• Title/Summary/Keyword: User Connection

Search Result 578, Processing Time 0.034 seconds

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

Performance Improvement of DS-CDMA System by Multi-User Interference Cancellation Techniques (다중접속간섭 제거기법에 의한 DS-CDMA 시스템의 성능 개선)

  • 최충열;홍주석;김봉철;오창헌;조성준
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.4
    • /
    • pp.506-519
    • /
    • 1999
  • An adaptive array antennal and a CCI canceller have been considered as techniques for cancelling Multi-User Interference(MUI) in Direct Sequence Code Division Multiple Access(DS-CDMA) system. These techniques have different problems respectively in the process of cancelling MUI as the number of users increases. For that reason, the scheme which can cancel MUI effectively by compensating for the problems of each of the techniques has been required. For the scheme, the technique to connect an adaptive array antenna and a CoChannel Interference(CCI) canceller in cascade form has been studied. In the existing study about the cascade connection method, the effect of cancelling MUI about two interference signals is analyzed, but the analysis for the quantitative BER(Bit Error Rate) improvement according to the number of users is not considered. Therefore, in this paper, we have analyzed the degree of BER performance improvement quantitatively according to the number of users by introducing the receiving system, which connects an adaptive array antenna and a CCI canceller to a DS-CDMA system in cascade form. For the method of analyzing the performance, we have performed the theoretical analysis and the simulation, considering the case of adopting only an adaptive array antenna and of cascade connection respectively, and having compared and analyzed the results. From the results, it is confirmed that in the case of adopting only an adaptive array antenna, the problems occur in the process of cancelling MUI according to the number of users and the receiving direction of interference signals, and can be compensated by the cascade connection method. In conclusion, we have known that MUI is cancelled effectively by using the cascade connection method, and the much better BER performance improvement is obtained.

  • PDF

A Study on Congestion Control for LAN Interworking in ATM Network (ATM 망에서 LAN 연동을 위한 폭주 제어에 관한 연구)

  • Park, Chun-Kwan
    • Journal of IKEEE
    • /
    • v.2 no.1 s.2
    • /
    • pp.122-133
    • /
    • 1998
  • The CL network fer CBDS(Connectionless Broadband Data Service) defined by ITU-(International Telecommunication Union-Telecommunication) consists of CL(ConnectionLess) servers which route frames and links which connect between CL user and CL server or between CL servers[1][2]. In this configuration, two kinds of congestion, CL link congestion and CL server congestion may occur. Therefore this paper has proposed the scheme that can deal with the above congestion state of LAN traffic efficiently in interworking LANs in ATM network. Proposed schemes ale link-by-link scheme and hybrid scheme. Link-by-link scheme uses the ABR feedback loops of AIM layer between CL user and CL server or between CL servers, and the header translation table carrying out the routing function of frame. And hybrid scheme is the scheme that adds end-to-end loop to link-by-link scheme and then uses RM message using CLNAP-PDU(ConnectionLess Network Access Protocol - Protocol Data Units) of CL layer. These schemes can be implemented easily because of using the ABR loop of ATM layer, end-to-end loop of CL layer, and the routing function of CL server. In this paper the characteristic and effects of two schemes in CL server bas been compared and analyzed.

  • PDF

A Study on the Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술에 대한 고찰)

  • Lee, Hyeon-Jae;Oh, Chang-Heon
    • Journal of Digital Convergence
    • /
    • v.4 no.1
    • /
    • pp.31-41
    • /
    • 2006
  • This article introduces developing trends of an 'Ubiquitous Interface' as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. 'Ubiquitous Interface' is a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These 'Ubiquitous Interface' able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended current technologies are RFID, NFC, Multi-mode mobile terminal, UMA mobile terminal and Wearable computer as a future ubiquitous interface. These technologies are have to have flexibility and multiple physical communication channels for seamless service hand over and serve easy connection at huge USN to user. Also, they have to must have flexible software structure. Finally, through the 'Ubiquitous Interface', we will be experience of seamless communication and realize a real liberty of communication.

  • PDF

Study on Multi-Dimensional Simulation of the Flow and Filtration Characteristics in Diesel Particulate Filters (DPF의 배기가스 유동 및 포집에 관한 다차원 모델링 연구)

  • Kim, Dong-Kyun;Yoon, Cheon-Seog
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.18 no.3
    • /
    • pp.60-68
    • /
    • 2010
  • In order to understand the flow and filtration characteristics in a wall-flow type DPF(Diesel Particulate Filter), 0-D, 1-D, and 3-D simulations are preformed. In this paper, three model are explained and validated with each other. Based on the comparisons with 1-D and 3-D results for the steady state solution, 3-D CFD analysis is preferable to 1-D for the prediction of wall velocity at the inlet and exit plane. Because PM loading process is transient state phenomena, the combination of full 3-D and time dependent simulation is crucial for the configuration of wall channels. New coupling technique, which is the connection between calculated permeability from 0-D lumped parameter model and UDF(User Defined Functions) of main solver, is proposed for the realisti

A Handoff-Minimizing Call Connection Strategy in an Overlaid Macro-Micro CDMA Cellular System (중첩셀 구조 CDMA 셀룰라시스템에서의 핸드오프 최소화를 위한 최적 마이크로/매크로셀 선택전략)

  • 강성민;김재훈;차동완
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.182-185
    • /
    • 1998
  • In the two-tier CDMA cellular system with microcells and overlaying macrocells, slow-moving mobile user are assigned to microcells and those who move fast are assigned to overlaying macrocells in order to minimize the total number of handoffs. With this consideration the problem is how to find the thresholds by which the system distinguishes fast-moving user from those who move slowly based on the estimated speed of users. In this paper, two methods for the mobile speed estimation are proposed and two operations schemes for micro-macro cellular CDMA system are suggested. Based on these, Optimization models to find the optimal thresholds for micro-macrocell selection, which are subject to the constrains of QoS, are developed in view of minimizing the weighted total number of handoffs. And then algorithms to find optimal solutions of the models are devised.

  • PDF

Multiplexing scheme for forward signaling channels in wireless cellular networks (이동통신망의 전향 신호 채널을 위한 다중화 방식)

  • 최천원
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.3
    • /
    • pp.65-75
    • /
    • 1998
  • We consider connection-oriented wireless cellular networks such as the second generation wireless cellular networks and wirelss ATM networks. In these networks, a separate forward signaling channel is provided for the transmission of paging and channel allocation packets. When a call destined to a user is requested, all the base stations in the user's current location area broadcast the corresponding paging packet across forward signaling channels. By slot mode operation and paging group allocation for fusers in a location area, we can reduce relative power consumption level at battery-operated terminals. However, a sthe number of paging groups is increased for lowering relative power consumption level, a paging packet experiences higher delay to access the forward signaling channel. For the pre-negotiated quality-of-service level, paging packet delay level must be limited. In this paper, we consider static and dynamic multiplexing schemes for paging packets, and develop an analytical method for calculating paging packet delay and relative power consumption levels. Using this analytial method, we investigate the effect of network parameters on the paging packet delay and relative power consumption levels.

  • PDF

A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services

  • Ortega, Juan A.;Fuentes, Daniel;Alvarez, Juan A.;Gonzalez-Abril, Luis;Velasco, Francisco
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1457-1471
    • /
    • 2011
  • A method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malware.

A Study of Structural Analysis for Space Frame on the World Wide Web (인터넷을 통한 스페이스 프레임 구조 해석에 관한 연구)

  • Suk, Chang-Mok;Nam, Sang-Kwan;Park, Sang-Hoon;Jung, Hwan-Mok;Kwon, Young-Hwan
    • Journal of Korean Association for Spatial Structures
    • /
    • v.1 no.1 s.1
    • /
    • pp.135-142
    • /
    • 2001
  • This paper proposes structural analysis on the World Wide Web to form a part of the architectural design project. It purposes modeling space frames and a structural analysis program on the internet only by inputting basic data for forming a shape in the whole phase of space frame analysis. The analysis data is conducted by Oracle DBMS(DataBase Management System), GUI(Graphic User Internet) by Java Applet and connection with server and database by Java Servlet respectively. The result from modeling and analysis is provided as graphic and text file forms by web browsers. Programs can be executed irrespective of user's OS by using internet and highly-secured system is constructed taking advantage of Java. Of great efficiency is maintaining and recycling data as the whole is dealt by database from the beginning to the end of program.

  • PDF