• Title/Summary/Keyword: mutual networking

Search Result 43, Processing Time 0.027 seconds

eBPF Technology Trends for Networking and Security in Cloud-native (클라우드 네이티브 환경에서 네트워킹 및 보안을 위한 eBPF 기술 동향)

  • Shin, Y.Y.;Shin, J.S.;Park, C.H.;Park, J.G.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.62-69
    • /
    • 2022
  • In a situation where applications determine business competitiveness, they cannot respond to varying customer requirements without the cloud's flexibility and scalability. Companies have begun seeking ways to enjoy the advantages of the cloud fully, and the concept of "Cloud Native" is emerging as a solution to the problem. Cloud Native is now a target of interest in the market. Microservice and serverless functions can play a vital role in cloud-native architecture. Microservice arranges applications into various independent services, each offering certain functionality through mutual networking. eBPF is attracting attention as a cloud-native networking solution that quickly supports microservice features that repeat creation/deletion. This study identifies the characteristics of eBPF-based networking and evaluates cloud-native networking and secure networking using eBPF.

A Comparison of Daedeok Innopolis Cluster with the San Diego Biotechnology Cluster

  • Kim, Sang-Tae;An, Gi-Don
    • World Technopolis Review
    • /
    • v.1 no.2
    • /
    • pp.118-128
    • /
    • 2012
  • This paper suggests policy implications for Daedeok Innopolis (DI) in Daejeon by comparing the development and problems of DI with the San Diego biotechnology cluster. DI has strengthened its capabilities for technology commercialization and business activities after having created and managed by the Korean central government. While DI has been successful in increasing the number of institutes, researchers, research activities, however, its dynamism is not rigorous enough to be a regional innovative system. San Diego's scientific and entrepreneurial community shows the importance of formulating social and spatial contexts for mutual interactions and engagements. In San Diego, UCSD and networking organizations, especially CONNECT, are central in promoting interactions and communications between regional constituents including entrepreneurs, academics and local governments. The mechanisms of San Diego biotechnology imply that DI should provide more attention to designing and developing social and geographical space that can unleash the creative power of social interactions. To build an innovative regional system, DI needs to renovate its space, public-private relationship and networking platforms.

Innovation Cluster and Regional Development In Daejeon Regional (대전지역 혁신클러스터와 지역발전)

  • Ryu, Duk-Wi
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.3
    • /
    • pp.103-122
    • /
    • 2007
  • Innovation clusters developed or evolved around a specific region IS the key element of national innovation system and determine national competitiveness. Recognizing the importance of innovation clusters, Korean government has made "Daedeok Special R&D Zone" in 2005. This paper examines the success factors of famous Cluster in advanced countries and China, and proposes the strategy for regional development in Daejeon through boosting Daedeok Innovation Cluster. Although 30.5% of government R&D investment is being concentrated in Daedeok along with 10% of the country's doctorate degree holders, it is lack of increasing revenue by linking corporate R&D with a creative and challenging entrepreneur spirit. The core of the innovation cluster is the integration and mutual networking of the main participants. This paper suggests strategies for developing as a world class innovation cluster, global networking and clustering, venture ecosystem formation, commercialization the knowledge by interacting with market. It also explains the necessity of regional integration for cluster to cluster linkages in the East Asia Region.

  • PDF

Improving an RFID Mutual Authentication Protocol using One-time Random Number (개선한 일회성 난수를 이용한 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.90-97
    • /
    • 2009
  • In 2008, Kim-Jun proposed a RFID mutual authentication protocol using one-time random number that can withstand malicious attacks by the leakage of important information and resolve the criminal abuse problems. Through the security analysis, they claimed that the proposed protocol can withstand various security attacks including the replay attack. However, this paper demonstrates that Kim-Jun' s RFID authentication protocol still insecure to the replay attack. In addition, this paper also proposes a simply improved RFID mutual authentication protocol using one-time random number which not only provides same computational efficiency, but also withstands the replay attack.

Formalizing the Role of Social Capital on Individuals' Continuous Use of Social Networking Sites from a Social Cognitive Perspective

  • Guo, Yu;Li, Yiwei;Ito, Naoya
    • Asian Journal for Public Opinion Research
    • /
    • v.1 no.2
    • /
    • pp.90-102
    • /
    • 2014
  • By integrating useful insights from social cognitive theory and social capital theory, we aim to develop a model for better understanding people's behaviors related to the use of social networking sites (SNSs) and formalize the role of social capital in individuals' continuous SNS use. Propositions that emphasize the triadic interactive relationships among environmental, personal, and behavioral factors were highlighted in this study. After reviewing previous studies, in this paper we proposed the following: (1) the causation between SNS use and individuals' perceived social capital might be mutual; social capital may not only be the result of media selectivity, but could also be an essential stimulus initiating the start of using SNSs; (2) the influences of SNSs use on the generation of individuals' online social capital might be conditional upon particular patterns of use; (3) both the level of dependence on SNSs and the differentiated patterns of SNSs use vary according to individuals' perceived offline social capital and their personal characteristics, for instance, personality or self-construal, and social anxiety.

Design of RFID Mutual Authentication Protocol using One Time Random Number (일회성 난수를 이용한 안전한 RFID 상호인증 프로토콜 설계)

  • Kim, Dae-Jung;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2008
  • Recently, researched RFID authentication protocols still have vulnerability of attack, such as location tracking attack, replay attack. spoofing attack etc. This paper designed method of making one time random number in DB server side unlike previously researched protocols, and it protects RFID communication from location tracking, replay attack and spoofing attack.

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.

Introducing on Automatic Check-Out and Bookshelf System of Public Libraries by Japanese Case Study (일본 사례연구를 통한 공공도서관의 자동화 출납서가시스템 도입방안)

  • Jung, Jin-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.237-245
    • /
    • 2008
  • Characteristics of Japanese public library recently has been changed to mutual networking between libraries, complex use of data, and long stay of users. Such change requires new service and contents. Also, in Korea, it is circumstance that interest of library's contents rise politically. And under government leading by BTL project, various libraries are increasing all over the country fast such as public library, extension of existing school library and the small library, etc. In this research, space composition of library, automatic check-out & bookshelf system, and mutual networking between libraries was analyzed by selected 3 libraries (central library of Chiba city, Tomisato and Ichigawa city library) of Chiba area and find applicable contents to our library system.

The Solidarity Networking between Labor and Civil Society Movements: the Case Study of Hope Bus (시민사회의 연대운동 네트워킹 사례연구: 희망버스를 중심으로)

  • Lee, Byoung-Hoon;Kim, Jindu
    • Korean Journal of Labor Studies
    • /
    • v.23 no.2
    • /
    • pp.109-139
    • /
    • 2017
  • In light that solidarity movements become significant under the situation of 'labor and labor movement' crisis, our study pays attention to the fact that the Hope Bus campaigns made remarkable achievements, and aims to figure out how those campaigns were successful, by focusing on their solidarity networking. The successful operating conditions of solidarity networking in the Hope Bus campaigns are examined in three aspects - the conditions of triggering, forming, and activating. The solidarity networking of Hope Bus campaigns were mainly triggered by the injustice of layoffs by Hanjin Heavy Industry, aerial protest by Jin-sook Kim, and the tragic symbol of the protest site (Crane no. 85). The solidarity movement of Hope Bus could be formed by the mutual trust and cohesive team-building of key network brokers, their utilization and expansion of social movement networks, and massive ripple effect of SNS-mediated communication. The solidarity networking of Hope Bus was effectively activated by open and de-hierarchical operations of the central planning group, active solidarity activities of participant groups, and the provision of 'heuristic experience' for developing the sensibility to labor solidarity. The virtuous combination of those three operating conditions leads to the building of unified forces among social movements, massive civil participation, and meaningful movement outcomes, through the solidarity networking of Hope Bus campaigns.

A Secure and Efficient Remote User Authentication Scheme for Multi-server Environments Using ECC

  • Zhang, Junsong;Ma, Jian;Li, Xiong;Wang, Wendong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2930-2947
    • /
    • 2014
  • With the rapid growth of the communication technology, intelligent terminals (i.e. PDAs and smartphones) are widely used in many mobile applications. To provide secure communication in mobile environment, in recent years, many user authentication schemes have been proposed. However, most of these authentication schemes suffer from various attacks and cannot provide provable security. In this paper, we propose a novel remote user mutual authentication scheme for multi-server environments using elliptic curve cryptography (ECC). Unlike other ECC-based schemes, the proposed scheme uses ECC in combination with a secure hash function to protect the secure communication among the users, the servers and the registration center (RC). Through this method, the proposed scheme requires less ECC-based operations than the related schemes, and makes it possible to significantly reduce the computational cost. Security and performance analyses demonstrate that the proposed scheme can solve various types of security problems and can meet the requirements of computational complexity for low-power mobile devices.