• Title/Summary/Keyword: User's Requirement

Search Result 278, Processing Time 0.025 seconds

Implementation of a Secure VoIP System based on SIP (SIP 기반의 VoIP 보안 시스템 구현)

  • Choi, Jae-Deok;Jung, Tae-Woon;Jung, Sou-Hwan;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9B
    • /
    • pp.799-807
    • /
    • 2004
  • In this paper, a security mechanism for a VoIP system based on SIP was implemented. This was satisfied sec security requirement of RFC 3261. The SIP standard proposes a HTTP digest authentication for user authentication mechanism, TLS for hop-by-hop security and S/MIME for end-to-end security. SRTP draft was implemented for media security. We also analyzed security of proposed SIP standard.

The Design Concept of the First Mobile Satellite Laser Ranging System (ARGO-M) in Korea

  • Jo, Jung-Hyun;Park, In-Kwan;Lim, Hyung-Chul;Seo, Yoon-Kyoung;Yim, Hong-Seo;Lee, Jin-Young;Bang, Seung-Cheol;Nah, Ja-Kyoung;Kim, Kwang-Dong;Jang, Jeong-Gyun;Jang, Bi-Ho;Park, Jang-Hyun;Park, Jong-Uk
    • Journal of Astronomy and Space Sciences
    • /
    • v.28 no.1
    • /
    • pp.93-102
    • /
    • 2011
  • Korea Astronomy and Space Science Institute (KASI) launched the development project of two satellite laser ranging (SLR) systems in early 2008 after the government fund approval of the SLR systems in 2007. One mobile SLR system and one permanent SLR station will be developed with the completion of the project. The main objectives of these systems will be focused on the Space Geodetic researches. A system requirement review was held in the second half of the same year. Through the following system design review meeting and other design reviews, many unsolved technical and engineering issues would be discussed and resolved. However, the design of the mobile SLR system is a corner stone of whole project. The noticeable characteristics of Korea's first SLR system are 1) use of light weight main mirror, 2) design of compact optical assembly, 3) use of KHz laser pulse, 4) use of commercial laser generator, 5) remote operation capability, 6) automatic tracking, 7) state of art operation system, etc. In this paper, the major user requirement and pre-defined specification are presented and discussed.

SGOSST Mechanism for Quality of Service In Network (네트워크 QoS를 위한 SGOSST 메커니즘)

  • Kim, In-Bum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.107-114
    • /
    • 2011
  • Because of boost of communications devices furnishing diverse services and rapid expansion of mobile business, good use and management of the existing network system become very important. Also, offering service corresponding with user communication requirement grades which vary widely in each person, is vital for communication service provider. In this paper, SGOSST, a mechanism of efficient network construction with minimum cost for network QoS is proposed. In experiments, though spending 252.97% more execution times, our SGOSST QoS network consumed 5.11% less connecting costs than the network constructed by weighted minimum spanning tree method. Therefore our mechanism can work well for efficient operation and service providing in the network formed with users and communication devices of various service requirement grade as smart/mobile equipment.

Mutual Anonymous Authentication Using Smart Cards in Multi-server Environments (다중서버 환경에서의 스마트카드를 이용한 상호 익명 인증)

  • Yoo, Hye-Joung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.1021-1028
    • /
    • 2008
  • In a network environment, when a user requests a server's service, a remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. In these authentication schemes, due to fast progress of networks and information technology, most of provided services are in multi-server environments. However, there are no studies in multi-server authentication schemes using smart cards providing mutual anonymity so far. In this paper, we propose a novel user authentication scheme using smart cards providing mutual authentication and mutual anonymity for multi-server environments. Our proposed scheme achieves the low-computation requirement for smart cards and a user can use permitted various services in eligible servers by only one registration. Also, this scheme guarantees perfect mutual anonymity of participants.

An Energy-Efficient MAC Protocol for Werable Device WBAN Environment through Asymmetric Method and QoS (Wearable 장치를 사용하는 WBAN 환경에서 장치 간 비대칭적 에너지 효율과 QoS를 위한 MAC 제안)

  • Lee, Jae-Ho;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6A
    • /
    • pp.395-404
    • /
    • 2012
  • In general, WBAN environment which use wearable devices on the human body show the different characteristics from other personal area networks. It is usually composed of sensors contacting the body and user terminal collecting the data from the sensors. The sensors are under the significant constraint of the energy resources, but the user terminal is different because it can be recharged and relatively have large energy resources. Under this characteristics, we design a new MAC protocol considering this requirements. The proposed MAC protocol can increase the energy efficiency of sensors and loads the unavoidable energy consumption to the user terminal for high energy efficiency of sensors. Additionally, the proposed MAC protocol provides the low delivery delay of the emergency information for the differentiated QoS because the emergency data requires more rapid transmission than the periodic sensed data. For this requirement, we employ the IFS (Inter Frame Space). For the efficient and objective evaluation of the proposed MAC protocol, IEEE 802.15.6 MAC is used to compare with it and we show that the advantage of the proposed MAC meet our expectation.

Downlink Wireless Adaptive Modulation and Coding Scheme (AMC)-based Priority Queuing Scheduling Algorithm for Multimedia Services

  • Park, Seung-Young;Kim, Dong-Hoi
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1622-1631
    • /
    • 2007
  • To realize the wireless packet scheduler which efficiently considers both the effect of adaptive modulation and coding (AMC) scheme due to variable wireless communication channel information from physical layer and the QoS differentiation of multimedia services from internet protocol (IP) layer, this paper proposes a new downlink AMC-based priority queuing (APQ) scheduler which combines AMC scheme and service priority method in multimedia services at the same time. The result of numerical analysis shows that the proposed APQ algorithm plays a role in increasing the number of services satisfying the mean waiting time requirements per each service in multimedia services because the APQ scheme allows the mean waiting time of each service to be reduced much more than existing packet scheduler having only user selection processor.

  • PDF

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

A study on the development of protocol modal and verificator (프로토콜 검증 모델 및 검증기 개발)

  • 민재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.312-321
    • /
    • 1999
  • Advanced system and softwares are required for informal ion communications ions protocol in Information sharing. electronlc commerce and intranet applications with the increase of Internet usage. Therefore. the development methodology of telecommunications protocol to meet user's requirement and increase reliability becomes more important. This study aims to develop the verification model and tool for ATM protpcol using SDL formal description technique and will becomes basic technique for the implementation of integrated protocol development tool.

  • PDF

The User's Requirement Analysis of SMS(SecureDocument Management System) using Use Case (쓰임새(Use Case)를 이용한 보안업무 관리 시스템의 사용자 요구사항 분석)

  • Kim, See-Jeong;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.409-412
    • /
    • 2001
  • 보안업무는 모든 군 업무를 최상위 수준에서 관할하는 업무이다. 하지만 지금까지 전산화를 이루지 못한 문제점을 갖고 있었다. 본 논문은 군 보안업무 전산화를 위해 개발 중인 보안업무 관리 시스템의 사용자 요구사항 분석과정을 다룬 것이다. 보안업무 관리 시스템의 요구사항 분석을 위해 객체 모델링의 쓰임새를 이용한 분석방법론을 적용하여, 사용자 요구사항 정의에서 시나리오 작성까지의 과정을 통해 적절히 요구사항을 분석함으로써, SMS의 시스템 모델을 제시하고 요구사항 분석에서 쓰임새 중심의 유효성을 증명하였다.

  • PDF