• Title/Summary/Keyword: Security Gateway

Search Result 228, Processing Time 0.027 seconds

A Realtime Traffic Shaping Method for VPN Tunneling on Smart Gateway Supporting IoT (사물인터넷지원 스마트게이트웨이의 VPN 터널링 실시간 속도제어 방법)

  • Yang, Seungeui;Kang, Inshik;Goh, Byungoh;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1121-1126
    • /
    • 2017
  • Recently, the importance of smart gateways that link these with the big data and the development of the Internet of things is getting bigger. The smart gateway includes a network function such as a router and a router, and a sensor network function that links various objects such as a sensor. As the internet market has expanded, network stability and security problems have arisen and VPN technology has been proposed as one of the ways to solve these security problems. Efficient design is needed to implement VPN in low-end smart gateway and SOHO-level Internet environment with poor line quality. In this paper, we propose the concept and principle of VPN tunneling implementation and real - time traffic shaping method according to internet line condition in the Smart Gateway that supports IOT developed based on OpenWRT, the implementation and measured performance indicators are presented.

Construction of Embedded Data Synchronization Gateway (임베디드 자료동기화 게이트웨이 구축)

  • Park, Ju-Geon;Park, Kee-Hyun;Woo, Jong-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.335-342
    • /
    • 2010
  • Nowadays, the major manufacturer of the mobile devices has offered its own solution for the data synchronization. But each manufacturer uses its proprietary data synchronization method so that the compatibility of data can not be guaranteed. To solve such problems, a gateway is needed to convert different forms of data into a unified form of data and vice versa. Some problems have been found in the experiments with the previously implemented gateway. First, a bottleneck state might arise if a number of mobile devices request data synchronization simultaneously. Second, the gateway itself would become a serious vulnerable point to an attack during the process of converting received data. The proposed gateway can solve this bottleneck state and security issue since it converts data and processes synchronization request in a mobile device. In this paper, the proposed gateway is constructed and the results of some experiments with the gateway are presented. According to the results, the proposed gateway operates properly and it is relatively insensitive to the bottleneck state.

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

Security Policy Framework for Home Network (홈 네트워크 보안 정책 프레임워크)

  • Kim, Geon-Woo;Kim, Do-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.839-842
    • /
    • 2005
  • As various mobile technologies, sensor technologies, and remote control technologies are growing and quality of life is enhanced, researches and developments on home network are actively on going. Currently, some network service providers and construction corporations are going to provide home network service, but neither secure nor efficient, So, in this paper, we propose a security framework for providing various secure user authentication mechanisms and efficiently controlling services in home network. Namely, we are going to provide active home network security services with home gateway-based security policy, which locates on the gateway of each home.

  • PDF

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.

A Study on Distributed Gateway for The Bio-signal Management in U-Healthcare (유 헬스케어에서 생체신호관리를 위한 분산형 게이트웨이에 관한 연구)

  • Lee, Seok-Hee;Woo, Sung-Hee;Ryu, Geun-Taek
    • 전자공학회논문지 IE
    • /
    • v.49 no.2
    • /
    • pp.58-64
    • /
    • 2012
  • In this paper, we proposed a distributed gateway for ubiquitous healthcare system. We also designed and implemented protocol conversion and processing algorithms to exchange a seamless information, the bio signals between the databases and the receiving devices from ZigBee to gateway and from the gateway to database and network. The distributed gateway system consists of the bio signal acquisition, ZigBee modules, distributed databases, and gateways. The bio signals detected by the ZigBee module are sent to the gateway. The distributed gateway analyzes the data being transferred, sends those to the receiving devices, and lets the authorized personnel access. The proposed system can be utilized in various fields including activity analysis for the elderly, security systems, home network service, and so on.

A Study of Node Authentication for Home Networking (홈 네트워크 환경에서 보안성을 가진 노드 인식기술)

  • Lee, Jeong-Yoon;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.225-228
    • /
    • 2005
  • In this paper, we put a focus with a node cognition section of home gateway for information equipments to operate in a home network environment organically individually. We used an IPv6 protocols on a home network node connection on IP base. A node used a certificate published in a registered process by a home gateway for security. We designed secure node cognition structure to have had strong identification.

  • PDF

Design and Implementation of Multi Messaging System Using SK-VM Based On J2ME (J2ME기반의 SK-VM을 이용한 다중 메시징 시스템 설계 및 구현)

  • 김응곤;최완규;이성주
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.41-45
    • /
    • 2001
  • In the case of mobile internet service using WAP, It was connected to http protocol using WAP Gateway. So, Users take increased cost of mobile internet service. and it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language. Which is independant of platform and low cost and intensely security and downloadable application. Additional, Using socket connection, Multi Messaging System(MMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation o( multi messaging used SK-VM based on .12ME, It will be foundation to develop various mobile application in the future.

  • PDF

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Analyses of Light-weight Cryptography Technology for Internet of Things (사물인터넷 통신을 위한 경량 암호기술 동향 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.234-235
    • /
    • 2016
  • With the development of the Internet, the popularization of internet has become the new trend and enormously changed the way of human communication. There is a strong need for security. The following research will provide the definition and purpose of IoT and examine its security concerns, In this paper, we surveyed at energy consumption of lightweight block ciphers implemented in reconfigurable devices, and we analyze d the effects that round unrolling might have on the energy consumed during the encryption.

  • PDF