Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 12C, Issue 7 - Dec 2005
Volume 12C, Issue 6 - Oct 2005
Volume 12C, Issue 5 - Oct 2005
Volume 12C, Issue 4 - Aug 2005
Volume 12C, Issue 3 - Jun 2005
Volume 12C, Issue 2 - Apr 2005
Volume 12C, Issue 1 - Feb 2005
Selecting the target year
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices
Cho Seokhyang ; Nam Junghyun ; Kim Seungjoo ; Won Dongho ; Lee Hyejoo ; Choi Jinsoo ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 157~168
DOI : 10.3745/KIPSTC.2005.12C.2.157
Group key agreement protocols are designed to provide a group of parties securely communicating over a public network with a session key. The mobile computing architecture is asymmetric in the sense of computational capabilities of participants. That is, the protocol participants consist of the stationary server(application servers) with sufficient computational Power and a cluster of mobile devices(clients) with limited computational resources. It is desirable to minimize the amount of computation performed by each group member in a group involving low-power mobile devices such as smart cards or personal digital assistants(PDAs). Furthermore we are required to update the group key with low computational costs when the members need to be excluded from the group or multiple new members need to be brought into an existing group. In this paper, we propose a dynamic group key protocol which offers computational efficiency to the clients with low-power mobile devices. We compare the total communicative and computational costs of our protocol with others and prove its suity against a passive adversary in the random oracle model.
Electronic Signature Model and Application of Security Server System using Identity Information
Kim Young-Soo ; Shin Seung-Jung ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 169~174
DOI : 10.3745/KIPSTC.2005.12C.2.169
Electronic signature system is required to be used in the promotion of the e-Commerce. Because the application system for electronic signature system has inconvenience and vulnerability of security, users are reluctant to use it. Therefore, the electronic signature system should give a guarantee of convenience and security. In this paper, we propose server-based application model, which uses identity information and makes users access transparently to solve electronic signature problems. We also design and verify electronic signature system that reduces threats to security, which cause server attack by distributing the part of signature key to both server and client. The application model with lightweight server system based on the electronic signature system is expected to be used in the promotion of the e-Commerce and help to make its business more efficient and competitive.
A Study on Encryption Techniques for Digital Rights Management of MPEG-4 Video Streams
Kim Gunhee ; Shin Dongkyoo ; Shin Dongil ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 175~182
DOI : 10.3745/KIPSTC.2005.12C.2.175
This paper presents encryption techniques for digital right management solutions of MPEG-4 streams. MPEG-4 is a format for multimedia streaming and stored in the MPEG-4 file format. We designed three kinds of encryption methods, which encrypt macro blocks (MBs) or motion vectors (MVs) of I-, P-VOPs (Video Object Planes), extracted from the MPEG-4 file format. We used DES to encrypt MPEG-4 data Based on theses three methods, we designed and implemented a DRM solution for an Internet broadcasting service, which enabled a MPEG-4 data streaming, and then compared the results of decryption speed and quality of rendered video sequences to get an optimal encryption method.
A Digital Right Management System based on Shared Key fool for Video Data Protection
Kim Jung-Jae ; Park Jae-Pyo ; Jun Moon-Seog ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 183~190
DOI : 10.3745/KIPSTC.2005.12C.2.183
In this thesis, first, we propose I-frame encryption techniques of video data for video data itself encryption and propose license agent that processing user`s certification and decryption in client system automatically when user execute encrypted video data in system server. License agent runs user`s certification, encryption and decryption of video data based on PID(Public Key Infrastructure) using shared key-pool when execute of video data. Also, compose duplex buffer control and propose real time decryption method using efficient buffer scheduling to reduce much playing delay times that happen processing decryption when execute of videoa data of high-capacity.
Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms
Kim Ik-Su ; Jo Hyuk ; Kim Myung Ho ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 191~200
DOI : 10.3745/KIPSTC.2005.12C.2.191
The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system`s overhead and disk space that is required.
Design of the Encryption Module for File System in the Solaris Kernel
Jang Seung Ju ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 201~206
DOI : 10.3745/KIPSTC.2005.12C.2.201
This paper designs Cryptography File System to support encrypting function. The CFS is supported in Solaris Kernel to encrypt or decrypt a plaintext or an encrypted text by using the dynamic linking mechanism. The Cryptography File System supports safe use of computer system even if an intruder gets a file by connecting with network. If he/she does not have a Cryptography File System module in the Solaris Kernel, he/she cannot read that file. The Cryptography File System was experimented into the Solaris kernel.
A Study on Utilization of CC Security Function Components in IT Security Products
Choi Sung Ja ; Choi Sang Soo ; Lee Gang Soo ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 207~216
DOI : 10.3745/KIPSTC.2005.12C.2.207
It is difficult to decide which security functions(class, family, component) in the Common Criteria(CC) are important, since there is no research result about the frequency of use of security functions in real security product or Protection Profiles(PPs). Thus, we survey security functions in CC and 33 PPs that can be classified by 10 product types, and create a set of `frequency of use of security functions` in CC and each types of security product. Our research results are useful for development of a new classification schema, as well as, estimation of development and evaluation efforts of security products.
Analysis on the Performance Unfairness Problem of the Heterogeneous Environment with IEEE 802.11b and 802.11e
Lim Yujin ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 217~222
DOI : 10.3745/KIPSTC.2005.12C.2.217
The IEEE 802.11 based wireless local area networks are candidates to lead the broadband connectivity in the home and office scenarios. Recently IEEE proposed the 802.11e as a new standard to provide appropriate Quality of Services to a plethora of emerging real-time multimedia and high demanding applications such as high definition movie and audio distribution, video-conference and voice over IP. This paper studies the IEEE 802.11e/IEEE 802.11b interactions focusing on potential unfairness problems that might appear in networks with heterogeneous wireless LAN technologies as well as in the IEEE 802.11e deployment phase.
Design of sub-code Multi-Code Hybrid DS/FH-SS System for the Efficient Data Transmission
Kong Hyung-Yun ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 223~228
DOI : 10.3745/KIPSTC.2005.12C.2.223
The existing mobile communication system called DS/CDMA system, which is serviced widely nowadays, has some problems such as the severe ISI and multiple access interferences under the multi-path fading channel when applied to high-speed data transmission like multimedia transmission. To compensate these problems, we propose a sub-code multi-code hybrid DS/FH (Frequency Hopping) SS (Spread Spectrum) System by combining the multi-code system that restrains the multiple access interference with the hybrid DS/FH SS technique that reduces ISI(Intersymbol Interference) effect for high-speed transmission. Moreover, we implement and propose the sub-code technique to remedy the problems of the generic multi-code system. To verify the performance of the proposed system, the computer simulations are executed under the various channel environments.
A Fuzzy Logic Buffer Management Algorithm
Kim Kwan-Woong ; Bae Sung-Hwan ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 229~234
DOI : 10.3745/KIPSTC.2005.12C.2.229
We propose a fuzzy logic-based buffer management algorithm to improve internet traffic over ATM-GFR service. The proposed algorithm employs the strategies of early congestion detection and selective packet discard to achieve its design goals. A key feature of proposed algorithm is its ability to accept or drop a new incoming packet dynamically based on buffer condition and load rate of VCs. This is achieved by using fuzzy logic controller for the production of a drop factor. Simulation results show that proposed scheme significantly has improved fairness and TCP throughput compared with previous schemes.
IP Paging for Data-receiving Service in HPi Network
Jeong Tae Eui ; Na Jee Hyeon ; Kim Yeong Jin ; Song Byung Kwon ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 235~242
DOI : 10.3745/KIPSTC.2005.12C.2.235
As the demands in a wireless network are recently increasing, it is necessary to promote the power efficiency of a wireless terminal, and to reduce the overhead of a network. To resolve such problems, we propose the paging technology and the structure of paging area with the joint access point in HPi (High-speed Portable Internet) network, which is being studied as the domestic next-generation IP packet data network. The application of the paging technology to the HPi network possesses the advantage of reducing the registration cost while a terminal in dormant state moves around, and the reporting cost of the terminal`s location by the joint access point. The technology suggested in this paper causes the advantages that it promotes the power efficiency in user`s point of view while it reduces the network overhead and makes the easy rearrangement of joint APs according to the changes of users` moving pattern in the network manager`s point of view.
A Caching Strategy Considering Characteristics of Broadcast Algorithm in Hybrid-based Data Broadcast Systems
Shin Dong Cheon ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 243~250
DOI : 10.3745/KIPSTC.2005.12C.2.243
To introduce the cache in a client is one of the methods to migrate the performance degradation of broadcast systems doe to the inherent restrictions of wireless communication environments such as low bandwidth or frequent disconnections. In this paper, we propose a pull-based broadcast strategy in hybrid-based data broadcast systems using bit vectors in order to effectively broadcast data recently requested by clients. Then, we propose a caching strategy considering the characteristics of data broadcast algorithm and then evaluate the performance of the system. According to the result of evaluation, the system employing the proposed strategies shows the better performance in terms of response time.
Implementation of Extended Automatic Callback Service in SIP-based VoIP System
Jo Hyun-Gyu ; Lee Ky-Soo ; Jang Choon-Seo ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 251~260
DOI : 10.3745/KIPSTC.2005.12C.2.251
On the internet phone or PSTN(Public Switched Telephone Network), the automatic callback is an useful service in the case of busy state when one user calls the other. By using this service, automatic redial is possible when the other party hangs up. However, in the basic automatic callback service, the user who wants callback should wait until the other party hangs up even in the case of emergency. Therefore in this paper, to solve this problem we have extended CPL(Call Processing Language) and, within user system we have included and linked this extended CPL processing module and dialog event package which processes SIP INVITE initiated dialog state informations. We have implemented this system for being used in SIP(Session Initiation Protocol)-based VoIP(Voice over IP) system.
Development of a Home Gateway na a Management Server for Home Network Environments
Kwon Jinhyuck ; Jung Jaeyun ; Kim Hagbae ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 261~266
DOI : 10.3745/KIPSTC.2005.12C.2.261
This paper proposes two systems. One is a Home Gateway(HG) which efficiently connects and controls digital appliances in the home network environments. The other is a Management Server(MS) that overcomes the physical limitation of the HG. The HG supports networking modules(TCP/IP for Ethernet, ADSL), home networking functions(HomePNA, IEEE1394 PLC) and telecommunication system(PSTN/SLT, VoIP, Video Communication). The HG is expected to be a core device for the integrated digital home environments. The MS is a dedicated server which manages and controls individual HG, home appliances and HA devices implemented at an area.
An Implementation of Explicit Multicast with Mobile IP for Small Group Communications in Mobile Networks
PARK IN-SOO ; PARK YONG-JIN ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 267~280
DOI : 10.3745/KIPSTC.2005.12C.2.267
In this paper, we implement and verify XMIP integrating IETF Mobile IP and the Explicit Multicast mechanism for a great number of small group multicast communications. U a source node sends Xcast packets explicitly inserting destination nodes into the headers, each Xcast router decides routes and forwards the packets toward each destination node based on unicast routing table without the support of multicast trees. n is a straightforward and simple multicast mechanism just based on a unicast routing table without maintaining multicast states because of the inheritance from the Explicit Multicast mechanism. This research modifies and extends the functionality of IETF Mobile IP`s mobility agents, such as HA/FA to HA+/FA+ respectively, considering interworking with Xcast networks. Xcast packets captured by HA+ are forwarded into X-in-X tunnel interfaces for each FA+ referred to the binding table of HA.. This X-in-X tunneling mechanism can effectively solve the traffic concentration problem of IETF Mobile IP multicast services. Finally WLAN-based testbed is built and a multi-user Instant messenger system is developed as a Xcast application for finally verify the feasibility of the implemented XMIP/Xcast protocols.
Algorithmic Generation of Self-Similar Network Traffic Based on SRA
Jeong HaeDuck J. ; Lee JongSuk R. ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 281~288
DOI : 10.3745/KIPSTC.2005.12C.2.281
It is generally accepted that self-similar (or fractal) Processes may provide better models for teletraffic in modem computer networks than Poisson processes. f this is not taken into account, it can lead to inaccurate conclusions about performance of computer networks. Thus, an important requirement for conducting simulation studies of telecommunication networks is the ability to generate long synthetic stochastic self-similar sequences. A generator of pseudo-random self similar sequences, based on the SRA (successive random addition) method, is implemented and analysed in this paper. Properties of this generator were experimentally studied in the sense of its statistical accuracy and the time required to produce sequences of a given (long) length. This generator shows acceptable level of accuracy of the output data (in the sense of relative accuracy of the Hurst parameter) and is fast. The theoretical algorithmic complexity is O(n).
An Analysis and Evaluation of Policy-Based Network Management Approaches
Lim Hyung J. ; Lee Hyun J. ; Lee Jong H. ; Chung Tai M. ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 289~300
DOI : 10.3745/KIPSTC.2005.12C.2.289
This paper proposed an analytical framework to compare and model the policy-based network management; centralized and distributed typed model. Policy-based network is introduced in various application fields, and a policy framework can offer different processing performance according to application. Therefore, we evaluated the performance and extensibility of each PBNM model when we apply the policy process to the models. The evaluated measurement metrics are policy provisioning time, traffic occurrence amount, PDP processing rate, and global conflict detection in qualitative simulation. The results show that the suitable structure is required according to the analysis for the careful application characteristics, when PBNM is adopted. The modeling framework presented in this paper is intended to quantify the merits and demerits among the currently suggested PBNM models.
A Real-Time Certificate Status Verification Method based on Reduction Signature
Kim Hyun Chul ; Ahn Jae Myoung ; Lee Yong Jun ; Oh Hae Seok ;
The KIPS Transactions:PartC, volume 12C, issue 2, 2005, Pages 301~308
DOI : 10.3745/KIPSTC.2005.12C.2.301
According to banking online transaction grows very rapidly, guarantee validity about business transaction has more meaning. To offer guarantee validity about banking online transaction efficiently, certificate status verification system is required that can an ieai-time offer identity certification, data integrity, guarantee confidentiality, non-repudiation. Existing real-time certificate status verification system is structural concentration problem generated that one node handling all transactions. And every time status verification is requested, network overload and communication bottleneck are occurred because ail useless informations are transmitted. it does not fit to banking transaction which make much account of real response time because of these problem. To improve problem by unnecessary information and structural concentration when existing real-time certificate status protocol requested , this paper handle status verification that break up inspection server by domain. This paper propose the method of real~time certificate status verification that solves network overload and communication bottleneck by requesting certification using really necessary Reduction information to certification status verification. And we confirm speed of certificate status verification
faster than existing OCSP(Online Certificate Status Protocol) method by test.