• Title/Summary/Keyword: Packet ID

Search Result 61, Processing Time 0.025 seconds

LTRE: Lightweight Traffic Redundancy Elimination in Software-Defined Wireless Mesh Networks (소프트웨어 정의 무선 메쉬 네트워크에서의 경량화된 중복 제거 기법)

  • Park, Gwangwoo;Kim, Wontae;Kim, Joonwoo;Pack, Sangheon
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.976-985
    • /
    • 2017
  • Wireless mesh network (WMN) is a promising technology for building a cost-effective and easily-deployed wireless networking infrastructure. To efficiently utilize limited radio resources in WMNs, packet transmissions (particularly, redundant packet transmissions) should be carefully managed. We therefore propose a lightweight traffic redundancy elimination (LTRE) scheme to reduce redundant packet transmissions in software-defined wireless mesh networks (SD-WMNs). In LTRE, the controller determines the optimal path of each packet to maximize the amount of traffic reduction. In addition, LTRE employs three novel techniques: 1) machine learning (ML)-based information request, 2) ID-based source routing, and 3) popularity-aware cache update. Simulation results show that LTRE can significantly reduce the traffic overhead by 18.34% to 48.89%.

Implementation of multiple access bidirectional serial communications protocol using DC power line (직류 전원선을 이용한 다중 접속 양방향 직렬통신 프로토콜 구현)

  • Han, Kyong-Ho;Kim, Won-Il;Hwang, Ha-Yoon
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.332-338
    • /
    • 2008
  • This paper handles, implementation of multiple access bidirectional serial communications protocol using two common DC power lines, whict are power supply and ground, connecting multiple devices. Communication between the host and the multiple clients are performed using unique packet data with device ID unique to each devices connected on the common power lines. Host initiates data communications by transmitting command packet to the designated client with the client's ID and the client responds by transmitting response packet to the host and in this way, multiple clients and host exchange the packet through the common power lines. The normal voltage of the power communication line maintains 24V corresponding to level 1 and the host drops the voltage to 12V on sending level 0 signal, also the clients normally keeps the line voltage to 24V use pull-down circuit to drop the voltage to 12V on sending level 1 signal. Power supply originates from the host, the host senses the voltage level of the power communication lines and when the clients activates pull down circuit to send level 0 signal and the voltage drops to 12V, the hosts switches power source from 24V to 12V. Also, when clients deactivate pull down circuit to send level 1 signal, the host senses the voltage increase and switches the power source from 12V to 24V. Experimental circuit is designed with one hosts and four clients and verified the power line voltage switching operation depending on the data signal levels on the power line. The proposed research result can be applied to two wire power communications system with one host and multiple low current consumption clients.

  • PDF

Multi-Factor Authentication System based on Software Secure Card-on-Matching For Secure Login (안전한 로그인을 위한 소프트 보안카드 기반 다중 인증 시스템)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.3
    • /
    • pp.28-38
    • /
    • 2009
  • Login process uses both ID and password information to authenticate someone and to permit its access privilege on system. However, an attacker can get those ID and password information by using existing packet sniffing or key logger programs. It cause privacy problem as those information can be used as a hacking and network attack on web server and web e-mail system. Therefore, a more secure and advanced authentication mechanism should be required to enhance the authentication process on existing system. In this paper, we propose a multi-factor authentication process by using software form of secure card system combined with existing ID/Password based login system. Proposed mechanism uses a random number generated from the his/her own handset with biometric information. Therefore, we can provide a one-time password function on web login system to authenticate the user using multi-factor form. Proposed scheme provide enhanced authentication function and security because it is a 'multi-factor authentication mechanism' combined with handset and biometric information on web login system.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

A new MAC protocol to improve a performance in IEEE 802.11 wireless LANs (IEEE 802.11 무선 랜의 성능 향상을 위한 새로운 MAC프로토콜)

  • Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.759-764
    • /
    • 2009
  • A new backoff scheme for infrastructure mode in IEEE 802.11 wireless LANs is proposed to improve a performance. Each station generates a unique backoff number using total number of stations, fairness parameter included in beacon frame and an user's ID that is assigned by AP. The station sends a packet after its own backoff number of idle slots, which makes a collision free access among stations within AP's coverage. The proposed method shows better performance in the view of channel utilization and packet delay than an original IEEE 802.11 CSMA/CA backoff scheme.

A Study on Hacking Attack when Free WiFi Internet Access In Smart Phone (Smart Phone에서 무료 WiFi 인터넷 접속 때 해킹 공격)

  • Chang, Young-Hyun;Pyo, Seong-Bae;Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.95-99
    • /
    • 2011
  • 최근 무료 WiFi Zone이 확대되고 있고, Smart Phone으로 무료 WiFi에 접속하여 인터넷으로 접속하여 메신저를 하거나, 메일확인, 정보검색 등을 한다. 하지만 무료 WiFi Zone에서 Smart Phone으로 인터넷을 할 때, 개인정보를 해킹 당 할 수가 있다. 본 논문에서 안드로이드 O,S, Smart Phone에서 무료 WiFi를 이용하여 접속한다. 먼저 메신저와 웹사이트 로그인을 한다. 이때 AirPcap을 이용하여 패킷을 캡처한다. Packet 분석 툴인 WireShark를 사용하여 Packet의 내용을 분석하고, ID, PW와 메신저 대화 내용을 해킹한다. 해킹한 개인정보 ID, 비밀번호를 이용하여 인터넷 사이트에 접속을 하여 관리자 권한을 획득한다. 그리고 Smart Phone에서 WiFi접속 시 공격에 대한 보안대책을 제시한다. 본 연구는 Smart Phone에서 무료 WiFi 접속 때, 보안성 강화연구와 무선 해킹과 방어 기술 발전에 초석이 될 것이다.

  • PDF

Packet Discrimination Method Using Artificial Frequency Offsets for Low Decoding Power Consumption in Heterogeneous Cooperative Communication Systems (이기종 협력 통신시스템에서 디코딩 전력소모 감소를 위한 인위적인 주파수 오프셋을 이용한 패킷 구별 기법)

  • Chae, Seungyeob;Yeo, Gyuhak;Rim, Minjoong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.372-379
    • /
    • 2014
  • When a hand-held device with limited battery transmits and receives data using short-range wireless communication systems, such as WLAN(Wireless Local Area Network) or high speed WPAN(Wireless Personal Area Network), instead of mobile communication systems, the device is able to reduce the power consumption due to the reduced transmission distance. However, if there are many WLAN or high speed WPAN systems around the device, non-negligible power may be consumed by receiving and decoding the packets which have nothing to do with the device. In this paper, we propose a scheme reducing the power consumption by including physical-layer ID in WLAN or WPAN packets and avoiding unnecessary packet receptions. Also, we describe a method to determine the optimum number of physical-layer IDs.

PSS Movement Prediction Algorithm for Seamless hando (휴대인터넷에서 seamless handover를 위한 단말 이동 예측 알고리즘)

  • Lee, Ho-Jeong;Yun, Chan-Young;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.53-60
    • /
    • 2006
  • Handover of WiBro is based on 802.16e hard handover scheme. When PSS is handover, it is handover that confirm neighbor's cell condition and RAS ID in neighbor advertisement message. Serving RAS transmits HO-notification message to neighbor RAS. Transmiting HO-notification message to neighbor RAS, it occurs many signaling traffics. Also, When WiBro is handover, It occurs many packet loss. Therefore, user suffer service degradation. LPM handover is supporting seamless handover because it buffers data packets during handover. So It is proposed scheme that predicts is LPM handover and reserves target RAS with pre-authentication. These schemes occur many signaling traffics. In this paper, we propose PSS Movement Prediction to solve signaling traffic. Target RAS is decided by old data in history cache. When serving RAS receives HO-notification-RSP message to target RAS, target RAS inform to crossover node. And crossover node bicast data packet. If handover is over, target RAS forward data packet. Therefore, It reduces signaling traffics but increase handover success rate. When history cache success, It decrease about 48% total traffic. But When history cache fails, It increase about 6% total traffic

Policy of packet dropping for enhancing IDS performance (IDS의 성능 향상을 위한 패킷 폐기 방안)

  • Moon, Jong-Wook;Kim, Jong-Su;Jung, Gi-Hyun;Yim, Kang-Bin;Joo, Min-Kyu;ChoI, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.473-480
    • /
    • 2002
  • Although many researches on IDS (Intrusion Detection System) have been performed, the most of them are limited to the algorithm of detection software. However, even an IDS with superior algorithm can not detect intrusion, if it loses packets which nay have a clue of intrusions. In this paper, we suggest an efficient wav to improve the performance of IDS by reducing packet losses occurred due to hardware limitation and abundant processing overhead introduced by massive detection software itself. The reduction in packet losses is achieved by dropping hacking-free packets. The result shows that this decrease of packet losses leads an IDS to improve the detection rate of real attack.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.