• Title/Summary/Keyword: internet addresses

Search Result 227, Processing Time 0.021 seconds

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Security Framework for Improving the Performance of the Malicious Process Control System (악성 프로세스 제어 시스템의 성능 향상을 위한 보안 프레임워크)

  • Kim, Iksu;Choi, Jongmyung
    • Journal of Internet Computing and Services
    • /
    • v.14 no.2
    • /
    • pp.61-71
    • /
    • 2013
  • Until now, there have been various studies against Internet worms. Most of intrusion detection and prevention systems against Internet worms use detection rules, but these systems cannot respond to new Internet worms. For this reason, a malicious process control system which uses the fact that Internet worms multicast malicious packets was proposed. However, the greater the number of servers to be protected increases the cost of the malicious process control system, and the probability of detecting Internet worms attacking only some predetermined IP addresses is low. This paper presents a security framework that can reduce the cost of the malicious process control system and increase the probability of detecting Internet worms attacking only some predetermined IP addresses. In the proposed security framework, virtual machines are used to reduce the cost of control servers and unused IP addresses are used to increase the probability of detecting Internet worms attacking only some predetermined IP addresses. Therefore the proposed security framework can effectively respond to a variety of new Internet worms at lower cost.

An Overview of the Developments of ICANN Internet Governance and Some Recommendations for Korea (ICANN의 진화과정 고찰을 통해 본 한국 인터넷주소 거버넌스의 개선방향)

  • Chung, Chan-Mo
    • Informatization Policy
    • /
    • v.19 no.3
    • /
    • pp.36-49
    • /
    • 2012
  • Internet Corporation for Assigned Names and Numbers (ICANN) is the body which manages the allocation and registration of global Internet IP addresses and domain names. As a gesture to overcome the dependency on the U.S. government, ICANN and the U.S. Department of Commerce jointly made the Affirmation of Commitment in which they submitted the workings of ICANN to the supervision of a council of Internet experts. Accountability and Transparency Review Team (ATRT) is one of four teams created for this purpose. In December 2010, ATRT made 27 recommendations, which were subsequently approved by the ICANN Board. These reform efforts of ICANN provide significant implications for the future of Korean Internet governance. Korea should enhance the compatibility of its domestic decision making process related to Internet addresses with the private sector driven, bottom-up process of global Internet governance. In order to increase the involvement of private sector and civil society, it is recommended for Korea to formalize the mechanism for bottom-up process. Insertion of a new provision concerning a bottom-up process into the Internet Addresses Act should be considered.

  • PDF

Internet_Based Monoitoring and Control System for Air handling Units in Building Automation System (빌딩자동제어시스템의 공조설비에 적용을 위한 Internet 기반 모니터링 및 제어시스템 구축)

  • Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.05a
    • /
    • pp.412-418
    • /
    • 2004
  • In this paper, a new distributed intelligent control module based on LonWorks fieldbus for air handling unit(AHU) of heating, ventilating and air-conditioning(HVAC) is proposed to replace with a conventional direct digital control(DDC) with 32 bit microprocessor. This article also addresses an Internet-based HVAC system architecture that combines Web technology and networking. The proposed control architecture has a excellent features such as highly compact and flexible function design, a low priced smart front-end and reliable performance with various functions. This also addresses issues in control network configuration, logical design of field devices by S/W tool, Internet networking and electronic element installation. Experimental results showing the system performance are also included in this paper.

  • PDF

A Dynamic Internet Address Model for Providing Customized Information (사용자 맞춤형 정보 제공을 위한 동적 인터넷 주소 모델)

  • Lee, Young Ho;Koo, Yong Wan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.27-34
    • /
    • 2016
  • The referents of internet addresses are no longer limited to web sites. A new address service by the international organization for the internet address (ICANN) introduces an open space for the TLD (Top Level Domain) strings so that each service, content, product, and other linguistic expressions may be allowed. The open TLD addresses are more suitable for representing the address of service units, contents, or products. In this paper, as an alternative to static Internet address service to return a consistent mapping result regardless of a user-specific different requirements, we design a dynamic internet address mapping model that returns mapping result to suit user particular requirements. In addition, we propose a method for implementing a internet address service without any changes in the existing domain protocols. It may implement a dynamic internet address by attaching to a encoded user's metadata and environment data within a internet address representation, and adding the module for dynamic mapping to the name servers. Through this proposal, trying to expand the functions of internet address, it is expected to be able to provide customized informaiton retrieval services for each user by using just internet address.

Internet Push Service Using Tunneling Technology (터널링기술을 이용한 인터넷 푸쉬 서비스)

  • Oh, Jong-Taek
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.130-135
    • /
    • 2008
  • Broadcasting services using Internet and Internet protocol have been developed actively. In this paper, push service technologies based on tunneling protocol and for the case of base stations using private IP addresses are proposed. This could be very proper to the broadcasting services for location & traffic information and disaster relief.

  • PDF

Design and Test of SIP for ENUM (이넘지원을 위한 SIP 설계 및 실험)

  • 정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.880-883
    • /
    • 2003
  • In case user uses e-mail, SIP, internet FAX etc., the user has many addresses as many as services. ENUM is attracting interests because ENUM can provide URI addresses with a telephone number. This paper describes design of SIP function for supporting ENUM services.

  • PDF

The Multistakeholder Model of Internet Governance (인터넷 거버넌스 모델로서의 멀티스테이크홀더)

  • Lee, Young-Eum
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.21-34
    • /
    • 2013
  • The multistakeholder model of Internet governance is based on the belief that the stakeholder groups should be able to agree on the rules and principles in governing the Internet space. The global expansion of the sweeping influence of the Internet has heightened the awareness of international governments on the importance of Internet governance, but since the Internet has developed mostly through voluntary participation by various groups, the organization with the greatest ability to manage the Internet space currently is ICANN(Internet Corporation for Assigned Names and Numbers), the U.S. based organization that manages the assignment of Internet domain names and IP addresses. Although ICANN has attempted to globalize its operation, governments in some nations are voicing dissatisfaction over the fact that the voice of the governments are not adequately represented within ICANN. This paper examines how the concept of multistakeholderissm has been used in WSIS(World Summit on Information Society), ICANN(Internet Corporation for Assigned Names and Numbers) and the ITU(International Telecommunication Union) as an important principle in emphasizing their roles in Internet governance.

  • PDF

Study on Introduction of Internet Number Resource (인터넷 번호 자원 도입 방안 연구)

  • 정옥조;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.866-870
    • /
    • 2002
  • In case user uses e-mail, SIP, internet FAX etc., the user possess as many addresses as services. ENUM is attracting interests which can approach various internet information resources. This paper analyzed some plan that must consider to introduce in domestic about ENUM that shows interests in many country.

  • PDF

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.