Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Volume & Issues
Volume 35, Issue 12C - Dec 2010
Volume 35, Issue 12B - Dec 2010
Volume 35, Issue 12A - Dec 2010
Volume 35, Issue 11C - Nov 2010
Volume 35, Issue 11B - Nov 2010
Volume 35, Issue 11A - Nov 2010
Volume 35, Issue 10C - Oct 2010
Volume 35, Issue 10B - Oct 2010
Volume 35, Issue 10A - Oct 2010
Volume 35, Issue 9C - Sep 2010
Volume 35, Issue 9B - Sep 2010
Volume 35, Issue 9A - Sep 2010
Volume 35, Issue 8C - Aug 2010
Volume 35, Issue 8B - Aug 2010
Volume 35, Issue 8A - Aug 2010
Volume 35, Issue 7C - Jul 2010
Volume 35, Issue 7B - Jul 2010
Volume 35, Issue 7A - Jul 2010
Volume 35, Issue 6C - Jun 2010
Volume 35, Issue 6B - Jun 2010
Volume 35, Issue 6A - Jun 2010
Volume 35, Issue 5C - May 2010
Volume 35, Issue 5B - May 2010
Volume 35, Issue 5A - May 2010
Volume 35, Issue 4C - Apr 2010
Volume 35, Issue 4B - Apr 2010
Volume 35, Issue 4A - Apr 2010
Volume 35, Issue 3C - Mar 2010
Volume 35, Issue 3B - Mar 2010
Volume 35, Issue 3A - Mar 2010
Volume 35, Issue 2C - Feb 2010
Volume 35, Issue 2B - Feb 2010
Volume 35, Issue 2A - Feb 2010
Volume 35, Issue 1C - Jan 2010
Volume 35, Issue 1B - Jan 2010
Volume 35, Issue 1A - Jan 2010
Selecting the target year
A Novel Scheme for Efficient Interworking with MIPv6 Hosts in the PMIPv6 Network
Park, Jong-Won ; Min, Sang-Won ; Kim, Bok-Ki ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 373~379
In this paper, we propose a novel MAS algorithm to reduce the amount of signaling and data traffics. To notify an MIPv6 host of the proposed operation, we design a new binding registration function into the MAG, and suggest the modified RS and RA messages. The binding registration in the MAG instead of the LMA is accomplished to support the PMIPv6, whereas a 1-bit N flag in the RS and RA message indicates where the MAG supports the PMIPv6 or not. Our proposed algorithm has the advantage for MIPv6 hosts in the PMIPv6 network in the viewpoints of network utilization and performance. To show the verification and better performance of the MAS algorithm, we evaluate the amount of traffic and its related performance, and compares those with performance of the normal PMIPv6. These results show that our proposed algorithm can operate efficiently and give better performance for MIPv6 hosts in the PMIPv6 network.
Design and Implementation of Network Adaptive Streaming through Needed Bandwidth Estimation
Son, Seung-Chul ; Lee, Hyung-Ok ; Kwag, Yong-Wan ; Yang, Hyun-Jong ; Nam, Ji-Seung ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 380~389
Since the internet is intend to be the best effort service, the system that stream a large amount of high quality medias need a techniques to overcome the network status for implementation. In this paper, we design and implement a method that estimate quickly whether network permits the needed bandwidth of media and a method that control QoS through that. Presented system uses Relative One-Way Delay(ROWD) trend in the case of the former, and leverages temporal encoding among Scalable Video Coding(SVC) that is apt to apply real time comparatively in the case of the latter. The streaming server classifies the medias by real time to several rates and begins transmission from top-level and is reported ROWD trend periodically from the client. In case of the server reported only 'Increase Trend', the sever decides that the current media exceeds the available bandwidth and downgrades the next media level. The system uses probe packet of difference quantity of the target level and the present level for upgrading the media level. In case of the server reported only 'No Increase Trend' by the ROWD trend response of the probe packet from client, the media level is upgraded. The experiment result in a fiber to the home(FTTH) environment shows progress that proposed system adapts faster in change of available bandwidth and shows that quality of service also improves.
Effective IPTV Channel Control Algorithm Supporting Smooth Channel Zapping
Joo, Hyun-Chul ; Song, Hwang-Jun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 390~397
This paper presents an effective IPTV channel control algorithm considering network utilization and channel zapping time. The proposed algorithm keeps maximum average channel zapping time of each subscriber in the tolerable range with low network bandwidth usage by adjusting the type of each channel and the number of additional intra frames inserted into each channel. Finally, experimental results are provided to show the performance of the proposed algorithm.
A Performance Analysis of VoIP in the FMC Network to provide QoE for users
Lee, Kyu-Hwan ; Oh, Sung-Min ; Kim, Jae-Hyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 398~407
Due to increase of user requirement for various traffics and the advance of network technology, each distinct network has converge into FMC(Fixed Mobile Convergence) networks. However, we need to research the performance analysis of VoIP(Voice over Internet Protocol) in the FMC network to provide QoE for the voice user of FMC network. Therefore, this paper introduces the scenario which is the situation of voice quality degradation when a user uses VoIP to communicate with other users in the FMC network. Especially, this paper presents scenario in terms of the component of the network and finds the improvement point of voice quality. In the simulation results, three improvement points of voice quality are found as following: voice quality degradation by packet loss in the physical layer of the HSDPA network, by utilizing GGSN without QoS parameter mapping mechanism which is gateway between 3GPP and IP backbone, and by using non-QoS AP in the WLAN network.
Security Design for Efficient Detection of Misbehavior Node in MANET
Hwang, Yoon-Cheol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 408~420
On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.
A Security Model Analysis Adopt to Authentication State Information in IPTV Environment
Jeong, Yoon-Su ; Jung, Yoon-Sung ; Kim, Yong-Tae ; Park, Gil-Cheol ; Lee, Sang-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 421~430
Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.
A Malicious Process Control System for Protecting Servers from Internet Worm Attacks
Kim, Ik-Su ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 431~439
The security systems using signatures cannot protect servers from new types of Internet worms. To protect servers from Internet worms, this paper proposes a system removing malicious processes and executable files without using signatures. The proposed system consists of control servers which offer the same services as those on protected servers, and agents which are installed on the protected servers. When a control server detects multicasting attacks of Internet worm, it sends information about the attacks to an agent. The agent kills malicious processes and removes executable files with this information. Because the proposed system do not use signatures, it can respond to new types of Internet worms effectively. When the proposed system is integrated with legacy security systems, the security of the protected server will be further enhanced.
A Study on Quality evaluation Methodology Establishment of Anti-Virus Software based on the Real Test Environment
Maeng, Doo-Iyel ; Park, Jong-Kae ; Kim, Sung-Joo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 440~452
For an evaluation of the software product, the national/international organizations and labs have been studying various methodologies for the quality on the basis of ISO/IEC Quality Assurance System, but they still have many issues in evaluation of the anti-virus software that has special characteristics of complexity. In this paper, to establish a methodology of the quality evaluation for the anti-virus software, fulfilling the requirements more than reasonable level, a process to draw the evaluation items and quantification was established. And the information of weight was objectified by analyzing the relative magnitude between each factors. Based on the defined information (evaluation item, weight), conducting the quality evaluations for 70 kinds of open anti-virus software collected from the portal sites in the real test environment, and as a result of the positive analysis with user's long-term experience, this paper justifies the evaluation item and the weight.
A Scheduling Scheme Considering Multiple-Target Coverage and Connectivity in Wireless Sensor Networks
Kim, Yong-Hwan ; Han, Youn-Hee ; Park, Chan-Yeol ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 453~461
A critical issue in wireless sensor networks is an energy-efficiency since the sensor batteries have limited energy power and, in most cases, are not rechargeable. The most practical manner relate to this issue is to use a node wake-up scheduling protocol that some sensor nodes stay active to provide sensing service, while the others are inactive for conserving their energy. Especially, CTC (Connected Target Coverage) problem has been considered as a representative energy-efficiency problem considering connectivity as well as target coverage. In this paper, we propose a new energy consumption model considering multiple-targets and create a new problem, CMTC (Connected Multiple-Target Coverage) problem, of which objective is to maximize the network lifetime based on the energy consumption model. Also, we present SPT (Shortest Path based on Targets)-Greedy algorithm to solve the problem. Our simulation results show that SPT-Greedy algorithm performs much better than previous algorithm in terms of the network lifetime.
A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems
Chung, Kyung-Ho ; Kim, Kyoung-Youl ; Oh, Se-Jin ; Lee, Jae-Kang ; Park, Yong-Soo ; Ahn, Kwang-Seon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 462~473
The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.
Development of Aircargo Monitoring System using RFID Technology
Son, Min-Gyu ; Chang, Yoon-Seok ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 474~484
In this paper, we introduce a RFIDbased real time air cargo monitoring system for cargo management in the air cargo terminal. In order to construct functional requirement and development framework,. we have analyzed the user requirements of cargo personnel of Incheon International Air Cargo Terminal. To find out the possibilities to adopt RFID in the cargo, we had benchmarked different RFID systems and also tested radio environment of the cargo. Based on the RFID system test and radior environment test, we developed a web based cargo monitoring solution which adopts EPC network and BPM solution with flexibility and expandability.
Implementation of Road Weather Information System Supporting Intelligent Transportation Systems Based on USN
Park, Hyun-Moon ; Park, Soo-Huyn ; Park, Woo-Chool ; Seo, Hae-Moon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 485~492
Intelligent Transport System(ITS) has been studied in various systems, such as road environment information offering, vehicle short-range wireless/wire communication, vehicle collision preventing and pedestrian safety offering systems. Related to this, the USN technology based on the sensing accuracy for motorists and pedestrians safety, the information reliability, the maintenance and convenience for Sensor Network is highlighted. This study uses various sensors to construct USN to the road, and connect it to the developed RSU so it collects the real-time road environment information and offers it to OBU and Traffic Control Surveillance Center with Road Weather Information System. RSU collects roadside information for driver's safety and analyzes it to offer IP and beacon service according to the service priority to OBU & upper layer terminal. In the upper layer terminal it is developed the IP based Settop Box application program to offer the urban traffic information & road environment, and environment sensor error, etc. Finally, RWIS develops the real-time collection of roadside information to complement the driver's safety to the intelligent traffic system, and presents various service modes with technology convergence.
Publish/Subscrib Service based Selective Sensor Data Monitoring System using Mesh Network
Kim, Yong-Hyuck ; Kim, Young-Han ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 493~502
In this paper we propose a scalable sensor network system that makes mesh network among the sink nodes to solve the scalability problem of existing sensor network which is caused by multi-hop networking between the sensor nodes. In the proposed system, the sink nodes have the wireless networking ability to communicate with another sink nodes in mesh fashion, and with the monitoring nodes which is located in the local area or internet area. Especially, the system includes L4(Application Layer) routing mechanism that provides subscribe/publish service to serve selective transmission of sensor data to the specific monitoring nodes. The collected sensor data is transmitted to the monitoring nodes when the sensor data is matched with the monitoring node's interesting value.
A Converged Profile and Authentication Control Scheme for Supporting Converged Media Service
Lee, Hyun-Woo ; Kim, Kwi-Hoon ; Ryu, Won ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 503~516
In this paper, we propose the converged profile and authentication scheme for supporting converged media services of broadcasting & communications convergence in fixed mobile convergence networks. The proposed scheme supports the management of access, service, mobility and IPTV profiles on subscriber and a function of open API(Application Program Interface) for providing the subscriber profile for the third party service provider with the PUSH/PULL method. The open API is based on a web service and a REST(Representational State Transfer) and provides various services for the third party service provider with ease. In addition, the proposed scheme supports a function of SSO(Single Sign-on). After user succeeded in establishing an access connection, user can sustain the same authentication state with this function although connected access network is changed or IMS(IP Multimedia Subsystem) service network is attached. We evaluate and analyze the performance of the proposed scheme through the implementation of CUPS(Converged User Profile Server) system test-bed.
A Structure of Realtime IPTV Service using Peer-to-Peer Technology
Kim, Jae-Hyuk ; Kim, Young-Han ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 517~525
The IPTV Service provides various interactive services beyond the level of being able to substitute cable TV. The IPTV system is to be decentralized gradually in which one server conducts all tasks. Primarily, deliberation of media needs to be changed into a system in which relayer and peer from the central server is utilized. Secondarily, the way of controling IPTV network need to be decentralized. Unlike the current client-server system, P2P(Peer To Peer), the main technology of decentralized IPTV is able to provide a service by cooperation of each node. Dealing with live streaming IPTV system which is based on the P2P protocol, this paper design the pure P2P IPTV structure and does verify the performance of P2P IPTV structure by realizing real system.
A Fault-tolerant Network-based Mobility Management Scheme for Supporting Multi-media Services
Lee, Sung-Kuen ; Lee, Kyoung-Hee ; Hong, Kang-Woon ; Um, Tai-Won ; Lee, Hyun-Woo ; Ryu, Won ; Park, Jin-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 526~535
In this paper, we propose the fault-tolerant network-based mobility management scheme for supporting multimedia services of broadcasting & communications convergence in fixed mobile convergence (FMC) networks. The proposed scheme is based on AIMS (Access Independent Mobility Service) which is developed for the mobility support among heterogeneous access networks. To support stable location management and handover control for a MN, the proposed scheme supports stable management of binding information by sensing network attachment and detachment of a mobile node (MN). In addition, the proposed fault-tolerant (FT) AIMS supports a function of message retransmission for the support of handover control message and a function of heartbeat message transmission for the support of stable access network environments to a mobile node. We evaluate and analyze the performance of the proposed scheme through the implementation of AIMS system test-bed.
A Direction for Convergence Law in the Era of Digital Convergence
Lee, Sang-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 536~550
This study analyzes the characteristics of broadcasting law and telecommunication law and suggested the key legitimate of regulation where convergence law would go for in the convergence circumstances by drawing the common and differential characteristics of two laws. Moreover, in the value of inherent pursuit of broadcasting law and telecommunication law, this paper examined whether these values continued to be reflected in the convergence law, and indicated the direction how these values should adopt in the convergence law. The result of this study shows that strong entry regulation has applied to both broadcasting and telecommunications industry. Also, both industries have been required to be universal service to realize the value. Meanwhile, the pursuit of original value of broadcasting law and telecommunication law can be summarized as secure of access and diversity, respectively. In the convergence law, it is necessary to compensate and modify the meaning of access and diversity based on traditional regulation.
The Spread of Internet Worms on Convergence Networks
Shin, Weon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 3B, 2010, Pages 551~557
Fast spreading Internet worms will be sure to become one of the new major threats of convergence networks as well as the Internet. In order to defend and respond them, it is necessary to study how Internet worms propagate and what factors affect worm spreading. In this paper, we try to describe the correct spread of worms on convergence network environments. Therefore we propose a spreading model and analyze the spreading effects by various experiments.