• Title/Summary/Keyword: Network Access Control System

Search Result 562, Processing Time 0.029 seconds

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).

Terminal-Assisted Hybrid MAC Protocol for Differentiated QoS Guarantee in TDMA-Based Broadband Access Networks

  • Hong, Seung-Eun;Kang, Chung-Gu;Kwon, O-Hyung
    • ETRI Journal
    • /
    • v.28 no.3
    • /
    • pp.311-319
    • /
    • 2006
  • This paper presents a terminal-assisted frame-based packet reservation multiple access (TAF-PRMA) protocol, which optimizes random access control between heterogeneous traffic aiming at more efficient voice/data integrated services in dynamic reservation TDMA-based broadband access networks. In order to achieve a differentiated quality-of-service (QoS) guarantee for individual service plus maximal system resource utilization, TAF-PRMA independently controls the random access parameters such as the lengths of the access regions dedicated to respective service traffic and the corresponding permission probabilities, on a frame-by-frame basis. In addition, we have adopted a terminal-assisted random access mechanism where the voice terminal readjusts a global permission probability from the central controller in order to handle the 'fair access' issue resulting from distributed queuing problems inherent in the access network. Our extensive simulation results indicate that TAF-PRMA achieves significant improvements in terms of voice capacity, delay, and fairness over most of the existing medium access control (MAC) schemes for integrated services.

  • PDF

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

Design of Access Control System based RBAC for Home Network Services (홈 네트워크 서비스를 위한 RBAC 기반의 접근제어 시스템의 설계)

  • Kim, Do-Woo;Kim, Geon-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.833-836
    • /
    • 2005
  • Compared to corporation and government networks, home devices and services connected in a home networks has security threats because of the use of various wired and wireless network, middleware and protocol in digital home environment, a restricted system resource of home information appliances and the users who do not care about security. So security is critical element to provide secure services in a home network environments. In this paper we design the access control system based on RBAC to offer secure home network services.

  • PDF

A Study on Automatic Switch Control System for Systematic Control and History Management of Underground Utility Tunnel Work (지하공동구의 체계적인 통제 및 이력관리를 위한 자동개폐시스템에 대한 연구)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1443-1448
    • /
    • 2015
  • Most of access control systems for underground utility tunnel work through wired network between central system and the automatic switch control unit. However, there are several issues regarding the absence of network infrastructure and an outdoor reader in a relatively unique environment. To solve these issues we propose an authenticated key based smart phone control system for secure access to the underground utility tunnel and this scheme is anticipated providing us with crucial information about a systemic entrance history and effective management procedures of utility tunnel. In addition, the proposed scheme enables to access to secured control system in smart phone based bluetooth network and it provides information about systemic control and history management for the switch controls through smart phone applications.

A Study on the Implementation of Wireless LAN MAC(medium access control) Layer for a Medical Information Transmission (의료 정보(심전도 데이터) 전송을 위한 무선 LAN MAC 계층 구현에 관한 연구)

  • 류점수;고성일;김영길
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.12
    • /
    • pp.50-59
    • /
    • 1997
  • A wireless LAN medical information transmission system is useful for patients who need mobility in a local area environment. This paper proposes a method using WLAN(wireless local area network) and implements a stand-alone system with MAC(meidum access control) layer protocol referenced IEEE 802.11 draft standard. The system consists of a 8bit-microprocessor which handles media access control protocol and a WL100(GEC Plessey) chip which takes care of phsical layer specific routines and uses a RF module DE6003(GEC Plessey). The major features of the implemented system are the CSMA/CA protocol used a consecutive DATA-ACK trasmission method which yields more effective bandwidth allocation for asyncronous traffic transmission and the modified PCF protocol for time-bounded traffic transmission, which operates in ad-hoc network topology apart from IEEE 802.11 draft standard confirm PCF mode operate in infrastruture topology.

  • PDF

Multi-access Monitoring System for Biological Signal Collection (생체신호수집을 위한 다중접속 모니터링 시스템)

  • Kim, Tae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.145-148
    • /
    • 2020
  • Wearable computing is growing rapidly as research on body area communication network using wireless sensor network technology is actively conducted. In particular, there is an increasing interest in smart clothing measuring unrestrained and insensitive bio signals, and research is being actively conducted. However, research on smart clothing is mainly based on 1: 1 wireless communication. In this paper, we propose a multi-access monitoring system that can measure bio-signals by multiple users wearing smart clothing. The proposed system consists of wireless access device, multiple access control server and monitoring system. It also provides a service that allows multiple users to monitor and measure bio signals at the same time.

Overload Measurement and Control of Access Control Channel Based on Hysteresis at Satellite Communication of DAMA (DAMA방식 위성통신에서 Hysteresis특성에 따른 Access 제어채널의 과부하 측정 및 제어기법)

  • Choi, Hyung-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7B
    • /
    • pp.440-449
    • /
    • 2005
  • This paper proposes the measurement scheme for network overload and the control technique in case of breaking several control channels when we support the call services of DAMA through communication satellite(GEO, Geostationary Earth Orbit). And its performance is analyzed. The proposed schemes measure the overload of access control channel of a network controller to control the call connections, detect the level of network overload, notify the terminals of DAMA network of the state, and excute overload control. As a result, it improves the system performance and the network stability at overload state. Moreover hysteresis is applied to the change of overload state for the restriction of the frequent state shifts. The results show that the proposed algorithm prevents excessive increment of call-setup delay and too much lowering of call success rate, and improves the network stability.

A Medium Access Control Scheme for Reducing Energy Consumption through Avoiding Receipt of Redundant Messages in Wireless Sensor Networks (무선 센서 네트워크에서 중복 메세지 순신 회피를 통한 에너지 소비절감 매체 접근 제어)

  • Han, Jung-An;Lee, Moon-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.13-24
    • /
    • 2005
  • The sensor network is a key component of the ubiquitous computing system which is expected to be widely utilized in logistics control, environment/disaster control, medical/health-care services, digital home and other applications. Nodes in the sensor network are small-sized and exposed to adverse environments. They are demanded to perform their missions with very limited power supply only. Also the sensor network is composed of much more nodes than the wireless ad hoc networks are. In case that some nodes consume up their power capacity, the network topology should change, and rerouting/retransmission is necessitated. Communication protocols studied for conventional wireless networks or ad hoc networks are not suited for the sensor network resultantly. Schemes should be devised to control the efficient usage of node power in the sensor network. This paper proposes a medium access protocol to enhance the efficiency of energy consumption in the sensor network node. Its performance is analyzed by simulation.

  • PDF

The Design and Implementation of Mobile base on Access Control System Using ZigBee Method (지그비 기술을 이용한 무선기반의 출입 통제 시스템 설계 및 구현)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.211-220
    • /
    • 2008
  • The home network technology which used USN is developing quickly. Use yet line to a lot of part as home network technology. Recently be leap into prominence to technology core of home network as wireless technology a ZigBee. ZigBee Perceive with cognition from tag and sensor as use USN, and processing, save, integration, and provide information. Implement the access control system which used technology BigBee with design at these papers. The wireless-based construction that used ZigBee. The influence that can let you implement early a Ubiquitous society is technology there being. Also, show by a large spinoff in an allied industry field, and improve the quality of life, and invention calls value added of leading edge IT service and product. The implementation of mobile base on access control system using zigbee method is expected to be helpful for the convenience in home network use.

  • PDF