Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Korean Institute of Communications and Information Sciences
Journal Basic Information
Journal DOI :
The Korean Institute of Communications and Information Sciences
Editor in Chief :
Kyung-Hi Chang / Song Chong / Jong-Taek Oh / Jae-Jin Lee / Myung-Sik Yoo
Volume & Issues
Volume 35, Issue 12C - Dec 2010
Volume 35, Issue 12B - Dec 2010
Volume 35, Issue 12A - Dec 2010
Volume 35, Issue 11C - Nov 2010
Volume 35, Issue 11B - Nov 2010
Volume 35, Issue 11A - Nov 2010
Volume 35, Issue 10C - Oct 2010
Volume 35, Issue 10B - Oct 2010
Volume 35, Issue 10A - Oct 2010
Volume 35, Issue 9C - Sep 2010
Volume 35, Issue 9B - Sep 2010
Volume 35, Issue 9A - Sep 2010
Volume 35, Issue 8C - Aug 2010
Volume 35, Issue 8B - Aug 2010
Volume 35, Issue 8A - Aug 2010
Volume 35, Issue 7C - Jul 2010
Volume 35, Issue 7B - Jul 2010
Volume 35, Issue 7A - Jul 2010
Volume 35, Issue 6C - Jun 2010
Volume 35, Issue 6B - Jun 2010
Volume 35, Issue 6A - Jun 2010
Volume 35, Issue 5C - May 2010
Volume 35, Issue 5B - May 2010
Volume 35, Issue 5A - May 2010
Volume 35, Issue 4C - Apr 2010
Volume 35, Issue 4B - Apr 2010
Volume 35, Issue 4A - Apr 2010
Volume 35, Issue 3C - Mar 2010
Volume 35, Issue 3B - Mar 2010
Volume 35, Issue 3A - Mar 2010
Volume 35, Issue 2C - Feb 2010
Volume 35, Issue 2B - Feb 2010
Volume 35, Issue 2A - Feb 2010
Volume 35, Issue 1C - Jan 2010
Volume 35, Issue 1B - Jan 2010
Volume 35, Issue 1A - Jan 2010
Selecting the target year
A Study on Performance Improvement of Route Optimization in Fast Mobile IPv6
Oh, Moon-Kyoon ; Kim, Dae-Young ; Ryu, Jung-Kwan ; Ro, Soong-Hwan ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 559~565
In Mobile IPv6 handover should be followed by RO(Route Optimization) to support direct communication between a MN(Mobile Node) and CN(Correspondent Node). For this RR MIPv6 must perform RR(Return Routability) procedure before BU(Binding Update) to CN. The Fast Handover for MIPv6(FMIPv6) also performs the RR test for MN to communicate with CN directly. However, Return Routability test has long latency resulting in handover delay in MIPv6. This paper proposes the method to reduce the handover deay by reducing RO latency in FastMobile IPv6.
Design of Network Attack Detection and Response Scheme based on Artificial Immune System in WDM Networks
Yoo, Kyung-Min ; Yang, Won-Hyuk ; Kim, Young-Chon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 566~575
In recent, artificial immune system has become an important research direction in the anomaly detection of networks. The conventional artificial immune systems are usually based on the negative selection that is one of the computational models of self/nonself discrimination. A main problem with self and non-self discrimination is the determination of the frontier between self and non-self. It causes false positive and false negative which are wrong detections. Therefore, additional functions are needed in order to detect potential anomaly while identifying abnormal behavior from analogous symptoms. In this paper, we design novel network attack detection and response schemes based on artificial immune system, and evaluate the performance of the proposed schemes. We firstly generate detector set and design detection and response modules through adopting the interaction between dendritic cells and T-cells. With the sequence of buffer occupancy, a set of detectors is generated by negative selection. The detection module detects the network anomaly with a set of detectors and generates alarm signal to the response module. In order to reduce wrong detections, we also utilize the fuzzy number theory that infers the degree of threat. The degree of threat is calculated by monitoring the number of alarm signals and the intensity of alarm occurrence. The response module sends the control signal to attackers to limit the attack traffic.
Methods of WAP Gateway Capacity Dimensioning and Traffic Forecasting
Park, Chul-Geun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 576~583
Wireless Internet is the network which provides wireless access in order to serve the Internet connections and data communication through the mobile handsets. To get efficient wireless access to the Internet, we need the WAP (Wireless Application Protocol) gateway that performs protocol translation and contents conversion between two different networks. We need the capacity dimensioning of the WAP gateway system in order to provide the wireless Internet service stably and cost-effectively. We also need the traffic engineering methods including traffic modelling and forecasting for the economical facility investment. The existing method of WAP gateway capacity dimensioning was intuitive and qualitative. But in this paper, we deal with the capacity dimensioning analytically and quantitatively on the basis of WAP traffic description parameters and traffic forecasting method.
Performance Analysis of Adaptive RS Coverage Extension Scheme for the MMR systems
Kim, Seung-Yeon ; Kim, Se-Jin ; Lee, Hyong-Woo ; Ryu, Seung-Wan ; Cho, Choong-Ho ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 584~591
In this paper, we propose an adaptive Relay Station (RS) coverage extension scheme for the Mobile Multi-hop Relay (MMR) systems. The MMR system with a non-transparent mode RS can be used to extend BS coverage using the remaining capacity of the Base Station(BS). Thus, the call blocking may occur in RSs when calls arrive very often in Multi-hop Relay Base Station (MR-BS). In the proposed scheme, RSs can be connected to the neighbor MMR system as the 2ndtier RSs if the neighbor MMR system services low traffic load when calls are frequently arrived in MR-BS or RSs. By doing so, the MMR system can accept a new call without call blocking. Through numerical results, we demonstrate that the proposed scheme outperforms the conventional MMR system in terms of the throughput and call blocking probability of MMR systems.
A Study for PKI Based Home Network System Authentication and Access Control Protocol
Lee, Young-Gu ; Kim, Jung-Jae ; Kim, Hyun-Chul ; Jun, Moon-Seog ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 592~598
A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.
Analysis Method and Response Guide of Mobile Malwares
Kim, Ik-Su ; Jung, Jin-Hyuk ; Lee, Hyeong-Chan ; Yi, Jeong-Hyun ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 599~609
Korean government has recently abrogated WIPI policy to open domestic mobile phone market to the world, which may result in the influx of foreign smart phones. This circumstance has given users more wide range of choices to buy a product and also has brought benefit to buy mobile phone cheaply. On the other hands, this change might have brought potential danger of mobile malware incidents which have only occurred in foreign countries. There are standardized analysis methods and response guides for computer malwares, not but for mobile malwares in our country. In this paper, we introduce existing mobile malwares and available tools for their analysis. Considering domestic circumstances which might not be properly protected against mobile malwares, we propose analysis methods and response guide of mobile malwares.
An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks
Boo, Chang-Hee ; Jun, Moon-Seog ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 610~619
RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from malicious attackers. For that reason, Brands, et al. proposed a certification protocol between a certifier and a verifier based on the concept of distance-bounding, and in addition Hancke et al. introduced the concept of RFID. However, the delivery of tag IDs, one of the main RFID features, is not still available, and there are two important demerits: anonymity in the delivery of tag IDs suggested by Kim et al. and inefficiency in finding a tag ID with regard to how to check errors which may occur in the process of data exchange between readers and tags. Therefore, this study proposes a protocol that meets the requirements of tag anonymity and location untraceability, has resistance to errors which may take place in the phase of tag data exchange, and is very efficient in finding tag IDs.
A Study on the Adoption Factors of Potential Users of the Digital Radio Broadcasting
Kwon, Jung-A. ; Park, Gwang-Man ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 620~629
The analogue radio broadcasting was proven to be a successful and efficient media of delivering information because of free content and wide availability of cheap receivers. But the competition was more dropped than any other media due to the limited amount of radio spectrum that is available. The risk of doing nothing is to miss the opportunity and to loss existing audiences in the long term, or to be locked into inefficient proprietary systems. That is the reason why it is important to act now. It is time for regulators and market participants to hone their strategies, by clearly establishing factors to adopt the digital radio and to facilitate its diffusion. The purpose of this study is to find adoption factors that affected to potential users of digital radio broadcasting. Former research based on diffusion of innovation theory showed that adoption of innovation is affected by demographic variables, media usage and consumer's attitude of innovation. In this study based on a consumer survey, we examined those factors and characteristics of each steps that suggested in diffusion of innovation theory. The findings of this study have implications to explore the suitable technologies and services of digital radio broadcasting.
Ocular Inspection Using Color Analysis in CIE Lab for Kidney Disease in Various Situations
Lee, Se-Hwan ; Cho, Dong-Uk ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 630~636
Ocular inspection in oriental medicine, which identifies sickness by patient's skin color, is usually applied by doctor's subjective judgment. In order to reduce the subjectiveness of diagnosis, we propose a method of objective and quantitative analysis for ocular inspection. The most issued features for ocular inspection are how to identify the color of patients' face in various situations, and how to link the relation between color and sickness. For resolving these two issues, the color system of CIE Lab is adopted for analyzing and classifying the color characteristics. The classification of color features is verified by experiments on groups of patients and non-patients. The results of experiments showed that the proposed method can provide an objective means for ocular inspection using patient's skin color.
A Design of Transmission Channel for 40Gb/s backplane Ethernet based on IEEE P802.3ba
Yang, Choong-Reol ; Kim, Kwang-Joon ; Kim, Whan-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 637~646
For 40 Gb/s data transmission through electrical backplane trace up to 40 inch length on four layer fire-resistant (FR-4), we have designed the 40 Gb/s backplane channel model consisting of four channel 10 Gb/s. Simulation results show an enhancement of backplane channel characteristics excellent more than requirements specified in IEEE P802.3ba at 10 Gb/s. This paper provides a review of the structures and algorithms used in receive and adaptive equalization for 40 Gb/s backplane Ethernet. The use of this backplane channel model could achieves better receive equalizer at great data rate than 10 Gb/s.
Range-free Localization Based on Residual Force-vector with Kalman Filter in Wireless Sensor Networks
Lee, Sang-Woo ; Lee, Chae-Woo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 647~658
Many localization schemes estimate the locations of radio nodes based on the physical locations of anchors and the connectivity from the anchors. Since they only consider the knowledge of the anchors without else other nodes, they are likely to have enormous error in location estimate unless the range information from the anchors is accurate or there are sufficiently many anchors. In this paper, we propose a novel localization algorithm with the location knowledge of anchors and even one-hop neighbors to localize unknown nodes in the uniform distance from all the one-hop neighbors without the range information. The node in the uniform distance to its all neighbors reduces the location error relative to the neighbors. It further alleviates the location error between its actual and estimated locations. We evaluate our algorithm through extensive simulations under a variety of node densities and anchor placement methods.
An Architecture of ISP-based P2P IPTV Services and Its Characteristics
Sung, Moo-Kyung ; Han, Chi-Moon ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 659~669
The P2P IPTV will create a new paradigm for the Internet services. However, it cannot guarantee the reliability of their server and QoS because of using common Internet users(peers) for SIP server or relay server, though the infrastructural cost is low. This paper proposes the ISP-based P2P IPTV architecture which can solute the limitations of conventional P2P-based IPTV. In this model, ISP can build P2P overlay network with ISP servers and directly manage each server needed for session connection. So, the servers have higher performance and better reliability than previous one. Besides, robustness is improved because each sever is set by P2P overlay network. To evaluate the characteristics of the ISP-based P2P IPTV architecture, we simulate it for some parameters which are end-to-end streaming delay time, connection delay time and traffic amount. We compared the proposed architecture with the conventional P2P architecture about video service and confirmed that the performance of ISP-based P2P IPTV is better than conventional P2P based IPTV.
Time Synchronization Performance Improvement based on PN sequence for Advanced T-DMB system
Bae, Jae-Hwui ; Kim, Young-Su ; Lim, Jong-Soo ; Song, Yun-Jeong ; Lee, Soo-In ; Han, Dong-Seog ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 670~676
A time synchronization method for Advanced T-DMB is proposed using PN sequence inserted in PRS for the transmission of hierarchical modulation mode information. The time synchronization offset is estimated through the cross-correlation of the PN sequence and the received PRS. The performance of the proposed method is analyzed by the BER analysis in mobile channel and the results are shown.
Research on the Implementation of the Virtual Interface on Multi-mode Mobile Nodes
Lee, Kyoung-Hee ; Lee, Seong-Keun ; Rhee, Eun-Jun ; Cho, Kyoung-Seob ; Lee, Hyun-Woo ; Ryu, Won ; Hong, Seng-Phil ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 677~686
In this paper, we propose the virtual interface management scheme on the multi-mode mobile node for supporting multiple connections to various access networks in fixed mobile convergence (FMC) networks. The proposed scheme supports the virtualization of multiple physical network interfaces by presenting only the virtual interface to beyond IP layers and hiding physical network interfaces from them. In the proposed scheme, only one IP address is allocated to virtual interface without any IP allocations to physical network interfaces. Therefore, the proposed scheme does not change its IP address and keep it during the vertical handover, so that it can support the seamless handover of real-time multimedia services among heterogeneous access networks. The proposed scheme is implemented on the multi-mode mobile node with multiple network interfaces by using NDIS (Network Driver Interface Specifications) libraries. Through the mobility test-bed and the test application of virtual interface, we evaluate and analyze the performance of the proposed scheme.
Fingerprint-Based 1-out-of-n Access Control Technique for Media Service Protection in IPTV Broadcasting System
Lee, Ji-Seon ; Rhee, Hyun-Sook ; Kim, Hyo-Dong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 687~694
IPTV(Internet Protocol Television) is an emerging technology in which telecommunication and broadcasting technologies are converged. IPTV service providers usually multicast scrambled contents. And only legitimate subscribers who pass the access control can de-scramble and use the contents. In order to ensure revenues, providers oftentimes employ password-based authentication protocols that ensure secure authentication processes between set-top box and smart card. In this paper, we propose a fingerprint-based 1-out-of-n authentication protocol which provides convenient and more secure authentication process in some organizational environments. The proposed scheme shows that only those who provide legitimate fingerprint information can be authenticated even in a situation that both password and smart card are compromised.
An Adaptive Scalable Encryption Scheme for the Layered Architecture of SVC Video
Seo, Kwang-Deok ; Kim, Jae-Gon ; Kim, Jin-Soo ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 695~703
In this paper, we propose an adaptive scalable encryption scheme for the layered architecture of SVC video. The proposed method determines an appropriate set of encryption algorithms to be applied for the layers of SVC by considering the importance and priority relationship among the SVC video layers. Unlike the conventional encryption method based on a fixed encryption algorithm for the whole video layers, the proposed method applies differentiated encryption algorithms with different encryption strength the importance of the video layers. Thereupon, higher security could be maintained for the lower video layer including more important data, while lower encryption strength could be applied for the higher video layer with relatively less important data. The effectiveness of the proposed adaptive scalable encryption method is proved by extensive simulations.
Design and Implementation of Sensing MAC Module for Cognitive Radio Terminal System
Hwang, Sung-Ho ; Min, Jun-Ki ; Park, Yong-Woon ; Kim, Ki-Hong ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 704~712
Recently, the lack of the frequency have been emerged due to the use of various wireless terminals. To find solutions for obtaining new frequency resources and for avoiding an interference, a cognitive radio technology have focused on as the new technology that can use the whitespace in TV broadcasting band. In this paper, the Cognitive Radio terminal system for whitespace in TV band is first introduced. The purpose of the CR terminal platform is to evaluate the feasibility of the unlicensed wireless service in the TV band. Then, we design and develop the software for Sensing MAC applied the cognitive radio terminal system. The developed Sensing MAC software based on IEEE 802.22 specification can be aware of using the whitespace in TV band that operates on cognitive radio terminal system. Finally, we have tested for evaluating the sensing MAC module.
Design on Authentication System Based Multicast DRM for Protection of IPTV Contents
Kim, Jae-Woo ; Kim, Jung-Jae ; Kim, Hyun-Chul ; Jun, Moon-Seog ;
The Journal of Korean Institute of Communications and Information Sciences, volume 35, issue 4B, 2010, Pages 713~720
Lately, IPTV is in the limelight using a broadband information service to provide video content and broadcast services. Current IPTV system is combining CAS and DRM system for VOD contents to protect transmitting contents and authentication, but it has drawbacks such as system's complexity and high construction costs. Multicast DRM system emerged as a method to improve them, but, in the multicast DRM system, if the key is intercepted by a malicious user, it can be viewed by an unauthorized user of illegal broadcasting which can be a problem. In this paper, we suggest to protect content from a malicious user by applying the techniques using user authentication in the multicast DRM system.