• Title/Summary/Keyword: VO

Search Result 1,957, Processing Time 0.025 seconds

A Study of Automatically Resources Authentication over Grid VO (그리드 VO 상에서의 자동화된 자원 인증 시스템 연구)

  • 이원구;이재광
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.739-743
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PKI to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.

VoIP service performance improvements of MANET based on Diffserv (Diffserv기반 MANET에서 VoIP 서비스 성능 개선)

  • Yoon, Tong-il;Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.777-779
    • /
    • 2009
  • Study for VoIP in MANET is mainly focused on transmission performance or voice quality of VoIP traffic as single traffic. In this study, VoIP performance is analyzed of MANET which has several types of traffics. Diffserv scheme is used to process the traffics. It is showed that VoIP traffic performance is improved by differv scheme, as a result of analysis for VoIP and FTP traffic. Simulator, which is implemented with NS-2 package and VoIP patch, is used.

  • PDF

A Study of Automatically Authentication System for Virtual Resource Organization on Grid (그리드상의 가상 자원 조직에 대한 자동 인증 시스템 연구)

  • 최병선;이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.301-306
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member\ulcorner of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PH to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

A Study of Automatically Grid VO Authentication Using XML Security (XML 정보보호 기술을 활용한 자동화된 그리드 VO 인증 시스템 연구)

  • 이성현;이원구;이재광
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.507-511
    • /
    • 2004
  • 그리드 VO(Virtual Organization)는 내부 규정과 정책의 집합에 의하여 제어되는 기존의 VO 개념에서 벗어나 임시적, 동적 기반의 자원 공유와 협업을 하기 위해 개인 또는 기관, 시스템 자원이 모인 임시적인 VO이다. 이것은 개인 또는 기관, 시스템 자원들이 동시에 몇 개의 VO의 일원이 되는 경우나 변화하는 시스템 자원의 상황에 따라 VO 구성을 위한 결합, 형성된 그리드 VO에 대한 인증에서 많은 문제가 발생하게 된다. 본 논문에서는 그리드 VO 구성에서 발생할 수 있는 보안 문제 중 자원에 대한 인증과 관련된 문제를 해결하고자 XML 정보보호기술을 토대로 경량화된 그리드 VO에 대한 자원 인증 시스템을 제안하였다.

  • PDF

Transmission Performance of VoIP Traffic over MANETs (MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1109-1116
    • /
    • 2010
  • In this paper, some performance characteristics of VoIP(Voice over Internet Protocol) for MANET(Mobile Ad-hoc Networks) with simulation is studied and appropriate condition for implementation of VoIP service is suggested. VoIP simulator is implemented with NS(Network Simulator)-2. VoIP traffic for simulation is generated with some codecs of G.711, G.723.1, G.726-32, G.729A, GSM.AMR and iLBC. As simulation results for traffic transmission under $670{\times}670m$ 50node MANET environment, performance data for MOS(Mean Opinion Score), network delay, packet loss rate and transmission bandwidth are measured. Normalized analysis about measured results shows that maximum VoIP connection satisfying VoIP service quality condition is 15.

The Numbering System for VoIP Sevices (VoIP 서비스의 번호체계)

  • 원동유;신승수;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.98-103
    • /
    • 2002
  • Currently, VoIP service related companies have different telephone number system according to the problem of VoIP which Have no unique number system, and they develop/use different number bits, shortening button, and so on. In this paper, for solving this problem, we analyzed the standadization trend of ITU-T and IEIE, and reserched domestic trend of VoIP number system standardization trend and use case of number system of VoIP services. According to this, we proposes three number allocation plan that satisfies the globe trend, simpleness of number allocation, and VoIP service provider's actual conditions.

  • PDF

A Study on the Next Generation VoIP Network Architecture (차세대 VoIP 망 구조)

  • 윤태상;정성호;이일진;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.839-843
    • /
    • 2002
  • In this paper, we present a next generation VoIP network architecture. Specifically, we present key components such as SoftSwitch and media gateway, and important protocols for VoIP services. We also present basic components and mechanisms for VoIP QoS. The architecture presented in this paper is able to support open interfaces and multimedia traffic, and therefore various multi-services can be supported efficiently using the architecture.

  • PDF

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.

A Design of Encryption Method for Strong Security about Tapping/Interception of VoIP Media Information between Different Private Networks (이종 사설망간에 VoIP 미디어의 도.감청 보안 강화를 위한 암호화 기법 설계)

  • Oh, Hyung-Jun;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.113-120
    • /
    • 2012
  • VoIP provides voice data service using existing IP networks and has received much attention recently. VoIP service has a variety of security vulnerabilities. Types of main attacks on VoIP service are tapping/interception, DoS attacks, spam, misuse of service attacks and the like. Of these, confidential information leak because of tapping/interception has been considered as a critical problem. Encryption techniques, such as SRTP and ZRTP, are mostly used to prevent tap and intercept on VoIP media information. In general, VoIP service has two service scenarios. First, VoIP service operates within a single private network. Second, VoIP service operates between different private networks. Both SRTP and ZRTP for VoIP media information within a single private network can perform encryption. But they can not perform encryption between different private networks. In order to solve this problem, in this paper, we modify SRTP protocol. And then, we propose an encryption method that can perform encryption of VoIP media information between the different private networks.