• Title/Summary/Keyword: Public Multimedia Network

Search Result 79, Processing Time 0.024 seconds

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

Intelligent Digital Public Address System using Agent Based on Network

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.1
    • /
    • pp.87-92
    • /
    • 2013
  • In this paper, we developed a digital and integrated PA(Public Address) system with speech recognition and sensor connection based on IP with an ID using agent. It has facilities such as an external input, a microphone and a radio for a PA system and has speech recognition. If "fire" is spoken to the PA system then it can recognize the emergency situation and will broadcast information to the appropriate agency immediately. In addition to that, many sensors, such as temperature, humidity, and infrared, etc., can be connected to the PA system and can be integrated with the context awareness which contains many types of information about internal statuses using inference agent. Also, developed the digital integrated PA system will make it possible to broadcast the message to adaptable places using network IP based on IDs. Finally, the digital PA system is designed for operation from a PC, which makes installation and setting of operating parameters very simple and user-friendly. For implementation details, we implemented thread based concurrent processing for the events which occur concurrently from many sensors or users.

Performance test method analysis of wired network (유선 네트워크 성능시험 방법 분석)

  • Lee, Jae-Jeong;Ryu, Han-yang;Nam, Ki-dong;Rhee, Woo-Seop
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.801-808
    • /
    • 2018
  • The performance test methodology for switch, router or integrated networks that make up the wired network is not clearly defined. Due to smart phones and multimedia traffic, the speed of the network is rapidly increasing to 100Gbps. However, there is no formalized test method, and performance test related parts are still being tested based on old data. Telecommunication companies and companies are testing their requirements in their own BMT, and government or public institutions are requesting performance tests from external organizations. As the demand for the performance test of next generation network equipments and the integrated network increases, analysis of the performance test method should be done as soon as possible. Therefore, in this paper, we analyze the performance test method performed by the institute and propose guidelines that can be applied to all wired network equipment.

The EDUNET in Public Libraries: Educational Information Services (공공도서관에서의 에듀넷을 이용한 교육정보봉사)

  • 김달곤
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.8 no.1
    • /
    • pp.97-116
    • /
    • 1997
  • In the so-called “information society,”the information service function of public libraries is gaining an increasing importance. In order to meet the growing demand for educational information, the Korean government established the Center for Educational Multimedia Research and Development and opened in 1996 the EDUNET as a comprchensive educational information network. In this context, public libraries as social education institutions are expected to provide educational information services by utilizing the EDUNET information resources. The availability of EDUNET will even increase when the librarians assist users with systematic information search services, and digitalize printed materials in the library. For this purpose, it is necessary for them to accommodate new information technologies and, thereby, to raise the level of information services up to that of their users’needs by enhancing the librarians’expertise in helping users search information effectively. In this end, we suggest a financial decision be made to build an oversea educational information exchange system.

  • PDF

SDRM: The Design and Analysis of Secure DRM Systems Based on PKI using Steganography (SDRM: PKI기반의 스테가노그래피를 이용한 Secure DRM 시스템 설계 및 분석)

  • 도경화;전문석
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.167-181
    • /
    • 2003
  • The contents for multimedia are very activated along to revolution of Internet. So this fact allows the contents for multimedia to be commercialized. These contents , however, included much vulnerability that it is difficult to be commercialized because attackers easily reproduce that. Many developers want to use watermarking method as the technique to protect the contents for multimedia, but it is very vulnerable to use only one method. This paper proposes the Secure DRM system which protects the contents for multimedia using Public Key Infrastructure and steganography methods. The SDRM system is more powerful than general DRM systems in that it has the special feature of watermarking and steganography techniques. We can prevent the attackers from reproducing and stealing the contents illegally, and authenticating users through SDRM systems.

  • PDF

Scrambling Technology in MPEG Video Environment (MPEG비디오 부호화기 내의 scrambling 기술)

  • Kwon, Goo-Rak;Youn, Joo-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1279-1284
    • /
    • 2009
  • With the advance of multimedia technology, multimedia sharing among multiple devices has become the main issue. This allows users to expect the peer-to-peer distribution of unprotected and protected contents over public network. Inevitably, this situation has caused an incredible piracy activity and Web sites have begun to provide copyrighted A/V data for free. In order to, protect the contents from illegal attacks and distribution, digital right management (DRM) is required. In this paper, we present the minimal cost scrambling scheme for securing the copyrighted multimedia using the data encryption standard (DES) encryption technique. Experimental results indicate that the proposed scrambling techniques achieve a very good compromise between several desirable properties such as speed, security, and file size.

Looking Back over a Decade "Final Decision Call after the Accidents of the Fukushima Nuclear Power Plant"

  • Nakajima, Isao;Kurokawa, Kiyoshi
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.147-156
    • /
    • 2020
  • The author Nakajima was involved in the field of disaster communications and emergency medical care as guest research scientist at the Fukushima Nuclear Accident Independent Investigation Commission established by the National Diet of Japan and reviewer of the Commission's report, and Kurokawa was the chairman of this Commission. Looking back over a decade, we are on the liability issue of bureaucrats and telecom operators, so it's becoming clear what was hidden at the time. The battery of NTT DoCoMo's mobile phone repeaters had a capacity of only about 24 hours, and communication failures increased after one day. The Government also failed to issue an announcement of "Vent from reactor" under the Telecommunications Act Article No. 129. This mistake lost the opportunity to use the third-party telecommunications (e.g. taxi radios). Furthermore, as a result of LASCOM (telecommunications satellite network for local governments via GEO) and a variety of unexpected communication failures, the evacuation order "Escape!" could not be notified to the general public well. As a result, the general public was exposed to unnecessary radiation exposure. Such bureaucratic slow action in emergencies is common in the response to the 2020 coronavirus.

ID-Based Group Key Management Protocols for Dynamic Peer Groups (피어 그룹을 위한 ID 기반의 그룹키 관리 프로토콜)

  • Park, Young-Ho;Lee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.922-933
    • /
    • 2004
  • In recent years, peer-to-peer network have a greate deal of attention for distributed computing or collaborative application, and work of ID-based public key systems have been focusing on the area of cryptography. In this paper, we propose ID-based group key management protocols for secure communication in autonomous peer group. Each member obtains his public/private key pair derived from his identification string from Private Key Generator. No central server participates in group key management protocol instead, all group members share the burden of group key management by the collaboration of themselves, so that our scheme avoids the single point of failure problem. In addition, our scheme considers the nature of dynamic peer group such as frequent joining and leaving of a member.

  • PDF

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF