• Title/Summary/Keyword: multiple session

Search Result 170, Processing Time 0.038 seconds

A Non-Periodic Synchronization Algorithm using Address Field of Point-to-Point Protocol in CDMA Mobile Network (CDMA이동망에서 점대점 프로토콜의 주소영역을 이용한 비주기적 동기 알고리즘)

  • Hong, Jin-Geun;Yun, Jeong-O;Yun, Jang-Heung;Hwang, Chan-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.8
    • /
    • pp.918-929
    • /
    • 1999
  • 동기식 스트림 암호통신 방식을 사용하는 암호통신에서는 암/복호화 과정 수행시 암호통신 과정에서 발생하는 사이클슬립으로 인해 키수열의 동기이탈 현상이 발생되고 이로 인해 오복호된 데이타를 얻게된다. 이러한 위험성을 감소하기 위한 방안으로 현재까지 암호문에 동기신호와 세션키를 주기적으로 삽입하여 동기를 이루는 주기적인 동기암호 통신방식을 사용하여 왔다. 본 논문에서는 CDMA(Cellular Division Multiple Access) 이동망에서 데이타서비스를 제공할 때 사용되는 점대점 프로토콜의 주소영역의 특성을 이용하여 단위 측정시간 동안 측정된 주소비트 정보와 플래그 패턴의 수신률을 이용하여 문턱 값보다 작은경우 동기신호와 세션키를 전송하는 비주기적인 동기방식을 사용하므로써 종래의 주기적인 동기방식으로 인한 전송효율성 저하와 주기적인 상이한 세션키 발생 및 다음 주기까지의 동기이탈 상태의 지속으로 인한 오류확산 등의 단점을 해결하였다. 제안된 알고리즘을 링크계층의 점대점 프로토콜(Point to Point Protocol)을 사용하는 CDMA 이동망에서 동기식 스트림 암호 통신방식에 적용시 동기이탈율 10-7의 환경에서 주기가 1sec인 주기적인 동기방식에서 요구되는 6.45x107비트에 비해 3.84x105비트가 소요됨으로써 전송율측면에서의 성능향상과 오복호율과 오복호 데이타 비트측면에서 성능향상을 얻었다. Abstract In the cipher system using the synchronous stream cipher system, encryption / decryption cause the synchronization loss (of key arrangement) by cycle slip, then it makes incorrect decrypted data. To lessen the risk, we have used a periodic synchronous cipher system which achieve synchronization at fixed timesteps by inserting synchronization signal and session key. In this paper, we solved the problem(fault) like the transfer efficiency drops by a periodic synchronous method, the periodic generations of different session key, and the incorrectness increases by continuing synchronization loss in next time step. They are achieved by the transfer of a non-periodic synchronous signal which carries synchronous signal and session key when it is less than the threshold value, analyzing the address field of point-to-point protocol, using the receiving rate of address bits information and flag patterns in the decision duration, in providing data services by CDMA mobile network. When the proposed algorithm is applied to the synchronous stream cipher system using point-to-point protocol, which is used data link level in CDMA mobile network, it has advanced the result in Rerror and Derror and in transmission rate, by the use of 3.84$\times$105bits, not 6.45$\times$107bits required in periodic synchronous method, having lsec time step, in slip rate 10-7.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.

Effect of Vibration Stimulation Training on Upper Extremity Function in Children with Cerebral Palsy (뇌성마비 아동의 진동 자극 훈련이 상지기능에 미치는 영향)

  • Kang, Set-Byul;Kim, Man-Je;Yoo, Doo-Han
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.21 no.1
    • /
    • pp.23-33
    • /
    • 2023
  • Objective : The purpose of this study is was to find ouetermine whether training to applying vibration stimulation to the biceps brachii of children in the late stages of spasticity hemiplegic cerebral palsy can helps to improve the function of the upper extremity. Methods : This The study was conducted on with three children with cerebral palsy, all between the ages of 13 and 15 years. Among the experimental research methods of used with individual subjects, an AB research design using multiple basic baseline individual experimental studies was used, and vibration stimulation was provided to the paralyzed hand during the intervention period. The An evaluation was conducted before and after each session used to measure the function of the upper extremity using was conducted after each session of the Rapael Smart Board and The Jebsen-Tayler hand function test and the Motor Activity Log (MAL) were conducted before and after the experiment. Results : As a result of measuring the smooth The average score and total scores of for using the Rapael Smart Board to measure the upper extremity function in following each therapeutic session using the Rafale smart pegboard showed that, Subject 3 did not showevidenced a no significant change in the average value, and but Subjects 1 and 2 did showed a significant changes in their average values. All three subjects showed significant changes in the Jepson-Taylor hand function test and in the Motor Activity Log test, as evaluated before and after the intervention. Conclusion : Training The using use of vibration stimulation showed a positive effect on in improving upper limb function and exercise in hemiplegia hemiplegic children with who had little experience on using their hemiplegic side.

Effect of Sensory Integration Therapy Combined with Eye Tracker on Sensory Processing and Visual Perception of Children with Developmental Disabilities (아이트래커를 병행한 감각통합치료가 발달장애아동의 감각처리 및 시지각에 미치는 영향)

  • Kwon, So-Hyun;Ahn, Si-Nae
    • The Journal of Korean Academy of Sensory Integration
    • /
    • v.21 no.3
    • /
    • pp.39-53
    • /
    • 2023
  • Objective : The purpose was the effect of sensory integration therapy combined with an eye tracker on the sensory processing and visual perception of children with developmental disabilities. Methods : It was a single-subject study with a multiple baseline design between subjects, and the intervention applied sensory integration therapy combined with an eye tracker. Visual-motor speed and saccadic eye movements were assessed at each session of baseline and intervention periods. As pre- and post-evaluation, sensory profile, Korean-Developmental Test of Visual Perception and Trail Making Test were conducted. The results of each session evaluation and pre- and post-evaluation researched the effectiveness of the intervention through visual analysis and trend line analysis. Results : As a result of the evaluation for each session, the slope of the trend line for all children in visual-motor speed and saccadic eye movement increased sharply during the intervention compared to the baseline. As a result of the pre- and post-evaluation, the sensory processing of movement, body position, and visual changed from more than that of peers to a level similar to that of peers. In visual perception, all children's ability of Visual Closure increased. As a result of Trail Making Test conducted to confirm the improvement of children's visual tracking and visual-motor abilities, all children showed a decrease in performance time after the test compared to before. Conclusion : It was confirmed that sensory integration therapy combined with an eye tracker for developmental disabilities has effect on sensory processing and visual perception. It is expected to play an important role clinically as it can stimulate children's interest and motivation in line with recent technological improvements and the spread of smart devices.

Design and Analysis of Multiple Mobile Router Architecture for In-Vehicle IPv6 Networks (차량 내 IPv6 네트워크를 위한 다중 이동 라우터 구조의 설계와 분석)

  • Paik Eun-Kyoung;Cho Ho-Sik;Choi Yang-Hee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.43-54
    • /
    • 2003
  • As the demand for ubiquitous mobile wireless Internet grows, vehicles are receiving a lot of attention as new networking platforms. The demand for 4G all-IP networks encourages vehicle networks to be connected using IPv6. By means of network mobility (NEMO) support, we can connect sensors, controllers, local ,servers as well as passengers' devices of a vehicle to the Internet through a mobile router. The mobile router provides the connectivity to the Internet and mobility transparency for the rest of the mobile nodes of an in-vehicle nv6 network. So, it is .important for the mobile router to assure reliable connection and a sufficient data rate for the group of nodes behind it. To provide reliability, this paper proposes an adaptive multihoming architecture of multiple mobile routers. Proposed architecture makes use of different mobility characteristics of different vehicles. Simulation results with different configurations show that the proposed architecture increases session preservation thus increases reliability and reduces packet loss. We also show that the proposed architecture is adaptive to heterogeneous access environment which provide different access coverage areas and data rates. The result shows that our architecture achieves sufficient data rates as well as session preservation.

  • PDF

Overlay Multicast for File Distribution using Virtual Sources (파일전송의 성능향상을 위한 다중 가상소스 응용계층 멀티캐스트)

  • Lee Soo-Jeon;Lee Dong-Man;Kang Kyung-Ran
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.289-298
    • /
    • 2006
  • Algorithms for application-level multicast often use trees to deliver data from the source to the multiple receivers. With the tree structure, the throughput experienced by the descendant nodes will be determined by the performance of the slowest ancestor node. Furthermore, the failure of an ancestor node results in the suspension of the session of all the descendant nodes. This paper focuses on the transmission of data using multiple virtual forwarders, and suggests a scheme to overcome the drawbacks of the plain tree-based application layer multicast schemes. The proposed scheme elects multiple forwarders other than the parent node of the delivery tree. A receiver receives data from the multiple forwarders as well as the parent node and it can increase the amount of receiving data per time unit. The multiple forwarder helps a receiver to reduce the impact of the failure of an ancestor node. The proposed scheme suggests the forwarder selection algorithm to avoid the receipt of duplicate packets. We implemented the proposed scheme using MACEDON which provides a development environment for application layer multicast. We compared the proposed scheme with Bullet by applying the implementation in PlanetLab which is a global overlay network. The evaluation results show that the proposed scheme enhanced the throughput by 20 % and reduced the control overhead over 90 % compared with Bullet.

Design and Implementation of Web Attack Detection System Based on Integrated Web Audit Data (통합 이벤트 로그 기반 웹 공격 탐지 시스템 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.73-86
    • /
    • 2010
  • In proportion to the rapid increase in the number of Web users, web attack techniques are also getting more sophisticated. Therefore, we need not only to detect Web attack based on the log analysis but also to extract web attack events from audit information such as Web firewall, Web IDS and system logs for detecting abnormal Web behaviors. In this paper, web attack detection system was designed and implemented based on integrated web audit data for detecting diverse web attack by generating integrated log information generated from W3C form of IIS log and web firewall/IDS log. The proposed system analyzes multiple web sessions and determines its correlation between the sessions and web attack efficiently. Therefore, proposed system has advantages on extracting the latest web attack events efficiently by designing and implementing the multiple web session and log correlation analysis actively.

Method to Support Handover for Service Continuity based on IMS in Wireless LAN (무선랜 환경에서 서비스 연속성 지원을 위한 IMS 기반 핸드오버 지원 방안)

  • Kim, Kam-Yong;Kim, Hwa-Suk;Choi, Seong-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.79-87
    • /
    • 2010
  • This paper proposes a L3 handover method to minimize packet loss for supporting service continuity to IMS Terminal which has a single WLAN interface. The existing IMS based handover solution is able to support handover between different access networks in case that a terminal has multiple interfaces. That is, WLAN terminals need multiple interfaces to connect with one or more access networks. This proposed method configures IP address for the terminal in target WLAN previously by using Candidate Access Router Discovery(CARD) mechanism. Also, in the proposed method, service continuity server performs L3 connection establishment in target WLAN and registration to IMS server instead of the terminal. And then session control mechanism based on SIP is performed to support service continuity. We analyzed handover latency and signaling cost in the proposed method and existing method to show the improved performance by the proposed method.

A Secure Health Data Transmission Protocol Using Identity-Based Proxy Re-Encryption in Remote Healthcare Monitoring System (원격건강정보 모니터링 시스템에서 신원기반 프록시 재암호화 기법을 이용한 건강정보 전송 보안 프로토콜)

  • Noh, Si-Wan;Park, Youngho;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.197-202
    • /
    • 2017
  • The remote healthcare monitoring system enables a doctor to diagnose and monitor patient's health problem from a distance. Previous researches have focused on key establishment method between a patient and a particular doctor to solve personal health information disclosure problem in data transmission process. However, when considering a misdiagnosis of doctor, the result of a diagnosis by a many doctors is more reliable. In previous work, in order to select multiple doctors, patient should generate shared key for each chosen doctor and perform many times encryptions. Therefore, in this paper, we propose a secure data transmission protocol for receiving diagnosis from multiple doctors using identity-based proxy re-encryption scheme. In proposed protocol, a patient don't need key management work for session key. Also, monitoring server performs re-encryption process on behalf of patient. So, we can reduce computational burden of patient in previous work.

Performance Analysis of QoS control scheme for PoC services with multiple sessions under the radio channel environment (무선채널을 포함한 다중세션 품질제어에 의한 PoC서비스의 QoS보장 절차의 제안 및 성능분석)

  • Cho, Mi-Jin;Kim, Jeong-Ho;Lee, Ji-Hye;Kim, Wuk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.122-129
    • /
    • 2009
  • In this paper, we have proposed the QoS (quality of services) control scheme which can adjust data transfer rates of the session participants in response to their radio channel conditions under the time-varying propagation radio environment. The outage probability is selected as the performance index in order to compare the performance of the proposed scheme with the conventional QoS control scheme. The outage probability of the single and multiple paths is mathematically derived here and its numerical results are investigated. The results show that the significant performance improvement can be obtained compared with the conventional scheme and also the diversity gain can improve the radio link outage as the degrees of the multipath diversity increases. Therefore the overall performance improvement in terms of the QoS of the outage probability can be significantly be achieved by applying the proposed scheme.