• 제목/요약/키워드: internet access

검색결과 2,643건 처리시간 0.025초

Radio Resource Sharing Among Users in Hybrid Access Femtocells

  • Becvar, Zdenek;Plachy, Jan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2590-2606
    • /
    • 2014
  • A problem related to deployment of femtocells is how to manage access of users to radio resources. On one hand, all resources of the femtocell can be reserved for users belonging to a closed subscriber group (CSG), which is a set of users defined by a femtocell subscriber. This approach, known as closed access, however, increases interference to users not included in the CSG as those users do not have a permission to access this femtocell. Contrary, resources can be shared by all users with no priority in an open access mode. In this case, the femtocell subscriber shares radio as well as backhaul resources with all other users. Thus, throughput and quality of service of the subscriber and the CSG users can be deteriorated. To satisfy both the CSG as well as non-CSG users, a hybrid access is seen as a compromise. In this paper, we propose a new approach for sharing radio resources among all users. As in common cases, the CSG users have a priority for usage of a part of resources while rest of the resources is shared by all users proportionally to their requirements. As the simulation results show, the proposed resource sharing scheme significantly improves throughput of the CSG users and their satisfaction with granted bitrates. At the same time, throughput and satisfaction of the non-CSG users is still guaranteed roughly at the same level as if conventional sharing schemes are applied.

Wireless Internet-IMT-2000/Wireless LAN Interworking

  • Roman pichna;Tero Ojanpera;Harro Posti;Jouni Karppinen
    • Journal of Communications and Networks
    • /
    • 제2권1호
    • /
    • pp.46-57
    • /
    • 2000
  • Ongoing standardization effort on 3G cellular system in 3GPP (UNTS) is based on GPRS core network and promises a global standard for systems capable of offering ubiquitous access to internet for mobile users. Considered radio access systems(FDD CDMA, TDD CDMA, and EDGE) are optimized for robust mobile use. However, there are alternative relatively high-rate radio interfaces being standardized for WLAN (IEEE802.11 and HIPER-LAN/2) which are capable of delivering significantly higher data rates to static or semi-static terminals with much less overhead. Also WPANs(BLUETOOTH, IEEE802.15), which will be present in virtually every mobile handset in the near future, are offering low cast and considerable access data rate and thus are very attractive for interworking scenarios. The prospect of using these interfaces as alternative RANs inthe modular UMTS architecture is very promising. Additionally, the recent inclusion of M-IP in the UMTS R99 standard opens the way for IP-level interfacing to the core network. This article offers an overview into WLAN-Cellular interworking. A brief overview of GPRS, UMTS cellular architectures and relevant WLAN standards is given. Possible interworking architectures are presented.

  • PDF

상황인식 기반 적응적 접근제어 보안모델 설계에 관한 연구 (A Study on Security Model Design of Adaptive Access Control based Context-Aware)

  • 김남일;김창복
    • 한국인터넷방송통신학회논문지
    • /
    • 제8권5호
    • /
    • pp.211-219
    • /
    • 2008
  • 본 논문은 기존의 접근제어 모델을 확장하여 상황인식 기반 접근제어 모델을 제안하였다. 본 논문에서 xoRBAC와 CAAC와 같은 상황인식기반 보안모델에 대한 최근연구들을 조사하였다. 정확한 정책평가를 위해 기존의 CAAC 보안모델에 상황브로커와 파인더 컴포넌트를 추가하였다. 이 보안모델에 의해 더욱 명확한 정책결정을 위해 상황정보 및 상황결정정보를 보다 용이하게 수집할 수 있다. 또한, 접근된 자원에서 또 한번의 사용자 이벤트를 판단하여, 접근할 수 있는 모든 가능한 자원들을 제어하였다. 본 논문에서 제안된 보안모델은 역할에 따른 특정정책과 제약조정을 통해 다양한 보안등급 및 접근권한방식을 동적으로 제공할 수 있다.

  • PDF

IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가 (Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments)

  • 진병욱;정동욱;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

A Role-Based Access Control System API Supporting External Authority Interface

  • 마진;김현아;박민재
    • 인터넷정보학회논문지
    • /
    • 제19권2호
    • /
    • pp.27-32
    • /
    • 2018
  • In industries that are operating various enterprise systems, new systems are integrated and operated in accordance with each period. In particular, when a new system is to be integrated, one of the major considerations is the single sign-on part for integrating and operating the authentication. To implement this authority system using role-based access control method, an extension method for access control method is needed. Therefore, in this paper, we design an extended role-based access control model for interworking with legacy authority system and provide its APIs. The extended role-based access control model is a model in which external authority information, which holds authority information in the authority information, is added. And we describe operations that the REST Web APIs are based on these models. In this paper, the method is described in the back-end APIs and can be implemented as an operation of an extended role-based access control system based on the method.

A Generalized Markovian Based Framework for Dynamic Spectrum Access in Cognitive Radios

  • Muthumeenakshi, K.;Radha, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권5호
    • /
    • pp.1532-1553
    • /
    • 2014
  • Radio spectrum is a precious resource and characterized by fixed allocation policy. However, a large portion of the allocated radio spectrum is underutilized. Conversely, the rapid development of ubiquitous wireless technologies increases the demand for radio spectrum. Cognitive Radio (CR) methodologies have been introduced as a promising approach in detecting the white spaces, allowing the unlicensed users to use the licensed spectrum thus realizing Dynamic Spectrum Access (DSA) in an effective manner. This paper proposes a generalized framework for DSA between the licensed (primary) and unlicensed (secondary) users based on Continuous Time Markov Chain (CTMC) model. We present a spectrum access scheme in the presence of sensing errors based on CTMC which aims to attain optimum spectrum access probabilities for the secondary users. The primary user occupancy is identified by spectrum sensing algorithms and the sensing errors are captured in the form of false alarm and mis-detection. Simulation results show the effectiveness of the proposed spectrum access scheme in terms of the throughput attained by the secondary users, throughput optimization using optimum access probabilities, probability of interference with increasing number of secondary users. The efficacy of the algorithm is analyzed for both imperfect spectrum sensing and perfect spectrum sensing.

PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing

  • Su, Mang;Wang, Liangchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권5호
    • /
    • pp.2754-2767
    • /
    • 2019
  • Cloud computing is widely used in information spreading and processing, which has provided a easy and quick way for users to access data and retrieve service. Generally, in order to prevent the leakage of the information, the data in cloud is transferred in the encrypted form. As one of the traditional security technologies, access control is an important part for cloud security. However, the current access control schemes are not suitable for cloud, thus, it is a vital problem to design an access control scheme which should take account of complex factors to satisfy the various requirements for cipher text protection. We present a novel access control scheme based on proxy re-encryption(PRE) technology (PreBAC) for cipher text. It will suitable for the protection of data confidently and information privacy. At first, We will give the motivations and related works, and then specify system model for our scheme. Secondly, the algorithms are given and security of our scheme is proved. Finally, the comparisons between other schemes are made to show the advantages of PreBAC.

A cache placement algorithm based on comprehensive utility in big data multi-access edge computing

  • Liu, Yanpei;Huang, Wei;Han, Li;Wang, Liping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.3892-3912
    • /
    • 2021
  • The recent rapid growth of mobile network traffic places multi-access edge computing in an important position to reduce network load and improve network capacity and service quality. Contrasting with traditional mobile cloud computing, multi-access edge computing includes a base station cooperative cache layer and user cooperative cache layer. Selecting the most appropriate cache content according to actual needs and determining the most appropriate location to optimize the cache performance have emerged as serious issues in multi-access edge computing that must be solved urgently. For this reason, a cache placement algorithm based on comprehensive utility in big data multi-access edge computing (CPBCU) is proposed in this work. Firstly, the cache value generated by cache placement is calculated using the cache capacity, data popularity, and node replacement rate. Secondly, the cache placement problem is then modeled according to the cache value, data object acquisition, and replacement cost. The cache placement model is then transformed into a combinatorial optimization problem and the cache objects are placed on the appropriate data nodes using tabu search algorithm. Finally, to verify the feasibility and effectiveness of the algorithm, a multi-access edge computing experimental environment is built. Experimental results show that CPBCU provides a significant improvement in cache service rate, data response time, and replacement number compared with other cache placement algorithms.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

인터넷 접속 서비스를 위한 교환 시스템의 실현방안과 프로세서간 통신망 성능 평가 (The Implementation Method and its IPCN(Inter-Processor Communication Network) Performance Evaluation for Internet Access Service)

  • 이일우;최고봉
    • 한국통신학회논문지
    • /
    • 제25권8A호
    • /
    • pp.1213-1222
    • /
    • 2000
  • 본 논문에서는 음성 위주의 교환시스템에서 인터넷 트래픽처리를 위한 구현 방안을 제시하였으며 인터넷 트래픽 처리를 담당하는 서비스시스템의 내부 프로세서간 통신망에 대한 성능을 평가 분석하였다 기존 교환시스템에서 인터넷 트래픽을 처리방법은 기존의음성가입자에게 영향을 주며 특히 인터넷 트래픽 속성상 장시간의 점유시간을 가지게 된다 이러한 문제점을 해결하기 위해 인터넷 트래픽 처리를 위한 별도의 서브시스템을 구현하여 기존 음성 트래픽 처리에는 부하를 주지않는 방안을 제시하였다 또한 실질적으로 인터넷 트래픽 처리를 담당하는 서브시스템의 성능을 분석하였다.

  • PDF