• Title/Summary/Keyword: User access control

Search Result 685, Processing Time 0.032 seconds

Reinforcement Learning based Multi-Channel MAC Protocol for Cognitive Radio Ad-hoc Networks (인지무선 에드혹 네트워크를 위한 강화학습기반의 멀티채널 MAC 프로토콜)

  • Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1026-1031
    • /
    • 2022
  • Cognitive Radio Ad-Hoc Networks (CRAHNs) enable to overcome the shortage of frequency resources due to the increase of radio services. In order to avoid interference with the primary user in CRANH, channel sensing to check the idle channel is required, and when the primary user appears, the time delay due to handover should be minimized through fast idle channel selection. In this paper, throughput was improved by reducing the number of channel sensing and preferentially sensing a channel with a high probability of being idle, using reinforcement learning. In addition, we proposed a multi-channel MAC (Medium Access Control) protocol that can minimize the possibility of collision with the primary user by sensing the channel at the time of data transmission without performing periodic sensing. The performance was compared and analyzed through computer simulation.

An User Authorization Mechanism using an Attribute Certificate in the IPSec-VPN System (IPSec-VPN 시스템에서의 속성 인증서를 이용한 사용자 접근 제어 방안)

  • 강명희;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.11-21
    • /
    • 2004
  • To authorize IPSec-VPN Client in Client-to-Gateway type of the IPSec-VPN system, it can be normally used with ID/Password verification method or the implicit authorization method that regards implicitly IPSec-VPN gateway as authorized one in case that the IPSec-VPN client is authenticated. However, it is necessary for the Client-to-Gateway type of the IPSec-VPN system to have a more effective user authorization mechanism because the ID/Password verification method is not easy to transfer the ID/Password information and the implicit authorization method has the vulnerability of security. This paper proposes an effective user authorization mechanism using an attribute certificate and designs a user authorization engine. In addition, it is implemented in this study. The user authorization mechanism for the IPSec-VPN system proposed in this study is easy to implement the existing IPSec-VPN system. Moreover, it has merit to guarantee the interoperability with other IPSec-VPN systems. Furthermore, the user authorization engine designed and implemented in this paper will provide not only DAC(Discretional Access Control) and RBAC(Role-Based Access Control) using an attribute certificate, but also the function of SSO(Single-Sign-On).

A Predictive Connection Admission Control Using Neural Networks for Multiclass Cognitive Users Radio Networks (멀티 클래스 인지 사용자 네트워크에서 신경망을 이용한 예측 연결수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.435-441
    • /
    • 2013
  • This paper proposes a neural net based-predictive connection admission control (CAC) scheme for multiclass users in wireless cognitive radio networks. We classifies cognitive users(cu) into real and non real time services, and then permit only real time services to reserve the demanded resource for spectrum handoff in guard channel for provisioning the desired QoS. Neural net is employed to predict primary user's arrival on time and demanded channels. Resource scheduling scheme is based on $C_IA$(cognitive user I complete access) shown in this paper. For keeping primary users from interference, the CAC is performed on only cognitive user not primary user. Simulation results show that our schemes can guarantee the desired QoS by cognitive real time services.

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

A Received Signal Strength-based Primary User Localization Scheme for Cognitive Radio Sensor Networks Using Underlay Model-based Spectrum Access

  • Lee, Young-Doo;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2663-2674
    • /
    • 2014
  • For cognitive radio sensor networks (CRSNs) that use underlay-based spectrum access, the location of the primary user (PU) plays an important role in the power control of the secondary users (SUs), because the SUs must keep the minimum interference level required by the PU. Received signal strength (RSS)-based localization schemes provide low-cost implementation and low complexity, thus it is suitable for the PU localization in CRSNs. However, the RSS-based localization schemes have a high localization error because they use an inexact path loss exponent (PLE). Thus, applying a RSS-based localization scheme into the PU localization would cause a high interference to the PU. In order to reduce the localization error and improve the channel reuse rate, we propose a RSS-based PU localization scheme that uses distance calibration for CRSNs using underlay model-based spectrum access. Through the simulation results, it is shown that the proposed scheme can provide less localization error as well as more spectrum utilization than the RSS-based PU localization using the mean and the maximum likelihood calibration.

Non-Orthogonal Multiple Access (NOMA) to Enhance Capacity in 5G

  • Lim, Sungmook;Ko, Kyunbyoung
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.38-43
    • /
    • 2015
  • Non-orthogonal multiple access (NOMA) where all users share the entire time and frequency resource has paid attention as one of the key technologies to enhance the spectral efficiency and the total throughput. Nevertheless, as the number of users and SIC error increase, the inter-user interference and the residual interference due to the SIC error also increase, resulting in performance degradation. In order to mitigate the performance degradation, we propose grouping-based NOMA system. In the proposed scheme, all users are divided into two groups based on the distance between the BS and each user, where one utilizes the first half of the bandwidth and the other utilizes the rest in the orthogonal manner. On the other hand, users in each group share the spectrum in the non-orthogonal manner. Grouping users can reduce both the inter-user interference and residual interference due to the SIC error, so it can outperform conventional NOMA system, especially in case that the number of users and the SIC error increase. Based on that, we also present the hybrid operation of the conventional and the proposed NOMA systems. In numerical results, the total throughput of the proposed NOMA systems is compared with that of the conventional NOMA systems with regard to the number of users and SIC error. It is confirmed that the proposed NOMA system outperforms the conventional NOMA system as the number of users and the SIC error increase.

Development of a Remotely Controlled Intelligent Controller for Dynamical Systems through the Internet

  • Kim, Sung-Su;Jung, Seul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2266-2270
    • /
    • 2005
  • In this paper, an internet based control application for dynamical systems is implemented. This implementation is maily targeted for the part of advanced control education. Intelligent control algorithms are implemented in a PC so that a client can remotely access the PC to control a dynamical system through the internet. Neural network is used as an on-line intelligent controller. To have on-line learning and control capability, the reference compensation technique is implemented as intelligent control hardware of combining a DSP board and an FPGA chip. GUIs for a user are also developed for the user's convenience. Actual experiments of motion control of a DC motor have been conducted to show the performance of the intelligent control though the internet and the feasibility of advanced control education.

  • PDF

Appplication of Role-based access control in Embedded OS (임베디드 OS에서의 역할기반 접근제어 적용)

  • Lim, Jae-Deok;Un, Sung-Kyong;Kim, Ki-Young;Kim, Jeong-Nyeo;Lee, Choel-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.163-165
    • /
    • 2007
  • Recently, the security requirements of the embedded system which were not considered when the embedded system is independently deployed are being increased because the embedded system is connected to an internet. The connection to the internet of embedded system is the meaning that it is exposed to the various kinds of external attack and can be a victim to these attacks in anytime. Particularly, it is trend that the user-related information is stored into the personal terminals and/or electrical appliances such as PDA, home gateway for home network, settop boxes and so on. So it is needed the security mechanism which protects the user information from the malicious accesses. Accordingly, the coverage of the system security is being expanded from the general server to the embedded system. And it is not enough that the embedded system supports only its inherent functions and it becomes the essential element to provide the security function to the embedded system. This paper applies the RBAC(role-based access control) function to the embedded linux OS and tries to strengthen the security of the embedded linux OS. RBAC is implemented as a loadable kernel module with LSM(Linux Security Module) security framework for user's flexibility.

  • PDF

Presentation Priority and Modality Conversion in MPEG-21 DIA

  • Thang, Truong Cong;Ro, Yong Man
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.339-350
    • /
    • 2003
  • The Part 7 of MPEG-21, called Digital Item Adaptation, aims at an interoperable transparent access of multimedia contents in heterogeneous environments. This standard facilitates the development of Universal Multimedia Access (UMA) systems, which adapt the rich multimedia contents to provide user the best possible presentation under the constraints of various terminals and network connections. Content adaptation has two major aspects: one is modality conversion that converts content from one modality (e.g. video) to different modalities (e.g. image) the other is content scaling that changes the titrates (or qualities) of the contents without converting their modalities. At the output of adaptation process, the highly-subjective qualities of adapted contents nay vary widely with respect to point-of-views of different providers and different users. So, user should have some control on the adaptation process. In this paper, we describe two description tools of user characteristics, the presentation priority preference and the modality conversion preference, which allow user to have flexible choices on the qualities and modalities of output contents. We also present a systematic approach to integrate these user preferences into the adaptation process. These description tools are developed in the process of MPEG-21 standardization.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.