• Title/Summary/Keyword: Subscribe Access Network

Search Result 10, Processing Time 0.029 seconds

The approach for supporting synchronous Ethernet in 10G EPON

  • Cho, Jeong-Hyun;Ahn, Cheol-Woong;Chang, Yong-Suk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.6
    • /
    • pp.39-49
    • /
    • 2013
  • In recent, many countries and research institutes have been studying how to construct the high-speed subscriber access network. Task Force team of IEEE 802.3ah has accomplished the standardization of EPON which is the next generation subscriber access network. EPON doesn't still have the bandwidth enough to support the new service(e.g various multimedia service) which demands the high bandwidth. For these new multimedia services,10G EPON is the next generation subscriber access network which expanded the up-down bandwidth range of 1G EPON 10 times in order to support demanding high bandwidth. We have proposed the model which can accommodate IEEE 802.1 AVB traffics smoothly in 10G EPON and suggesting the Intra-ONU scheduling model which makes this model operate effectively.

Criteria for Designing and Deploying of Optical Fiber Networks for FTTH (FTTH로의 진화에 대비한 광가입자망의 설계 및 구축 평가기준)

  • Kang Won-Cheol;Kim Young-Myoung;Lee Sang-Hong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.307-309
    • /
    • 2003
  • In the initial deployment stage of optical access networks, optical network systems and optical fiber cables have been provided mainly for commercial buildings or users in KT. According to the demand of residential users who expect to subscribe broadband multimedia services as high bit rate services, the optical access networks get closer to the residential users as FTTCab or FTTH So, it is very important to install optical access networks economically and effectively because that the total cost and usability of optical fiber cables depends on that. Especially, one of characteristics in access networks is the possibility of variation on services demands and technology evolution. Also access networks must be prepared for the final deployment, FTTH. Therefore, the designing and planning of optical access networks are coming to be very important activity for most of telecommunications service providers.

  • PDF

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.

Certificate Revocation in Connected Vehicles

  • Sami S. Albouq
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.13-20
    • /
    • 2023
  • In connected vehicles, drivers are exposed to attacks when they communicate with unauthenticated peers. This occurs when a vehicle relies on outdated information resulting in interactions with vehicles that have expired or revoked certificates claiming to be legitimate nodes. Vehicles must frequently receive or query an updated revoked certificate list to avoid communicating with suspicious vehicles to protect themselves. In this paper, we propose a scheme that works on a highway divided into clusters and managed by roadside units (RSUs) to ensure authenticity and preserve hidden identities of vehicles. The proposed scheme includes four main components each of which plays a major role. In the top hierarchy, we have the authority that is responsible for issuing long-term certificates and managing and controlling all descending intermediate authorities, which cover specific regions (e.g., RSUs) and provide vehicles with short-term pseudonyms certificates to hide their identity and avoid traceability. Every certificate-related operation is recorded in a blockchain storage to ensure integrity and transparency. To regulate communication among nodes, security managers were introduced to enable authorization and access right during communications. Together, these components provide vehicles with an immediately revoked certificate list through RSUs, which are provided with publish/subscribe brokers that enable a controlled messaging infrastructure. We validate our work in a simulated smart highway environment comprising interconnected RSUs to demonstrate our technique's effectiveness.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.

Efficient Offered Contents Using Broadcast Encryption (브로드캐스트 암호화를 이용한 효율적인 컨텐츠 제공)

  • 이덕규;이임영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.65-70
    • /
    • 2004
  • The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriber. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

  • PDF

New Control System Aspects for Supporting Complex Data and High Performance System

  • Yoo, Dae-Seung;Tan, Vu Van;Yi, Myeong-Jae
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.394-411
    • /
    • 2008
  • The data in automation and control systems can be achieved not only from different field devices but also from different OPC (OLE for Process Control) servers. However, current OPC clients can only read and decode the simple data from OPC servers. They will have some problems to acquire structured data and exchange the structured data. In addition to the large network control systems, the OPC clients can read, write, and subscribe to thousands of data points from/to OPC servers. Due to that, the most important factor for building a high performance and scalable industrial control system is the ability to transfer the process data between server and client in the most efficient and fastest way. In order to solve these problems, we propose a means to implement the OPC DA (Data Access) server supporting the OPC complex data, so that the OPC DA clients are able to read and decode any type of data from OPC servers. We also propose a method for caching the process data in large industrial control systems to overcome the limitation of performance of the pure OPC DA system. The performance analysis and discussion indicate that the proposed system has an acceptable performance and is feasible in order for applying to real-time industrial systems today.

Distributed Hashing-based Fast Discovery Scheme for a Publish/Subscribe System with Densely Distributed Participants (참가자가 밀집된 환경에서의 게재/구독을 위한 분산 해쉬 기반의 고속 서비스 탐색 기법)

  • Ahn, Si-Nae;Kang, Kyungran;Cho, Young-Jong;Kim, Nowon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1134-1149
    • /
    • 2013
  • Pub/sub system enables data users to access any necessary data without knowledge of the data producer and synchronization with the data producer. It is widely used as the middleware technology for the data-centric services. DDS (Data Distribution Service) is a standard middleware supported by the OMG (Object Management Group), one of global standardization organizations. It is considered quite useful as a standard middleware for US military services. However, it is well-known that it takes considerably long time in searching the Participants and Endpoints in the system, especially when the system is booting up. In this paper, we propose a discovery scheme to reduce the latency when the participants and Endpoints are densely distributed in a small area. We propose to modify the standard DDS discovery process in three folds. First, we integrate the Endpoint discovery process with the Participant discovery process. Second, we reduce the number of connections per participant during the discovery process by adopting the concept of successors in Distributed Hashing scheme. Third, instead of UDP, the participants are connected through TCP to exploit the reliable delivery feature of TCP. We evaluated the performance of our scheme by comparing with the standard DDS discovery process. The evaluation results show that our scheme achieves quite lower discovery latency in case that the Participants and the Endpoints are densely distributed in a local network.

A Study on Telcos′ Strategies to Digital Converged Service and Its Prospects; Focusing on TV-based VOD Service (통신사업자의 통신방송 융합사업 진출전략 및 전망 - TV-based VOD를 중심으로 -)

  • 조병선;황호영
    • Journal of Korea Technology Innovation Society
    • /
    • v.7 no.2
    • /
    • pp.459-479
    • /
    • 2004
  • As the high-speed internet access market steadily nears its maturity phase, growth is quickly tapering off and competition, intensifying. As a result telecommunications companies are at present faced with the urgent need to evolve away from a growth model based on continuous acquisition of new subscribers. The recent convergence of telecommunication and broadcasting has come about precisely at this transitional period in the telecommunications market, and is perceived by the industry both as a new business opportunity and as a threat. TV-based VOD(Video on Demand), for one, is able to attract new customers desiring multimedia services of superior quality and to lock-in existing customers. Meanwhile, the latest evolution in network development is brightening the market prospect for TV-based VOD. The service has now hit the market, deployed over VDSL networks - a next-generation high-speed internet - and advanced cable modem networks, delivering high-definition DVD-quality videos. TV-based VOD is a service whose deployment is closely linked to the evolution of subscriber networks. According to the forecast produced by the present study, based on the forecast on the post-ADSL market and a survey conducted on VOD, as post-ADSL subscribers increase from 1.53 million in 2003 to 4.44 million in 2004, and 9.87 million in 2006, the percentage of post-ADSL subscribers with intention to also subscribe to a VOD service is expected to rise from 16% to 34% in 2006. Accordingly, VOD subscribers are estimated to increase from 0.24 million in 2003 to 0.98 million in 2004 and to 3.35 million in 2006.

  • PDF