authentication and key agreement scheme has become a very important security issue in smart grid in order to guarantee user's privacy. In 2019, Zhang et al. proposed a lightweight authentication scheme for smart gird communications. In this paper, we demonstrate that Zhang et al.'s scheme is vulnerable to impersonation and session key disclosure attacks, and then we propose a secure authentication and key agreement scheme for smart grid environments without tamper-resistant devices. Moreover, we perform the informal security and the BAN logic analysis to prove that our scheme is secure various attacks and provides secure mutual authentication, respectively. We also perform the performance analysis compared with related schemes. Therefore, the proposed scheme is efficiently applicable to practical smart gird environments.

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Turbo Perallel Space-Time Processing System with LDPC Code in MIMO Channel for High-Speed Wireless Communications (MIMO 채널에서 고속 무선 통신을 위한 LDPC 부호를 갖는 터보 병렬 시공간 처리 시스템)

  • 조동균;박주남;황금찬
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10C
    • /
    • pp.923-929
    • /
    • 2003
  • Turbo processing have been known as methods close to Shannon limit in the aspect of wireless multi-input multi-output (MIMO) communications similarly to wireless single antenna communication. The iterative processing can maximize the mutual effect of coding and interference cancellation, but LDPC coding has not been used for turbo processing because of the inherent decoding process delay. This paper suggests a LDPC coded MIMO system with turbo parallel space-time (Turbo-PAST) processing for high-speed wireless communications and proposes a average soft-output syndrome (ASS) check scheme at low signal to noise ratio (SNR) for the Turbo-PAST system to decide the reliability of decoded frame. Simulation results show that the suggested system outperforms conventional system and the proposed ASS scheme effectively reduces the amount of turbo processing iterations without performance degradation from the point of average number of iterations.