• Title/Summary/Keyword: user session

Search Result 309, Processing Time 0.03 seconds

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

A Development of Mobile IPTV Service Platform for User and Service Session Mobility Guarantee (사용자와 서비스 세션 이동성 보장을 위한 모바일 IPTV 서비스 플랫폼 개발)

  • Jang, Ji-Won;Kim, Geun-Hyung
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.87-96
    • /
    • 2009
  • Digital Broadcast Service is being very popular and the delivery mechanism for digital broadcast content through IP network has progressed constantly, due to the advance of video and audio compression and network technologies. From these trends, in Korea, the commercial IPTV service starts in this year after the law related to IPTV is enacted last year. Since IPTV service, which integrates broadcast and communication services, can give an infrastructure for fusion of communication and interactive multimedia data service, IPTV service is attractive. Recently, by the advent of various wireless connection technologies and the mobile devices of high capability, Mobile IPTV, which has an advantage of not only IPTV but also mobile TV, has gained much interest. In this paper, we review a necessary ingredient for Mobile IPTV in the next generation wired/wireless convergence network environment which consists of heterogeneous wireless access networks. In addition, we propose the scheme for user mobility and service session mobility management using RTSP protocol and introduce the service gateway concept to guarantee the extension of IPTV service platform.

  • PDF

The User Terminal Registration Method in Proximity Using the Virtual ISIM for Providing Service Continuity (가상 ISIM을 통한 서비스 연속성 제공을 위한 근접 단말 등록 방법)

  • Yim, Jong-Choul;Kim, Sang-Ha;Keum, Chang-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.529-540
    • /
    • 2015
  • The NGN should support an ubiquitous environment in which users can use multiple devices. Especially, services should be provided to users in a seamless manner across multiple devices which are dynamically found in users' vicinity. Therefore, supporting service continuity is essential in the NGN. Currently the IMS, which is a session control layer for the NGN, deals with session control procedures in detail for service continuity. However, the IMS provides limited methods how users can find target terminals for transferring the session. The target terminals tend to be located near in user's physical location, and could be shared among different users. For providing better service experience in the NGN, The NGN needs to encompass methods to enable for users to use the dynamically-found terminals in users' vicinity seamlessly. In this paper, we introduce a novel registration method based on virtual ISIM by which the target terminals in user's vicinity can register themselves to the IMS, and also we discuss how service continuity is supported.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Using Transaction Logs to Better Understand User Search Session Patterns in an Image-based Digital Library (이미지 기반 디지털 도서관에서 이용자 검색 패턴의 효과적 이해를 위한 트랜잭션 로그 데이터 분석)

  • Han, Hye-Jung;Joo, Soohyung;Wolfram, Dietmar
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.1
    • /
    • pp.19-37
    • /
    • 2014
  • Server transaction logs containing complete click-through data from a digital library of primarily image-based documents were analyzed to better understand user search session behavior. One month of data was analyzed using descriptive statistics and network analysis methods. The findings reveal iterative search behaviors centered on result views and evaluation and topical areas of focus for the search sessions. The study is novel in its combined analytical techniques and use of click-through data for image collections.

The Issue-network: A Study of New User Research Method in the Context of a Car Navigation Design (이슈 네트워크를 활용한 사용자 조사 방법론: 자동차 내비게이션 디자인을 중심으로)

  • Kim, Dongwhan;Lee, Dongmin;Ha, Seyong;Lee, Joonhwan
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.502-514
    • /
    • 2019
  • Existing user research methods are subject to a variety of research conditions such as the amount and variety of data collected and the expertise of the facilitator of a group research session. In this study, we propose a new user research methodology using an 'Issue-Network' system, which is developed based on the theory and methods of social network analysis. The Issue-Network is designed to define problem spaces from the issues raised by users in a group research session in a form of an interactive network graph. The system helps to break out of ordinary perspectives of looking into problem spaces by enabling an alternative and more creative way to connect issues in the network. In this study, we took a case study of generating the Issue-Network on behalf of the problems raised by users in various driving-related situations. We were able to draw three navigation usage scenarios that cover relatively important problem spaces: safety and being ready for the unexpected, smart navigation and notifications, making use of the spare time. In the future, the Issue-Network system is expected to be used as a tool to identify problems and derive solutions in group research sessions involving a large number of users.

The Performance Analysis for Call Processing of the IMS Based Multimedia Service In BcN (BcN에서 IMS기반 멀티미디어 서비스의 호 처리 성능 분석)

  • Lee, Dong-Hyeon;Kim, Hyun-Jong;Choi, Seong-Gon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.117-124
    • /
    • 2008
  • In this paper, the call setup performance of the CSCF(Call Session Control function) that manages the session control in providing the IMS(IP Multimedia subsystem)-based multimedia service in the BcN(Broadband convergence Network) is analyzed. While the performance related with the call/session of the SIP-Based voice service is analysed, the study for the call recessing performance of the IMS-based multimedia service is insufficient. In this paper, as, the processing capacity and subscriber number of CSCF were changed, the call setup delay time according to the session setup procedure of IMS was measured using the M/M/1 queuing model and OPNET simulation. The experimental results show that the sudden increased delay showed up in case the session establishment requirement ratio of total users over 13% of the CSCF processing capacity. Therefore, the user number and capacity of CSCF suitable for the session establishment delay threshold can be calculated or estimated.

An efficient session management scheme for low-latency communications in 5G systems

  • Kim, Jae-Hyun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • In this paper, we propose an efficient session management scheme for low-latency communications in 5G systems. The main idea of the proposed scheme is to prevent unnecessary reattempt signalling overhead when the session establishment for low-latency communications fails. Also, this method avoids network resource waste and battery drain of mobile devices. If a UE(User Equipment) fails to establish an Always-on PDU session for low-latency communications with the 5G systems because of network failure or resource unavailability, the proposed method prevents the UE's re-establishment of the Always-on PDU session by the specific information in the NAS(Non-Stratum) message from the 5G systems. Through simulation, we show that the proposed efficient session management scheme (ESMS) minimizes unnecessary signalling overhead and improves battery efficiency of mobile devices compared to existing legacy mechanism in 5G systems.

Cryptanalysis Of Two Remote User Authentication Schemes Using Smart Cards

  • Yoon Eun-Jun;Ryu Eun-Kyung;Jo Young-Woo;Yoo Kee-Young
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.152-154
    • /
    • 2004
  • In 2004, Ku-Chen proposed an improvement to Chien et al.'s scheme to prevent from some weaknesses. Lee et al. also proposed an improvement to Chien et al.'s scheme to prevent from parallel session attack. This paper, however, will demonstrate that Ku-Chen's scheme is still vulnerable to the parallel session attack and Lee et al.'s scheme is also vulnerable to masquerading server attack.

  • PDF

A Study on Smart-Card Based User Authentication (스마트카드 기반의 사용자 인증 기법에 관한 연구)

  • Lee, Jaeyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.27-33
    • /
    • 2018
  • User authentication scheme is a method for controlling unauthorized users' access to securely share the services and resources provided by the server and for verifying users with access rights. Initial user authentication scheme was based on passwords. Nowadays, various authentication schemes such as ID based, smart-card based, and attribute based are being researched. The study of Lee et al. suggested a user authentication scheme that provides forward secrecy and protects anonymity of users. However, it is vulnerable to attacks by outsiders and attackers who have acquired smart-cards. In this paper, we propose a modified smart-card authentication scheme to complement the weakness of the previous studies. The proposed user authentication scheme provides the security for the ID guessing attack and the password guessing attacks of the attacker who obtained the login request message and the user's smart-card.