• Title/Summary/Keyword: mobile protocol

Search Result 1,962, Processing Time 0.03 seconds

Tunnel Gateway Satisfying Mobility and Security Requirements of Mobile and IP-Based Networks

  • Jung, Youn-Chan;Peradilla, Marnel
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.583-590
    • /
    • 2011
  • Full-mesh IPSec tunnels pass through a black ("unsecure") network (B-NET) to any red ("secure") networks (RNETs). These are needed in military environments, because they enable dynamically changing R-NETs to be reached from a BNET. A dynamically reconfiguring security policy database (SPD) is very difficult to manage, since the R-NETs are mobile. This paper proposes advertisement process technologies in association with the tunnel gateway's protocol that sends 'hello' and 'prefix advertisement (ADV)' packets periodically to a multicast IP address to solve mobility and security issues. We focus on the tunnel gateway's security policy (SP) adaptation protocol that enables R-NETs to adapt to mobile environments and allows them to renew services rapidly soon after their redeployment. The prefix ADV process enables tunnel gateways to gather information associated with the dynamic changes of prefixes and the tunnel gateway's status (that is, 'down'/restart). Finally, we observe two different types of performance results. First, we explore the effects of different levels of R-NET movements on SP adaptation latency. Next, we derive the other SP adaptation latency. This can suffer from dynamic deployments of tunnel gateways, during which the protocol data traffic associated with the prefix ADV protocol data unit is expected to be severe, especially when a certain tunnel gateway restarts.

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

An authenticated key distribution protocol for the CDMA mobile communication network (부호 분할 다중 접속 이동 통신망을 위한 인증 키 분해 프로토콜)

  • Hak S. Jeon;Dong K. Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.43-54
    • /
    • 1997
  • In this paper, we introduce a secure and minimal protocol for authenticated key distribution over the CDMA mobile communication network. The CDMA mobile communication network has been developed the security protocol that provides a means for user authentication and subsequent protection of user traffic. However, this model has no security assumptions for the intermediate, fixed networks. To avoiding these drawbacks, we introduce a minimal authenticated key distribution protocol. This protocol provides the security of the intermediate and fixed network in mobile environment, and maintains the confidentiality of user identification and the minimum size of information flow compared with the existing protocols.

Design of the Protocol for Wireless Charging of Mobile Emotional Sensing Device (모바일 감성 센싱 단말기의 무선 충전을 위한 프로토콜 설계 및 구현)

  • Kim, Sun-Hee;Lim, Yong-Seok;Lim, Seung-Ok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.2
    • /
    • pp.95-101
    • /
    • 2012
  • In order to supply emotion service depending on user's emotional change in a mobile environment, various researches have been carried. This paper discusses a protocol for wireless charging and an embedded platform of the mobile emotional sensing device which supports that. Wireless charging process relieves user's vexatious task to charge the emotional sensing device. To support wireless charging, there are one basestation and several mobile devices. Basestation coordinates and controls the devices over wireless communication, as well as supplies energy. For 1:N communication we defines the network whose superframe is classified into four categories: a network join superframe, a charging request superframe, a charging superframe and an inactive superframe. Physical layer provides how to supply energy to the devices and communicate physically. Mobile device is equipped with energy charged circuits, which correspond with the defined energy supplying method, as well as bidirectional communication circuits. Mobile device monitors and analyzes its own battery status, and is able to send a request packet to basestation. Therefore, it can be charged before its battery is exhausted without user's perception.

A RF Energy Harvesting Based Routing Protocol in Mobile Ad-hoc Wireless Sensor Networks (모바일 애드혹 무선 센서 네트워크에서 RF 에너지 하베스팅 기반 라우팅 프로토콜)

  • Shim, KyuHyun;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.87-93
    • /
    • 2016
  • In this paper, we propose a RF energy harvesting based routing protocol in mobile ad-hoc wireless sensor networks. The main features and contributions of the proposed routing protocol are as follows. First, establishment of routing route based on both remaining energy of mobile sensor nodes and RF energy harvesting. Second, establishment of routing route by considering availability and stability of route based on energy of mobile sensor nodes to increase lifetime of networks and route. The performance evaluation of the proposed routing protocol using OPNET shows that the routing method considering both route availability and route stability based on RF energy harvesting can increase efficiently route lifetime.

Design of Messenger Protocol, Implementation of Server and Analysis for Mobile Office Environment (이동 사무환경을 위한 메신저 프로토콜 설계 및 서버의 구현 및 분석)

  • On, Jin-Ho;Choi, Wan;Cho, Gi-Hwan;Lee, Moon-Kun
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.1-13
    • /
    • 2008
  • Recently, interest about Mobile Office Environment is increasing Messenger system of 'Ubiquitous Mobile Office Environment' need various kinds new concept such os request/broadcasting/transmission of working environment that existent messenger protocol does not support. Design correct new protocol to Mobile Office Environment messenger in this treatise, and analyzed existentprotocol and comparison. Also, examine characteristic of rendezvous server that was optimized in MOE-MP protocol and analyzed efficiency. MOE-MP that design newly based on basic syntax of XMPP optimized to Mobile Office Environment.

  • PDF

Communication Protocol for Mobile Sensor Networks with Continuous Mobility (지속적인 이동성을 갖는 이동 센서네트워크를 위한 통신 프로토콜)

  • Kim, Hyoung-Jin;Kim, Lae-Young;Song, Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Mobile Sensor Network(MSN) is actively studied due to the advent of mobile sensors such as Robomote and Robotic Sensor Agents(RSAs), However, existing studies on MSN have mainly focused on coverage hole problem which occurs in Stationary Sensor Network(SSN). To address coverage hole problem, these studies make mobile sensors move temporarily so that they do not make the best use of the mobility of mobile sensors, Thus, a mechanism utilizing the continuous movement of mobile sensors is proposed to improve the network coverage performance. However, this mechanism is presently immature and does not explain how to make routing path and send data from mobile sensors to a sink node, Therefore, to efficiently make routing path and send data from mobile sensors to a sink node, we propose a communication protocol for mobile sensor network where mobile sensors continuously move. The proposed protocol deploys not only mobile sensors but also stationary sensors which send sensing data to a sink node instead of mobile sensors. Simulation results show that the proposed protocol improves the performance in terms of network coverage and traffic overhead, compared to conventional SSN protocols.

A Formal Security Analysis on the Enhanced Route Optimization Protocol for Mobile IPv6 (이동 IPv6의 확장된 경로 최적화프로토콜에 대한 형식화된 보안 분석)

  • You, Il-Sun;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.4
    • /
    • pp.691-699
    • /
    • 2009
  • Recently, the ERO protocol has been adopted as a standard to protect the routing optimization mode introduced by MIPv6. This protocol uses the public key cryptography and the early binding update method to improve the Return Routeability protocol while optimizing both security and performance. On the other hand, though various security approaches including the ERO protocol have been proposed for MIPv6, they lack formal verification. Especially, to our best knowledge, there is no formal analysis on the ERO protocol. In order to provide a good example for formal analysis on MIPv6 security protocols, this paper verifies the correctness of the ERO protocol through BAN-logic. For this goal, BAN-logic is extended to consider the address tests on the mobile nodes's CoA and HoA. It is expected that the analysis presented in this paper will be useful for the formal verifications on the security protocols related to MIPv6.

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

NEMO-enabled Hybrid Distributed Mobility Management (네트워크 이동성을 지원하는 하이브리드 분산 이동성 관리)

  • Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.1030-1040
    • /
    • 2018
  • In Distributed Mobility Management (DMM) protocol, the mobility functions are distributed to network edge closer to mobile users. DMM protocol has some advantages of low-cost traffic delivery, optimized routing path, high scalability. However, it needs many mobile anchors to exchange signaling messages and it results in a high signaling cost. Thus, previous works suggested the hybrid DMM protocol to reduce the high signaling cost for long-live sessions and this paper extends a hybrid scheme to the NEMO environment. The mobile routers are installed at vehicles and can move together with several mobile devices. So we can define the high-mobility property for mobile routers and suggest the hybrid scheme using this property. According to the high-mobility property of mobile routers, we can distribute the mobile anchors or allocate a centralized mobile anchor. In this paper, we mathematically analyze the performance of the proposed NEMO-enabled hybrid DMM protocol and show superior performance.