• Title/Summary/Keyword: Roaming

Search Result 192, Processing Time 0.023 seconds

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF

The Technical Implementation Scheme and Probeems That Need to be Solved for Realizing the Natinal 2G-3G Roaming (국내 2G-3G간 로밍 구현방안과 해결과제)

  • 정수성
    • Journal of the Korean Professional Engineers Association
    • /
    • v.34 no.5
    • /
    • pp.69-72
    • /
    • 2001
  • The national 2G-3G roaming is emerging as one of essential and important issues In Korea in connection with the recent granting of 3G licenses. Accustomed to the current seamless coverage and superb quality of 2G networks, many subscribers have very high expectations of an equal or better service provisioning by 3G networks. However, it is very unlikely for 3G operators to successfully build their networks as comprehensive as the current 2G networks in the beginning of network implementation and commercial launch. Therefore,3G operators are seriously considering the national 2G-3G roaming in Korea. In this paper. 1 would like to discuss and present a technical implementation scheme and problems that need to be solved fer successfully realizing the national 2G-3G roaming.

  • PDF

(A Key Roaming Protocol with a New Password Hardening Scheme) (새로운 패스워드 강화 기법을 이용한 키 로밍 프로토콜)

  • 정현철;김승호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.387-396
    • /
    • 2003
  • In this paper, we present more efficient Protocol than that of Ford and Kaliski. We use RSA in the roaming protocol and it Plays decisive role to reduce the total time cost. We show that our protocol is safe from various attacks. We present the performance of our protocol and verify that This protocol needs fewer secure channel like SSL than other protocols.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Investigation of Dirofilaria immitis infection in dogs of Incheon area

  • Kim, Kyoung-Ho;Lee, Yun-Mi;Oh, Seung-Tae;Jeong, Cheol;Han, Tea-Ho;Lee, Sung-Mo
    • Korean Journal of Veterinary Service
    • /
    • v.32 no.4
    • /
    • pp.385-389
    • /
    • 2009
  • This study was attempted to survey on the prevalence of canine heartworm infection (Dirofilaria immitis) in the Incheon area in 2006. This study showed comparative infection rates of canine heartworm in conjunction with different geographic locations and rearing environments (i.e., indoor, outdoor or free roaming). In total, 24 dogs (6.0%) were D. immitis positive among a total of 400 tested dogs. The geographic distribution of detection rates was Nam-gu (2 dogs, 6.7%), Yeonsu-gu (1 dog, 3.0%), Namdonggu (5 dogs, 8.0%), Pupyoung-gu (4 dogs, 6.7%), Kanghwa-gun (8 dogs, 13.0%), and Onjin-gun (4 dogs, 11.1%). In addition, 4 dogs (2.0%) or 20 dogs (10.0%) were positive for D. immitis among 202 indoor dogs or 198 outdoor dogs including free roaming dogs, respectively, while 13 dogs (11.7%) were positive for D. immitis among 111 outdoor dogs excluding free roaming dogs. In the case of 87 free roaming dogs, 7 dogs (8.1%) among them were positive for D. immitis.

Secure Execution Assurance Mechanism of Mobile Agent from Truncation Attack in Free-Roaming Environments (Free-Roaming 실행 환경에서 절단공격으로부터 이동에이전트의 안전한 실행 보장 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.97-108
    • /
    • 2010
  • The data security of free-roaming mobile agent is a problem which hasn't been resolved to the mobility and inter-host mapping. totally, especially in theaspect of keeping away truncation attacks. Therefore, when the agent is utilized for user oriented applied technique, the secure execution guarantee of agent is essential. In this paper, it guarantees safe execution from security threats generated by malicious host during the agent's execution. And the secure execution guarantee mechanism of agent is proposed from favorable host is maliciously abused by attacker. Thus, the execution trace protocol mechanism proposed as secure mobile agents execution guarantee. As security analysis of the safety analysis.

Investigation of canine dirofilariasis and brucellosis in free roaming dogs from public animal shelters in Gwangju area (광주지역 동물보호소내 유기견의 개심장사상충과 개 브루셀라병 감염 실태조사)

  • Koh, Ba-Ra-Da;Na, Ho-Myung;Jang, Mi-Sun;Kim, Ji-Yeon;Park, Seong-Do
    • Korean Journal of Veterinary Service
    • /
    • v.30 no.1
    • /
    • pp.155-164
    • /
    • 2007
  • This study was conducted to investigate the prevalence of canine heartworm infections, canine brucellosis and hematologic values from 153 free roaming dogs in the area of Gwangju city from March to November 2006. Nineteen (12.4%) of 153 samples tested with modified Knott's technique showed positive reaction for microfilariae. Polymerase chain reaction using specific primers for D immitis amplified the expected product from all samples of 19 microfilaremic canine blood samples as determined by the modified Knott's test for microfilariae. The seasonal infection rates of microfilariae were higher in the spring season (10/19, 52.6%) than in the other seasons. The major hematological findings in microfilaremic dogs were mild leukocytosis and mild monocytosis. A total of 100 dogs randomly selected from 153 free roaming dogs were negative for canine brucellosis by serological test using immunochromatographic antibody test kit.

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment (무선 네트워크 로밍 환경에서 이기종 네트워크간 연동을 위한 AAA 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.481-492
    • /
    • 2008
  • With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.

IEEE 802.11a Technical Analysis and Research for Development of Unmanned Vehicle System (무인자동차 시스템 개발을 위한 IEEE 802.11a 기술분석 및 연구)

  • Kim, Young-Hyuk;Choi, Sang-Wook;Kim, Jung-Sook;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2317-2322
    • /
    • 2009
  • In this paper, look into the applicable communication for unmanned vehicle system development, and make an alternative idea to IEEE 802.11a. "IEEE 802.11a" is differently from "IEEE 802.11b/g"-which used to 2.4GHz ISM band-as it use OFDM modulation system of 5GHz band, as contrasted with "IEEE 802.11b/g" of ISM band, it has advantage against falling-off the capability caused by interfered, and provide maximum 54Mbps communication speed. Made a priority tested Soft Roaming and Hard Roaming to ensure the sound boom of unmanned vehicle in the flat parking. According to the each effect value, Present a most suitable method of applicable to "IEEE 802.11a" to unmanned vehicle system.