• Title/Summary/Keyword: Next generation networks

Search Result 463, Processing Time 0.022 seconds

Integrated Network Management with TINA manager and TMN agent (통합 통신망 관리를 위한 TINA manager와 TMN agent의 연동방안 연구)

  • 김호철;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5A
    • /
    • pp.751-762
    • /
    • 2000
  • In the forthcoming next generation highspeed networks, the provisioning of broadband mobile multimedia services is the most important issue while an efficient network management architecture, which can manage the network resources efficiently, is essential. The next generation highspeed networks will be composed of the ATMand SDH-based transport network systems and the H-based interworking systems. The management functions of these network systems are implemented various technologies, such as TMN and SNMP. In order to integrate these network resources efficiently with heterogeneous management functions, the distributed network management architecture such as TINA is most appropriate. In this pape, we propose an interworking architecture for TINA manager and TMN agent. where the TINA-based EML subnetwork management operations mapped into the related management operations of the TMN NE agent. The proposed interworking architecture is simpler than JIDM, and the processing overhead is minimized.

  • PDF

A Hybrid Authentication Scheme for Wireless MSAP Mesh Networks in the Next-Generation TMCS (차세대 전술이동통신체계 무선 MSAP 메쉬망을 위한 혼합형 인증기법)

  • Bae, Byoung-Gu;Yoon, Sun-Joong;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1011-1019
    • /
    • 2012
  • This paper presents a novel hybrid authentication scheme in the next-generation Tactical Mobile Communication Systems(TMCS) with wireless MSAP mesh networks. The existing centralized and distributed authentication methods for security between MSAPs may have their pros and cons. The centralized authentication method induces overhead from frequent MSAP association which leads to long authentication delay. On the other hand, the distributed authentication method requires initial sharing of the authentication information. Therefore, a more efficient authentication scheme is needed to protect the network from malicious MSAPs and also maximize efficiency of the network security. The proposed scheme provides a hybrid method of efficiently managing the authentication keys in the wireless MSAP mesh network to reduce the induced authentication message exchange overhead. Also, as the authentication method between MSAP and TMFT is different, a method of utilizing the ACR for handling the EAP packets is proposed. In overall, the proposed scheme provides efficient mutual authentication between MSAPs especially for tactical environments and is analyzed through performance evaluation to prove its superiority.

Differentiated Lambda Establishment and Wavelength Assignment based on DMS model for QoS guarantees in DWDM Next Generation Internet Backbone Networks (DWDM 차세대 인터넷 백본망에서 DMS 모델 기반의 차등화된 파장할당 및 LSP 설정)

  • Kim, Sung-Un;Lee, Jun-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.760-773
    • /
    • 2003
  • The Internet is evolving from best-effort service toward an integrated or differentiated service framework with quality-of-service (QoS) assurances that are required for new multimedia service applications. Given this increasing demand for high bandwidth Internet with QoS assurances in the coming years, an IP/MPLS-based control plane combined. with a wavelength-routed dense-wavelength division multiplexing (DWDM) optical network is seen as a very promising approach for the realization of future re-configurable transport networks. This paper proposes a differentiated lambda establishment process for QoS guarantees based on the differentiated MPLS service (DMS) model. According to the QoS characteristics of wavelength in optical links and the type of used Optical Cross-Connect (OXC) nodes in DWDM next generation optical Internet backbone network, a differentiated wavelength assignment strategy that considers QoS recovery capability is also suggested.

Study of Modulation Effect in Integrated Interface Under Controlling Switching Light-Emitting Diode Lighting Module

  • Hong, Geun-Bin;Jang, Tae-Su;Kim, Yong-Kab
    • Transactions on Electrical and Electronic Materials
    • /
    • v.12 no.6
    • /
    • pp.253-257
    • /
    • 2011
  • This study was carried out to solve problems such as radio frequency band depletion, confusion risk, and security loss in existing visible wireless communication systems, and to determine the applicability of next-generation networks. A light-emitting diode (LED) light communication system was implemented with a controlling switching light module using the ATmega16 micro-controller. To solve the existing modulation effect and disturbance in visible light communication, an integrated interface was evaluated with a driving light module and analyzes its reception property. A transmitter/receiver using the ATmel's micro-controller, high-intensity white LED-6 modules, and infrared sensor KSM60WLM and visible sensor TSL250RD were designed. An experiment from the initial value of distance to 2.5 m showed 0.46 V of the voltage loss, and if in long distance, external light interference occurred and light intensity was lost by external impact and thus data had to be modified or reset repeatedly. Additionally, when we used 6 modules through the remote controller's lighting dimming, data could be transmitted up to 1.76 m without any errors during the day and up to 2.29 m at night with around 2~3% communication error. If a special optical filter can reduce as much external light as possible in the integrated interface, the LED for lighting communication systems may be applied in next generation networks.

Design of Security Framework for Next Generation IPTV Services (차세대 IPTV 서비스를 위한 보안 프레임워크 설계)

  • Lee, Seung-Min;Nah, Jae-Hoon;Seo, Dong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.33-42
    • /
    • 2010
  • With the emergence of increasingly complex networks and diverse user terminals, demand for the next generation IPTV service is rapidly growing. It enables any content to seamlessly be reused on the diverse terminals as well as be broadcasted in real-time through the complex networks. In this paper, a novel security framework is proposed for the real-time and reusable IPTV services. The proposed framework is advantageous over the conventional content protection techniques in easily producing the scalable content with lightweight, perceptual, transcodable, and adjustable security features. It does not only ensure end-to-end security over the entire service range based on a single security mechanism, but also can control a level of security while dynamically transcoding the original content. This approach basically performs selective encryption during and after the compression using scalable video coding. The suitability of the proposed approach is demonstrated through experiments with a practical service scenario. Therefore, it is expected that security technology alone could practically contribute to creating new business opportunities for IPTV services.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

Comparison of Anomaly Detection Performance Based on GRU Model Applying Various Data Preprocessing Techniques and Data Oversampling (다양한 데이터 전처리 기법과 데이터 오버샘플링을 적용한 GRU 모델 기반 이상 탐지 성능 비교)

  • Yoo, Seung-Tae;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.201-211
    • /
    • 2022
  • According to the recent change in the cybersecurity paradigm, research on anomaly detection methods using machine learning and deep learning techniques, which are AI implementation technologies, is increasing. In this study, a comparative study on data preprocessing techniques that can improve the anomaly detection performance of a GRU (Gated Recurrent Unit) neural network-based intrusion detection model using NGIDS-DS (Next Generation IDS Dataset), an open dataset, was conducted. In addition, in order to solve the class imbalance problem according to the ratio of normal data and attack data, the detection performance according to the oversampling ratio was compared and analyzed using the oversampling technique applied with DCGAN (Deep Convolutional Generative Adversarial Networks). As a result of the experiment, the method preprocessed using the Doc2Vec algorithm for system call feature and process execution path feature showed good performance, and in the case of oversampling performance, when DCGAN was used, improved detection performance was shown.

A Probability Model based on Counting Method to Improve Broadcast Reliability over VANET (차량이동통신용 브로드캐스트의 신뢰성 향상을 위한 확률 모델)

  • Virdaus, Irvanda Kurniadi;Kang, Moonsoo;Shin, Seokjoo;Lee, Chung Ghiu;Choi, Yonghoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.51-70
    • /
    • 2017
  • The reliability of broadcasting over vehicular ad hoc networks (VANETs) is one of the most critical factors for driving safety applications. There exists limitations to improve the reliability of broadcast transmissions in saturated VANETs where previous proposals in literature tackle the problem by heuristically adapting the size of the contention window (CW). This paper considers improving the reliability by proposing a new probability model based on the counting methods of permutations and combinations, which counts all the possible cases of broadcast failures in a single-hop broadcast transmission for a given CW. From the model, we calculate the best CW size given the number of contention nodes, which significantly improves the reliability and satisfying the timely dissemination of emergency broadcasting messages. Through extensive VANET simulations with varying densities, we show that our model maintains near 100 percent success rate for single-hop broadcast as well as multi-hop broadcast (e.g. 40 hops) and achieves minimal broadcast delay.

On the QoS Behavior of Self-Similar Traffic in a Converged ONU-BS Under Custom Queueing

  • Obele, Brownson Obaridoa;Iftikhar, Mohsin;Kang, Min-Ho
    • Journal of Communications and Networks
    • /
    • v.13 no.3
    • /
    • pp.286-297
    • /
    • 2011
  • A novel converged optical network unit (ONU)-base station (BS) architecture has been contemplated for next-generation optical-wireless networks. It has been demonstrated through high quality studies that data traffic carried by both wired and wireless networks exhibit self-similar and long range dependent characteristics; attributes that classical teletraffic theory based on simplistic Poisson models fail to capture. Therefore, in order to apprehend the proposed converged architecture and to reinforce the provisioning of tightly bound quality of service (QoS) parameters to end-users, we substantiate the analysis of the QoS behavior of the ONU-BS under self-similar and long range dependent traffic conditions using custom queuing which is a common queuing discipline. This paper extends our previous work on priority queuing and brings novelty in terms of presenting performance analysis of the converged ONU-BS under realistic traffic load conditions. Further, the presented analysis can be used as a network planning and optimization tool to select the most robust and appropriate queuing discipline for the ONU-BS relevant to the QoS requirements of different applications.

Efficient multicast Transmission Mechanism for Mobile IPv6 Networks Environments (Mobile IPv6 네트워크를 위한 효율적인 멀티캐스트 전송 기법)

  • Lee, In-Sik;Seo, Doo-Ok;Lee, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.42-52
    • /
    • 2006
  • The interest for IPv6, Which is next generation IP, increases, while th difficulty for adopting it into IT indestries also increase too. We also expect that Internet technologies develop 0 basis of All-IP networks, which include various heterogeneous networks. Therefore, it is necessary for network to support mobility and multicast capavility to create application with wide-variety- In this paper, we propose a scheme that be able to provide mobility and multicast efficient in IPv6 networks. The proposed scheme has been implemented and experimented on NS-2 and validated with respect to multicast packet delay time and count of Joining and pruning)