• Title/Summary/Keyword: Roaming Device

Search Result 14, Processing Time 0.027 seconds

IoT Roaming Service for Seamless IoT Service (무중단 IoT 서비스 제공을 위한 IoT 로밍서비스)

  • Ahn, Junguk;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.10
    • /
    • pp.1258-1269
    • /
    • 2020
  • The IoT(Internet of Things) service provides users with valuable services by collecting and analyzing data using Internet-connected IoT devices. Currently, IoT service platforms are accomplished by using edge computing to reduce the delay time required to collect data from IoT devices. However, if a user moves to another network with IoT device, the connection will be lost and IoT service will be suspended. To solve this problem, we proposes a service that automatically roaming IoT service when IoT device makes move. IoT roaming service provides a device automatic tracking management technique designed to continue receiving IoT services even if users move to other networks. To check if the proposed roaming service was effective, we implemented IoT roaming service and measured the data transfer time while move between networks along with devices while using IoT service. As a result, the average data transfer time was 124.62ms, and the average service interrupt time was 812.12ms. with this result, we can assume that the user could feel service interruption time very shortly and it will not affect the service experience. with IoT roaming service, we expect that it will present a method that stably providing IoT services even if user moves networks.

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

A Study on User Authentication for Roaming in Mobile Device (모바일 디바이스의 로밍을 위한 사용자 인증에 관한 연구)

  • Kang, Seo-Il;Park, Choon-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.343-350
    • /
    • 2008
  • In ubiquitous environment, a user has been provided with service and mobility using various devices. The users' network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc${\cdots}$) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.

The Study on developing on the Roaming simulator to estimate of the communication performance of Communication-Based Train Control system (무선통신기반 열차제어시스템의 통신성능평가를 위한 로밍시뮬레이터 개발에 관한 연구)

  • Lee, Kang-Mi;Jo, Hyun-Jeong;Shin, Kyung-Ho;Kim, Jong-Ki;Kim, Baek-Hyun
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.1454-1460
    • /
    • 2006
  • This paper assesses communication performance using a roaming simulator when roaming occurs between onboard and ground wireless communication devices for communication based train control system (CBTC). Generally, CBTC is defined as the system regularly collecting location and speed data from each train, transmitting distance information to a train, and optimizing train speed according to train performance. When a train is moving, roaming is also performed to continuously transmit and receive train control information between the ground controller and the train. To operate CBTC, packet loss rate should be less than 1%, roaming time less than 100ms during roaming. We developed a roaming simulator to check communication performance before installing ground and onboard equipments on actual wireless sections. The roaming simulator to be introduced in this paper is for roaming simulation before conducting CBTC field test, which is the project to develop Urban Rail Signaling System Standards, being conducted in KRRI. The simulation consists of one onboard wireless communication device and three ground wireless communication devices, and the roaming simulator estimate packet loss rate occurring during roaming process of the two devices. Therefore, if you use the roaming simulator before the field test, you can predict various problems to occur in actual environment and reduce time, cost and people necessary to resolve these problems.

  • PDF

An Inter-provider Roaming Authentication and Key Establishment Protocol Providing Anonymity in IEEE 802.16e Networks (IEEE 802.16e 네트워크에서 익명성을 제공하는 사업자간 로밍 인증 및 키 설정 프로토콜)

  • Park, Young-Man;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11C
    • /
    • pp.1023-1029
    • /
    • 2006
  • In this Paper, we present a novel authentication and key exchange(AKE) protocol for inter-NSP(provider) roaming in IEEE 802.16e networks. The proposed protocol allows performing both user and device authentication jointly by using two different authentication credentials and Provides user anonymity and session key establishment. Also, this protocol requires only two round number message exchange between foreign network and home network.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

Performance Evaluation of Advanced Container Security Device(ACSD) system based on IoT(Internet of Things) (IoT 기반 컨테이너 보안 장치 및 시스템 성능 평가)

  • Moon, Young-Sik;Choi, Sung-Pill;Lee, Eun-Kyu;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2183-2190
    • /
    • 2013
  • Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and status information about container are transmitted to a remote server using IoT (Internet of Things) based communication. In this research, we are looking into the development trend of global container security devices; and applying ConTracer to real freight transport from domestic to overseas using Global Roaming Service which is offered for domestic Mobile Communication Companies as well. As a result, we estimate the performance of ConTracer and verify it.

Design and Implementation of Multiband Internal Antenna for LTE Mobile Handset

  • Cho, Young Min;Jung, Pil Hyun;Yang, Woon Geun
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.124-132
    • /
    • 2015
  • In this paper, we proposed a multiband internal antenna for LTE mobile handset that could be used for mobile devices. The proposed antenna has a volume of $50mm(W){\times}21mm(L){\times}5mm(H)$, ground plane size is $60mm(W){\times}100mm(L)$, and covers 9 service frequency bands including LTE(Long Term Evolution) band with VSWR(Vlotage Standing Wave Ratio) less than 3. With rapid change of technologies, people wants to include more function into one device. In addition, each country uses different frequency band for traffic service, it is necessary to design multiband antenna for mobile phone since traveling foreign country needs roaming. And if we can cover several services with one antenna, cost and volume needed for antennas are minimized. A HFSS (High Frequency Structure Simulator) of the Ansoft Corporation based on a finite element method is employed to analyze the proposed antenna in the design process and to compare the simulation and experimental results.

Distributed Secure Mail System For Roaming User (이동 사용자를 위한 분산 보안 메일 시스템)

  • Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.825-834
    • /
    • 2003
  • In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.