• Title/Summary/Keyword: Session Analysis

검색결과 645건 처리시간 0.023초

임베디드 환경에서의 H.235 기반 VoIP 보안 단말 구현 및 안전성 분석에 관한 연구 (An implementation and security analysis on H.235 for VoIP security on embedded environments)

  • 김덕우;홍기훈;이상학;정수환
    • 한국통신학회논문지
    • /
    • 제29권7C호
    • /
    • pp.1007-1014
    • /
    • 2004
  • 본 논문에서는 ITU-T에서 제안한 VoIP 표준인 H.323 시스템의 보안 프로토콜인 H.235에 대하여 연구하고 이를 임베디드 환경의 IP Phone에 구현하여 VoIP 보안 프로토콜의 구현 요구사항 및 구현 결과에 따른 분석을 실시하였다. 특히 annex D에서 제안하고 있는 VoIP 단말에서의 보안 기능을 분석하여 구현하였는데, annex D에서는 HMAC-SHAI-96을 이용하여 인중과 무결성을 제공하고 Diffie-Hellman을 이용해서 음성 데이터 암호화에 사용되는 세션 키를 암호화해서 전달하며 음성 데이터의 암호화를 위한 RC2, DES, 3DES 등을 지원하고 있다. 또한 annex D의 안전성 및 상호 연동 문제점을 분석하여 취약점을 발견하고 보안을 강화하는 개선 방안을 제시하였다.

Loran-C 한국체인(9930)에의 EUROFIX 시스템 구축 (The Construction of EUROFIX system into the Korean Loran-C Chain(9930))

  • 김민정;김경태
    • 한국항해학회지
    • /
    • 제25권4호
    • /
    • pp.335-345
    • /
    • 2001
  • While recognizing that Loran-C is very important as a back-up for satellite systems, the introduction of EUROFIX, that it uses Loran-C system, was proposed and admitted at 9th FERNS(Far East Radio Navigation System) Meeting. But, the FERNS countries should consider whether the cost-effectiveness of the system could be improved by making use of its communication facilities to integrate more closely with satellite systems. And, the members were requested to give this proposal consideration before the l0th session of the Council. or this matter, Korea planned to demonstrate transmitting EUROFIX signals from Pohang Loran-C station (Master of 9930 Chain) during the l0th FERNS Meetings. Therefore, this thesis describes the analysis of EUROFIX datalink and progress of EUROFIX construction work. This thesis is the report with regard to the sequence of this demonstration of EUROFIX in Korea.

  • PDF

A Simple and Efficient One-to-Many Large File Distribution Method Exploiting Asynchronous Joins

  • Lee, Soo-Jeon;Kang, Kyung-Ran;Lee, Dong-Man;Kim, Jae-Hoon
    • ETRI Journal
    • /
    • 제28권6호
    • /
    • pp.709-720
    • /
    • 2006
  • In this paper, we suggest a simple and efficient multiple-forwarder-based file distribution method which can work with a tree-based application layer multicast. Existing multiple-forwarder approaches require high control overhead. The proposed method exploits the assumption that receivers join a session at different times. In tree-based application layer multicast, a set of data packets is delivered from its parent after a receiver has joined but before the next receiver joins without overlapping that of other receivers. The proposed method selects forwarders from among the preceding receivers and the forwarder forwards data packets from the non-overlapping data packet set. Three variations of forwarder selection algorithms are proposed. The impact of the proposed algorithms is evaluated using numerical analysis. A performance evaluation using PlanetLab, a global area overlay testbed, shows that the proposed method enhances throughput while maintaining the data packet duplication ratio and control overhead significantly lower than the existing method, Bullet.

  • PDF

사물 지능 통신 환경에서 미디어 다중 채널을 위한 오류 제어 (An Error Control for Media Multi-channel running on Machine to Machine Environment)

  • 고응남
    • 한국항행학회논문지
    • /
    • 제18권1호
    • /
    • pp.74-77
    • /
    • 2014
  • 본 논문은 사물 지능 통신 환경에서 미디어 다중 채널을 위한 오류 제어에 대해서 제안하였다. 이 시스템은 사물 지능 통신 환경 멀티미디어 컴퓨터 협력 작업을 위한 소프트웨어 복구에 적합하다. 이것은 세션의 진행 과정 중 세션의 미디어 서비스 인스턴스가 비정상적으로 종료되는 경우에 세션의 진행을 중단할 수 있지만 허용하는 한 미디어 서비스 인스턴스를 재 활성화 시켜 사용자에 대한 보호를 하는 경우에 필요하다. 본 논문은 규칙-기반 DEVS 모델링과 시뮬레이션 기법을 사용하면서 사물 지능 통신 기반 컴퓨팅 공동 환경의 오류 복구 시스템의 성능 분석을 설명한다.

Development of an Educational Program to Prevent Cervical Cancer among Immigrants in Korea

  • Choi, So Young
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제14권9호
    • /
    • pp.5345-5349
    • /
    • 2013
  • Background: This study developed and measured the effects of a cervical cancer prevention program for married women immigrants. Materials and Methods: A nonequivalent control group pre-test/post-test design was used with a group of married women immigrants registered at the multi-cultural center in the city of "J." Data on for 30 participants in the intervention group and 27 participants in the control group (N=57) were used for analysis. The intervention group attended a 4-session cervical cancer prevention program. Results: The knowledge of the intervention and control groups about cervical cancer post-intervention was significantly different (F=12.55, p<0.001). The perceived susceptibility score before and after the experiment, for the intervention group, and 29.4 and 28 for the control group, was significantly different (t=2.063, p=0.043). After the program, cancer prevention behavior was significantly different in the intervention group (t=2.646, p=0.010). Conclusions: The results obtained in this study indicate that the cervical cancer preventive program was effective in increasing cervical cancer knowledge, perceived susceptibility, and cancer prevention behavior.

신용카드기반의 안전한 소액 지불 프로토콜 설계 (A Credit Card based Secure Micro-Payment Protocol Design)

  • 김석매;이현주;이충세
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.215-218
    • /
    • 2003
  • 본 논문에서는 AIP프로토콜에서 사용자와 서비스 제공자간에 종단간 보안이 제공되는 무선 인터넷 플랫폼에 독립적인 프로토콜을 제안한다. 또한, ID 기반 공개키 암호 시스템을 적용한 Weil Pairing에 의해 세션키를 생성하여 온라인 인증기관이 인증과정에 참여하는 경우의 프로토콜에 대하여 안전성 및 효율성을 분석한다.

  • PDF

RFID를 이용한 헬스시스템에서의 정보보안 향상을 인증 메카니즘 분석 (Analyses of Enhancement of Authentication Mechanism for Security and Privacy Under Healthcare System With RFID Application)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.154-156
    • /
    • 2012
  • This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks, where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we have proposed a user1 authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Privacy-Aware Adaptable Web Services Using Petri Nets

  • Song, You-Jin;Yim, Jae-Geol
    • Journal of Information Processing Systems
    • /
    • 제5권1호
    • /
    • pp.19-24
    • /
    • 2009
  • Many researchers have developed frameworks that are capable of handling context information and can be adapted and used by any Web service. However, no research involving the systematic analysis of existing frameworks has yet been conducted. This paper examines the Context Framework, an example of existing frameworks, using a Petri net, and analyzes its advantages and disadvantages. Then, a Petri net model - with its disadvantages removed - is introduced, and a new framework is presented on the basis of that model. The proposed PAWS (Privacy Aware Web Services) framework has a expendability for context management and communicates flexible context information for every session. The proposed framework can solve overhead problems of context in SOAP messages. It also protects user privacy according to user preferences.

A Scalable Recovery Tree Construction Scheme Considering Spatial Locality of Packet Loss

  • Baek, Jin-Suk;Paris, Jehan-Francois
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권2호
    • /
    • pp.82-102
    • /
    • 2008
  • Packet losses tend to occur during short error bursts separated by long periods of relatively error-free transmission. There is also a significant spatial correlation in loss among the receiver nodes in a multicast session. To recover packet transmission errors at the transport layer, tree-based protocols construct a logical tree for error recovery before data transmission is started. The current tree construction scheme does not scale well because it overloads the sender node. We propose a scalable recovery tree construction scheme considering these properties. Unlike the existing tree construction schemes, our scheme distributes some tasks normally handled by the sender node to specific nodes acting as repair node distributors. It also allows receiver nodes to adaptively re-select their repair node when they experience unacceptable error recovery delay. Simulation results show that our scheme constructs the logical tree with reduced message and time overhead. Our analysis also indicates that it provides fast error recovery, since it can reduce the number of additional retransmissions from its upstream repair nodes or sender node.

MIPv6 환경에서 VoIP 서비스를 위한 통합 보안 메커니즘 제시와 요구사항 분석 (Scenario Proposal and Requirements analysis of Integrated Secure mechanism for VoIP Services in MIPv6)

  • 서종운;안태선;김지수;강현국
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 가을 학술발표논문집 Vol.30 No.2 (3)
    • /
    • pp.703-705
    • /
    • 2003
  • 현재 인터넷 서비스의 근간을 형성하고 있는 IPv4의 가용 주소 공간의 고갈, 보안성의 결여, 그리고 멀티미디어 서비스를 위한 QoS(Quility of Service)의 필요성과 같은 요구사항을 바탕으로 차세대 인터넷 프로토콜(IPv6)로의 전환이 요구되고 있다. 본 연구 목적은 이러한 네트워크상의 이동 인터넷 환경에다 실시간 서비스를 제공할 수 있도록 SIP(Session Initiation Protocol)를 적용하여 통함 된 환경이 이전 보다 안전한 인터넷 정보서비스를 제공할 수 있도록 보안 메커니즘을 적용 하였다. 네트워크 계층과 응용 계층의 이동성 관리 모델의 통합은 전체적인 시그널링 부하를 줄이고 지속적인 통신을 위한 빠른 핸드오프를 제공한다. 즉, 본 연구는 현재 Mobile IPv6 에서 보안상 취약점으로 나타나는 문제점 및 SIP 보안 고려사항 및 이동성을 해결하기 위해 제안되는 해결방안들을 분석하고 적합한 보안 메커니즘 적용 방안을 제안 하였다.

  • PDF