• Title/Summary/Keyword: packet key

Search Result 233, Processing Time 0.023 seconds

Public Key based GPRS Authentication Protocol and Key management (공개키 기반의 GPRS 인증 프로토콜과 Key 관리에 관한 연구)

  • Kim, Sung-Yong;Song, Yoon-Kyung;Choi, Hyun;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.117-120
    • /
    • 2003
  • GPRS(General Packet Radio Service) 서비스는 circuit 기반의 GSM(Global System for Mobile Communication)의 기본 망구조를 이용하여 packet 서비스를 지원하도록 변형시킨 모델이다. 기본적으로 GPRS는 GSM의 많은 부분을 계승하여 서비스를 지원하고 있기 때문에 GSM이 가지고 있던 문제점을 그대로 이어받게 되었는데, 본 논문에서는 사용자 인증 프로시져등에서 문제시 될 수 있는 부분들에 대해 살펴보고, 이를 보완 할 수 있는 방법으로 공개키의 암호화 모드와 인증 모드를 사용한 인증 프로시져와 시스템 구조를 소개하고자 한다. 또한 공개키 구조의 인증을 사용함으로써 필요로 하게 되는 키 관리에 대한 방법을 제시하고 앞으로 해결해 나가야 될 문제에 대해 언급을 하고자 한다.

  • PDF

A New Dynamic Transmission-Mode Selection Scheme for AMC/HARQ-Based Wireless Networks

  • Ma, Xiaohui;Li, Guobing;Zhang, Guomei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5360-5376
    • /
    • 2017
  • In this paper, we study the cross-layer design for the AMC/HARQ-based wireless networks, and propose a new dynamic transmission-mode selection scheme to improve system spectrum efficiency. In the proposed scheme, dynamic thresholds for transmission-mode selection in each packet transmission and retransmission are jointly designed under the constraint of the overall packet error rate. Comparing with the existing schemes, the proposed scheme is inclined to apply higher modulation order at the first several (re)transmissions, which corresponds to higher-rate transmission modes thus higher average system spectrum efficiency. We also extend the cross-layer design to MIMO (Multi-input Multi-output) communication scenarios. Numerical results show that the proposed new dynamic transmission-mode selection scheme generally achieves higher average spectrum efficiency than the conventional and existing cross-layer design.

Priority Service Algorithm of Packet Switch for Improvement in QoS

  • Jung, Hae-Young;Lee, Heung-Jae;Choe, Jin-Kyu;Lee, Kyou-Ho
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.181-187
    • /
    • 2003
  • In high speed packet switching network, packet service by priority scheme prefer to QoS. Efficient packet service according to the priority scheme in high speed packet switch is a key point. Therefore development of priority service algorithm in the packet switch is very important. In this paper, we proposed W-iSLIP algorithm that service time take queue length into consideration and compared the proposed W-iSLIP algorithm to other previous proposed algorithm through simulation. Simulation results show 2.6% performance elevation in average delay, and 34.6% performance elevation in priority service.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).

All-optical packet switching system : clock extraction as a key technology (완전 광 패킷 스위칭 시스템 : 클럭 추출 핵심 기술)

  • 이혁재;원용협
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.10
    • /
    • pp.79-88
    • /
    • 2003
  • We demonstrate a novel all-optical packet switching system that is suitable for optical ring networks. For the demonstration, video signals are encoded into optical packets which are composed of header and payload. The optical packets are all-optically processed at a switching node based on all-optical header processor, packet-level clock extraction, bit-level clock extraction, all-optical data format converter and so on.

Performance Analysis of Forwarding Engine in MPLS Network (MPLS 망에서의 포워딩 엔진에 대한 성능 분석)

  • Lee, Jae-Seop;Ryu, Ho-Young;Im, Jun-Mook;Suh, Jae-Joon
    • IE interfaces
    • /
    • v.14 no.3
    • /
    • pp.263-271
    • /
    • 2001
  • MPLS LER is located at the boundary of MPLS domain as an ingress or an egress router and plays a role in connecting with the existing Internet. Among the components of the MPLS LER, forwarding engine(FE) is a key device which assigns a label to an IP packet by analyzing the destination address of its header in order to enter the MPLS domain, or restructures the cells from MPLS domain into IP packet by reversely processing. In this paper, we investigate the design of FE by analyzing the traffic performance of its components and estimate the IP packet processing capacity of a FE using queueing model and simulation. It is found that the maximum IP packet processing capacity of the Forwarding Engine is about 150,000 packets/sec.

  • PDF

Multiple-Packet Reception MAC Protocol Applying Pulse/Tone Exchange in MIMO Ad-Hoc Networks

  • Yoshida, Yuto;Komuro, Nobuyoshi;Ma, Jing;Sekiya, Hiroo
    • Journal of Multimedia Information System
    • /
    • v.3 no.4
    • /
    • pp.141-148
    • /
    • 2016
  • This paper proposes a medium access control (MAC) protocol for multiple-input multiple-output (MIMO) ad-hoc networks. Multiple-packet receptions in MIMO systems have attracted as a key technique to achieve a high transmission rate. In the conventional protocols for multiple-packet receptions, timing offsets among multiple-frame transmissions cause frame collisions induced by hidden nodes, which degrades network performance. In the proposed protocol, transmission synchronization among hidden nodes can be achieved by applying pulse/tone exchanges. By applying the pulse/tone exchanges, multiple-packet receptions among hidden nodes can be achieved, which enhances network throughputs compared with the conventional protocol. Simulation results show effectiveness of the proposed protocol.

A novel method to aging state recognition of viscoelastic sandwich structures

  • Qu, Jinxiu;Zhang, Zhousuo;Luo, Xue;Li, Bing;Wen, Jinpeng
    • Steel and Composite Structures
    • /
    • v.21 no.6
    • /
    • pp.1183-1210
    • /
    • 2016
  • Viscoelastic sandwich structures (VSSs) are widely used in mechanical equipment, but in the service process, they always suffer from aging which affect the whole performance of equipment. Therefore, aging state recognition of VSSs is significant to monitor structural state and ensure the reliability of equipment. However, non-stationary vibration response signals and weak state change characteristics make this task challenging. This paper proposes a novel method for this task based on adaptive second generation wavelet packet transform (ASGWPT) and multiwavelet support vector machine (MWSVM). For obtaining sensitive feature parameters to different structural aging states, the ASGWPT, its wavelet function can adaptively match the frequency spectrum characteristics of inspected vibration response signal, is developed to process the vibration response signals for energy feature extraction. With the aim to improve the classification performance of SVM, based on the kernel method of SVM and multiwavelet theory, multiwavelet kernel functions are constructed, and then MWSVM is developed to classify the different aging states. In order to demonstrate the effectiveness of the proposed method, different aging states of a VSS are created through the hot oxygen accelerated aging of viscoelastic material. The application results show that the proposed method can accurately and automatically recognize the different structural aging states and act as a promising approach to aging state recognition of VSSs. Furthermore, the capability of ASGWPT in processing the vibration response signals for feature extraction is validated by the comparisons with conventional second generation wavelet packet transform, and the performance of MWSVM in classifying the structural aging states is validated by the comparisons with traditional wavelet support vector machine.

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.