• Title/Summary/Keyword: packet data

Search Result 1,636, Processing Time 0.025 seconds

A Method for Detecting Unauthorized Access Point over 3G Network (3G망을 사용하는 인가되지 않은 AP 탐지 방법)

  • Kim, I-luk;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.259-266
    • /
    • 2012
  • Malicious rogue AP has been used for variety attacks such as packet sniffing and Man-In-The-Middle Attack. It is used for the purpose of data leakage via 3G network within companies, and the unauthorized AP could be a reason of security incidents even though it is not intended. In this paper, we propose the method for detecting unauthorized access point over 3G networks throughout the RTT (Round Trip Time) value for classification. Through the experiments, we show that the method can classify the AP which is installed by normal way and the AP over 3G networks successfully.

Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks

  • Sha, Yan;Hu, Jufeng;Hao, Shuang;Wang, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3008-3028
    • /
    • 2022
  • In this paper, we investigate traffic scheduling for a delay-sensitive multi-hop relay network, and aim to minimize the priority-based end-to-end delay of different data packet via joint relay selection, subcarrier assignment, and power allocation. We first derive the priority-based end-to-end delay based on queueing theory, and then propose a two-step method to decompose the original optimization problem into two sub-problems. For the joint subcarrier assignment and power control problem, we utilize an efficient particle swarm optimization method to solve it. For the relay selection problem, we prove its convexity and use the standard Lagrange method to deal with it. The joint relay selection, subcarriers assignment and transmission power allocation problem for each hop can also be solved by an exhaustive search over a finite set defined by the relay sensor set and available subcarrier set. Simulation results show that both the proposed routing scheme and the resource allocation scheme can reduce the average end-to-end delay.

SWITCH: SDN-WLAN Integrated Handover Scheme for QoS-Guaranteed Mobile Service

  • Kim, Youngjun;Kyung, Yeunwoong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3680-3693
    • /
    • 2022
  • The handover procedure of IEEE 802.11 wireless local area networks (WLANs) introduces significant delay, which can degrade the quality of service (QoS) especially for delay-sensitive applications. Although studies have been conducted to support handover in SDN-based WLAN, there is no research to reduce the channel scanning procedure that takes up the most delay time in the handover process. The channel scanning procedure is essential to determine the appropriate access point (AP). To mitigate this problem, this paper proposes a SWITCH: SDN-WLAN integrated handover scheme for QoS-Guaranteed mobile service. In SWITCH, each AP periodically broadcasts beacon frames through different channels in a predetermined order that includes the operating channel information of the AP. This allows mobile stations (MSs) to receive the beacon frames of nearby APs, and therefore they can determine the appropriate APs for handover without the channel scanning procedure. By reporting the information of the newly moved AP to the SDN controller, a flow rule is installed in advance to provide fast handover, and packet loss is reduced by buffering data destined for MS. In addition, the proposed scheme can adaptively operate SWITCH to consider the user location and QoS requirement of flow to save radio resource overhead. Performance evaluation results demonstrate that SWITCH can reduce the handover delays, flow table utilization ratio and radio resource overhead while improving the network throughput.

Joint Virtual User Identification and Channel Security En/Decoding Method for Ad hoc Network

  • Zhang, Kenan;Li, Xingqian;Ding, Kai;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.241-247
    • /
    • 2022
  • Ad hoc network is self-organized network powered by battery. The reliability of virtual user identification and channel security are reduced when SNR is low due to limited user energy. In order to solve this problem, a joint virtual user identification and channel security en/decoding method is proposed in this paper. Transmitter-receiver-based virtual user identification code is generated by executing XOR operation between orthogonal address code of transmitter and pseudo random address code of receiver and encrypted by channel security code to acquire orthogonal random security sequence so as to improve channel security. In order to spread spectrum as well as improve transmission efficiency, data packet is divided into 6-bit symbols, each symbol is mapped with an orthogonal random security sequence. Subspace-based method is adopted by receiver to process received signal firstly, and then a judgment model is established to identify virtual users according to the previous processing results. Simulation results indicate that the proposed method obtains 1.6dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Hierarchical Location Mobility Management using MobilityManagement Points in IP networks

  • Park, Chul Ho;Oh, Sang Yeob
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.1069-1074
    • /
    • 2022
  • IP mobility can be handled in different layers of the protocol. Mobile IP has been proposed to handle the mobility of Internet hosts in the network layer. Recently, a new method based on the SIGMA mobility architecture has been proposed to support mobility management with reduced packet loss and latency. The location management structure is not suitable for frequent mobile handover due to the high mobility of the user with this transport layer solution. In this paper, we propose a location management optimization method in a mobile communication network by applying hierarchical location management using MMPs(Mobility Management Points) for transport layer mobility management. Therefore, we propose an efficient hierarchical mobility management structure even between heterogeneous wireless networks using MMPs for the probability that a mobile terminal can change multiple location areas between two messages and calls. The proposed method shows reduction in location update cost and data retrieval cost using MMPs, and as opposed to mobility appearing in time intervals with the minimum cost required to reach 90% of the stabilized cost, the mobility location update search, location It was found that the message processing cost per area was reduced.

An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 에너지 효율적인 Token Escrow 트리 기반의 보안 라우팅 프로토콜)

  • Lee, Jae Sik;Kim, Sung Chun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.623-626
    • /
    • 2010
  • 최근 무선 네트워크 기술이 점차 각광을 받으면서 다양한 애드 혹 환경에서의 라우팅 프로토콜이 제안되고 있다. 하지만 애드 혹 네트워크라는 환경의 특성 상 보안상 취약한 문제점을 가지고 있으며, 기존의 유선 네트워크 환경에서 제안되었던 보안 라우팅 프로토콜을 적용시키기 힘들다는 문제점이 있다. 이에 따라 보안성을 보완한 새로운 애드 혹 라우팅 프로토콜이 제안되었지만 다양한 무선 네트워크 환경의 변화에 유동적으로 대응하기 힘들고 보안적인 측면에 집중을 한 나머지 에너지소모 측면에서는 단점을 노출하고 있다. 본 논문에서는 다양한 애드 혹 네트워크 환경에 적용 가능하고, 기존의 보안 라우팅 프로토콜에 비해 에너지 효율적인 보안 라우팅 프로토콜을 제안하고자 한다. 보안 정보의 보호를 위해 Tree 구조를 도입하고 보안 단계를 통한 Multi-path를 구성하여 악의적인 노드의 Dropping Attack에 대비하고, 예기치 못한 Data Packet의 손실에 대해서도 효율적으로 대처하게 하였다. 실험 결과 악의적인 노드가 존재하는 네트워크 환경에서 기존의 애드 혹 네트워크 보안 라우팅 프로토콜보다 21%정도의 패킷 전송 성공률을 높일 수 있었으며 또한 각 노드의 에너지를 균등하게 소모함으로써 전체적인 네트워크의 생존시간이 연장되는 것을 확인할 수 있었다.

QoS Provisioning for Forced Inter-System Handover (강제 시스템간 핸드오버 시 QoS 보장 방안)

  • Lee, Moon-Ho;Lee, Jong-Chan
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.89-98
    • /
    • 2010
  • In the heterogeneous system of various wired or wireless network with IP-based backbone, the continuities of agreedon QoS for multimedia services should be guaranteed regardless of network types and terminal mobility through seamless vertical handover. This paper proposes a QoS provisioning mechanism called D-ISHO which guarantees the continuities of agreed-on QoS and seamless for multimedia services by considering both such characteristics as delay, loss rate and jitter per each service and such status as available band-width, call arrival rate and data transmission rate during the vertical handover. Simulation is done for performance analysis with the measure of handover failure rate and packet loss rate.

A Study on Impementing a Raspberry Pi-based IoT Gateway using the Mobius Platform (Mobius platform을 활용한 Raspberry PI 기반 IoT Gateway 구현에 관한 연구)

  • So-Haeng Lee;Kwon-Yeon Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.809-816
    • /
    • 2023
  • The purpose of this study is to implement a device using the Raspberry Pi that can transmit and supervise data between devices and servers using the oneM2M standard platform, Mobius. Operating under the same concept as a Gateway or Router, this device performs the role of forwarding packets sent from end nodes to other networks. Theoretical functionality has been achieved to concurrently connect and supervise up to 65536 devices. The communication methods for end nodes connected to the Gateway include ZigBee and WiFi, and for long-distance communication, tests were conducted using LoRa modules.

Efficient Channel Scheduling Technique Using Release Time Unscheduled Channel Algorithm in OBS WDM Networks (OBS WDM 망에서 비 할당된 채널 개방시간을 이용한 효율적인 채널 스케줄링 기법)

  • Cho Seok-man;Kim Sun-myeng;Choi Dug-kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10A
    • /
    • pp.912-921
    • /
    • 2005
  • Optical burst switching(OBS) is a promising solution for building terabit optical routers and realizing If over WDM. Channel scheduling Algorithm for reduce contention is one of the major challenges in OBS. We address the issue of how to provide basic burst channel scheduling in optical burst switched WDM networks with fiber delay lines(FDLs). In OBS networks the control and payload components or a burst are sent separately with a time gap. If CHP arrives to burst switch node, because using scheduling algorithm for data burst, reservation resources such as wavelength and transmit data burst without O/E/O conversion, because contention and void between burst are happened at channel scheduling process for data burst that happened the link utilization and bust drop probability Existent proposed methods are become much research to solve these problems. Propose channel scheduling algorithm that use Release Time of bust to emphasize clearance between data and data dissipation that is happened in data assignment in this treatise and maximize bust drop probability and the resources use rate (RTUC : Release Time Unscheduled Channel). As simulation results, Confirmed that is more superior in terms of data drop and link utilization than scheduling algorithm that is proposed existing. As simulation results, confirmed improved performance than scheduling algorithm that is proposed existing in terms of survival of burst, efficiency resource and delay. However, In case load were less, degradation confirmed than existent scheduling algorithm relatively, and confirmed that is superior in data drop aspect in case of load increased.

A Fast Error Concealment Using a Data Hiding Technique and a Robust Error Resilience for Video (데이터 숨김과 오류 내성 기법을 이용한 빠른 비디오 오류 은닉)

  • Kim, Jin-Ok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.2
    • /
    • pp.143-150
    • /
    • 2003
  • Error concealment plays an important role in combating transmission errors. Methods of error concealment which produce better quality are generally of higher complexity, thus making some of the more sophisticated algorithms is not suitable for real-time applications. In this paper, we develop temporal and spatial error resilient video encoding and data hiding approach to facilitate the error concealment at the decoder. Block interleaving scheme is introduced to isolate erroneous blocks caused by packet losses for spatial area of error resilience. For temporal area of error resilience, data hiding is applied to the transmission of parity bits to protect motion vectors. To do error concealment quickly, a set of edge features extracted from a block is embedded imperceptibly using data hiding into the host media and transmitted to decoder. If some part of the media data is damaged during transmission, the embedded features are used for concealment of lost data at decoder. This method decreases a complexity of error concealment by reducing the estimation process of lost data from neighbor blocks. The proposed data hiding method of parity bits and block features is not influence much to the complexity of standard encoder. Experimental results show that proposed method conceals properly and effectively burst errors occurred on transmission channel like Internet.