• Title/Summary/Keyword: Open Protocol

Search Result 479, Processing Time 0.026 seconds

The research of 5.2 protocol performance and structure (V5.2 프로토콜의 성능 및 구조분석)

  • 이성우;이병란;이종영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.226-230
    • /
    • 2003
  • In this thesis I analyzed that V5.2 protocol function is effective to fulfill all of the services that are provided at the existing local exchange. I analyzed this in five methods that refer to ETSI inside patronage. I experimented turnaround time by Start-up method and verified V5.2 protocol function when Start-up. Also I confirmed stability of system by the reconstruction-ability experiment related E1 switch over. I verified V5.2 protocol function through PSTN call process that uses a special service test and local call simulator. As a result of experiment, I confirmed the best method when simultaneous Start-up. V5.2 protocol function was excellent and It becomes switch over at 1/1000 seconds when E1 is out of service. V5.2 protocol function was effective to fulfill all of the special services that are provided at local exchange and its long call process ability was superior to KT standard with 4 fails in 20000 calls. Through the experiment, it was proved that V5.2 interface will become a significant element of communication network when after LE side expanse of v5 interface ID with TDX-100 exchanger and the AN occurrences OOS by message transmission limit and call disconnect when E1 switch over are improved.

  • PDF

ID-based Tripartite Multiple Key Agreement Protocol Combined with Key Derivation Function (키 유도함수를 결합한 ID 기반 3자 복수키 동의 프로토콜)

  • Lee Sang-Gon;Lee Hoon-Jae
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.133-142
    • /
    • 2006
  • The purpose of the multiple key agreement protocol is to get efficiency in computational and communicational aspects compared to multiple executions of single key agreement protocol. However ID based tripartite multiple key agreement protocols have been proposed, it is reported that they can not resist unknown key-share attack or impersonation attack. How to design a secure and efficient ID-based authenticated tripartite multiple key agreement scheme to prevent all kinds of attacks remains an open problem. This paper proposes a multiple key agreement scheme combing the existing single key agreement protocol with a key derivation function. The proposed scheme can not only increase computational efficiency compared to the existing multiple key agreement protocol, but can ensure security of the proposed schemes by using a security proofed single key agreement protocol and key derivation function.

  • PDF

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

Implementation of Virtualization Techniques and its Performance Evaluation for the Independent Operation of OpenFlow-based Future Internet Testbed (오픈플로우 기반 미래인터넷 테스트베드의 독립적 운용을 위한 가상화 기능 구현 및 성능 평가)

  • Min, Seok Hong;Kim, Seung Ju;Kim, Byung Chul;Lee, Jae Yong;Hong, Won Taek;Kong, Jong Uk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.34-45
    • /
    • 2013
  • Recently, world-wide research activities on new network architectures and protocols are being actively progressed. Furthermore, research activities on testbed and related technologies for supporting those activities are being actively performed. In domestic study, research on the OpenFlow protocol based future Internet testbed implementation and research on its virtualization for supporting independent research experiments are being performed at the same time. The network virtualization is a technology which maximizes the testbed utilization without interfering each other for the individual research when many researchers share the testbed. In this paper, we implemented a Enhanced FlowVisor by extending basic FlowVisor by adding QoS functions which are admission control and minimum bandwidth guarantee. On the testbed, we performed a real-time video streaming experiment for verifying the performance of the Enhnaced FlowVisor on the OpenFlow protocol based future internet testbed. The result shows that the Enhanced FlowVisor can provide reliable and stable QoS to the individual researches without disturbing each other traffic on virtualized networks of the future Internet testbed.

OpenFlow Network Performance Evaluation under Heterogeneous Traffic (혼합트래픽 환경에서 Open Flow 네트워크 성능 평가)

  • Yeom, Jae Keun;Lee, Chang-Moo;Choi, Deok Jae;Seok, Seung Jun;Song, Wang Cheol;Huh, Jee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.46-53
    • /
    • 2012
  • The traffic in research network for the new structure of the network and new service research has the various properties. From the perspective of a specific traffic point of view, transmission of traffic with different requirements using a single routing protocol is an obstacle to satisfy requirements. In this study, we classify the properties of the traffic into two types. We propose the way that we can get the overall optimization effect, the experiment proves it by providing independent multiple forwarding path by applying optimized algorithm by types. In order to distinguish each type of traffic we use the ports on the switch and in order to implement independent path we apply OpenFlow system. In other words, we present the measure that can be implemented to improve the satisfaction of the traffic by making multiple paths by OpenFlow controller according to the type of traffic and by enforcing in Forwarder.

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access (OAuth 2.0 프로토콜에서 E-mail을 이용한 사용자 권한 인증)

  • Chae, Cheol-Joo;Choi, Kwang-Nam;Choi, Kiseok;Yae, Yong-Hee;Shin, YounJu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.21-28
    • /
    • 2015
  • Currently there are wide variety of web services and applications available for users. Such services restrict access to only authorized users, and therefore its users often need to go through the inconvenience of getting an authentication from each service every time. To resolve of such inconvenience, a third party application with OAuth(Open Authorization) protocol that can provide restricted access to different web services has appeared. OAuth protocol provides applicable and flexible services to its users, but is exposed to reply attack, phishing attack, impersonation attack. Therefore we propose method that after authentication Access Token can be issued by using the E-mail authentication. In proposed method, regular user authentication success rate is high when value is 5 minutes. However, in the case of the attacker, the probability which can be gotten certificated is not more than the user contrast 0.3% within 5 minutes.

The Effect of Supportive Nursing Intervention on the Anxiety and Nursing Satisfaction of Mothers with Children Undergoing Open-Heart Surgery (지지적 간호중재가 개심술 환아 어머니의 불안 및 간호만족도에 미치는 효과)

  • Kim, Yun Kyung;Jun, Eun Mi
    • Korean Journal of Adult Nursing
    • /
    • v.19 no.3
    • /
    • pp.459-469
    • /
    • 2007
  • Purpose: The purpose of this study was to identify the effect of supportive nursing intervention on the anxiety and nursing satisfaction of mothers with children undergoing open-heart surgery. Methods: The research design involved a non-equivalent control group pretest-posttest non synchronized design. The subjects consisted of 43 mothers of children who were expected to undergo open heart surgery, and were divided into two groups; an experimental group of 22 and a control group of 21. The experiment was administered to the experimental group a total of four times, following supportive nursing intervention protocols. The research tools used were Spielberger's State Anxiety Inventory for anxiety and Park Jung-Eun's nursing satisfaction. The data were analyzed using the $x^2$-test, and t-test with SPSS/WIN 12.0 program. Results: Hypothes 1, 'The experimental group who are given supportive nursing intervention will have a lower anxiety score than the control group' was supported(t=5.658, p=.000). Hypothesis 2, 'The experimental group who are given supportive nursing intervention will have a higher nursing satisfaction score than the control gropu wasl supported(t=-9.549, p=.000). Conclusion: The supportive nursing intervention protocol was effective in reducing anxiety and increasing the nursing satisfaction of mothers with children undergoing open-heart surgery.

  • PDF

Development of a Occupation-Based Bilateral Upper Extremity Training Protocol in a Medical Setting for Stroke Patients (뇌졸중 환자를 대상으로 한 병원 환경에서의 작업 기반 양측성 상지 훈련 프로토콜 개발)

  • Kim, Sun-Ho;Kim, Jung Ran;Park, Hae Yean;Han, A-Reum;Kim, Jong-Bae;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.9 no.1
    • /
    • pp.24-44
    • /
    • 2020
  • Objective : To develop an occupation-based bilateral upper extremity training protocol that can be effectively applied in a medical setting Methods : The research process using the delphi technique was carried out in 3 stages. The first stage was an open questionnaire development stage, The first draft is prepared through literature review and open questions were developed through preliminary research based on the draft. The second stage was the delphi survey. Based on the responses of the experts obtained through the open Delphi survey, the adequacy of the training protocol was shown on a Likert 5 point scale. The items were edited and deleted, reconstructed by analyzing the mean and standard deviation, stability, convergence degree, consensus, and content validity ratio through the questionnaire. The third step was the completion of the protocol. After discussions between researchers, the finalized protocol contents were reorganized to complete the occupation-based bilateral upper extremity training protocol for medical setting. Results : The final protocol consisted of 9 items across 3 areas in the occupation-based intervention selection domain and 81 items across 4 areas in the bilateral upper extremity training domain, intervention period, and evaluation. Conclusions : This study suggests an evidence-based method that collects the opinions of occupational therapists in order to use occupation-based activities as interventions in a situation that currently sees occupational therapy primarily performed in hospitals. It is also meaningful that the bilateral upper extremity training can be applied effectively in clinical situations by concretely presenting.