Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 13C, Issue 7 - Dec 2006
Volume 13C, Issue 6 - Oct 2006
Volume 13C, Issue 5 - Oct 2006
Volume 13C, Issue 4 - Aug 2006
Volume 13C, Issue 3 - Jun 2006
Volume 13C, Issue 2 - Apr 2006
Volume 13C, Issue 1 - Feb 2006
Selecting the target year
Key Update Protocols in Hierarchical Sensor Networks
Lee, Joo-Young ; Park, So-Young ; Lee, Sang-Ho ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 541~548
DOI : 10.3745/KIPSTC.2006.13C.5.541
Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.
Design and Implementation of Access Control System Based on XACML in Home Networks
Lee, Jun-Ho ; Lim, Kyung-Shik ; Won, Yoo-Jae ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 549~558
DOI : 10.3745/KIPSTC.2006.13C.5.549
For activating home network, the security service is positively necessary and especially the access control supports secure home network services and differentiated services. But, the existing security technology for home network seldom consider access control or has a architecture to be dependent on specific middleware. Therefore, in this paper we propose a scheme to support integrated access control in home network to use XACML, access control standard of next generation, to have compatability and extensibility and we design and implement XACML access control system based on this. we also had m access control experiment about various policy to connect developed XACML access control system with the UPnP proxy based on OSGi in order to verify compatability with existing home network system.
Variable Rate Limiter in Virus Throttling for Reducing Connection Delay
Shim, Jae-Hong ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 559~566
DOI : 10.3745/KIPSTC.2006.13C.5.559
Virus throttling technique, one of many early worm detection techniques, detects the Internet worm propagation by limiting the connect requests within a certain ratio. The typical virus throttling detects worm occurrence by monitoring the length of delay queue with the fixed period of rate limiter. In this paper, we propose an algorithm that controls the period of rate limiter autonomically by utilizing the weighted average delay queue length and suggest various period determination policies that use the weighted average delay queue length as an input parameter. Through deep experiments, it is verified that the proposed technique is able to lessen inconvenience of users by reducing the connection delay time with haying just little effect on worm detection time.
Delay and Channel Utilization Analysis of IEEE 802.12 VG-AnyLAN Medium Access Control under the Homogeneous Traffic Condition
Joo, Gi-Ho ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 567~574
DOI : 10.3745/KIPSTC.2006.13C.5.567
VG-AnyLAN is a local area network standard developed by the IEEE 802.12 project. While preserving the frame format of IEEE 802.3, VG-AnyLAN adopts a new medium access control called Demand Priority where transmission requests of stations are arbitrated by a control hub in a round-robin manner. Unlike CSMA/CD which is the medium access control of IEEE 802.3, the Demand Priority, while providing the maximum bound on the packet delay, does not put the limit on the network segment size. In this paper, we analyze the delay and the channel utilization performances of the medium access control of IEEE 802.12 VG-AnyLAN. We develope an analytic model of the system under assumptions that each station generates traffic of the equal priority and that the packets are of fixed length. Using the analytic model, we obtain the recursive expression of the average channel utilization and the average access delay The numerical results obtained via analysis are compared to the simulation results of the system for a partial validation of our analysis.
Optimizing System Performance for Uncompressed HDTV over 10-Gigabit Ethernet
Jo, Jin-Yong ; Seok, Woo-Jin ; Lee, Min-Sun ; Byeon, Ok-Hwan ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 575~582
DOI : 10.3745/KIPSTC.2006.13C.5.575
Guaranteeing network bandwidth and system performance becomes important technical matters to make seamless delivery of bulky data at high speed. Tuning system and network parameters including jumbo frame, kernel buffer size, and interrupt coalescence determines end-to-end transmission throughput. Additionally, fine-tuning of the parameters alleviates workload on high-end systems. Until now, many studies have concentrated on how to increase transmission throughput but rarely discussed how to mitigate system workload. In this paper, we have investigated various tuning parameters, which positively affect networking and processing performance of uncompressed HDTV system.
An Efficient Checkpoint Protocol in Wireless Sensor Network for Reliability
Jung, Dong-Won ; Choi, Chang-Yeol ; Kim, Sung-Soo ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 583~594
DOI : 10.3745/KIPSTC.2006.13C.5.583
The reliability concept of wireless sensor network is essential to get exactly actual data from the ubiquitous environment. A rollback technique for the self-healing helps to increase it. However, a fault can occur in wireless sensor network when to use a previous rollback technique because it is designed just for the local system. So, checkpoint protocols are suggested in order to use a rollback technique in the network without the fault. However, there is trade-off among performance overhead, power consumption, and memory overhead for each of protocols. Hence, we suggest a novel global checkpoint protocol, so called address log based protocol(ALBP), based on an asynchronous protocol. It is a platform based protocol to reduce power consumption, performance overhead, and memory overhead which are the most of consideration in wireless sensor network.
Authentication Protocol Of The Read Only RFID Tag Using Partial ID
Li, Yong-Zhen ; Jeong, Yonn-Su ; Seo, Dong-Il ; Lee, Sang-Ho ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 595~600
DOI : 10.3745/KIPSTC.2006.13C.5.595
Nowadays, low-cost radio frequency identification (RFID) technique, is recognizable without the physical contact between the reader and the tag, has been attracting more and more interests from both industry and academic institutes. however, it causes the serious privacy infringement such as excessive information exposure and user`s location information tracking due to the wireless characteristics. The security problem of read only tag can be only solved by physical method. In this paper, we propose a low-cost authentication protocol which can be adopted for read-only RFID tag using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping and spoofing attacking so that avoiding the location privacy exposure
Application of LLR on Cooperative Communications for Wireless Relay Networks
Khuong Ho Van ; Kong Hyung-Yun ; Lee Dong-Un ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 601~606
DOI : 10.3745/KIPSTC.2006.13C.5.601
Decode-and-forward cooperative communications protocol (DFP) allows single-antenna users in wireless medium to obtain the powerful benefits of multi-antenna systems without physical antenna arrays. For this protocol, so far the relays have used SNR to evaluate the reliability of the received signal before deciding whether to forward the decoded data so as to prevent their unsuccessful detection. However, SNR only characterizes the long-term statistic of Gaussian noise and thus leading to inaccurate assesment. Therefore, we propose using log-likelihood ratio (LLR) which accounts for the instantaneous noise in the received signal as an alternative to SNR. A variety of simulation results reveal the significant superiority of the SNR-based DFP to the SNR-based DFP regardless of threshold level and relay position under the flat Rayleigh fading channel plus AWGN (Additive White Gaussian Noise).
A Study of UMTS-WLAN Interworking Architecture for Guaranteeing QoS
Kim, Hyo-Jin ; Yu, Su-Jung ; Lee, Jung-Kap ; Song, Joo-Seok ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 607~612
DOI : 10.3745/KIPSTC.2006.13C.5.607
Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) have been developed independently. Then, many researchers have studied UMTS-WLAN interworking architecture for the efficiency. However, the transmission capacity difference of two networks causes the transmission quality degradation. Therefore, this paper proposes a UMTS-WLAN interworking architecture for Quality of Service (QoS). The proposed architecture is based on tight coupling and dynamically guarantees QoS by the mobility prediction method. The proposed architecture is simulated by ns-2. Performance experimental results show that the proposed architecture reduces the handover dropping probability comparing with the existing method and enhances the amount of receiving packets comparing with the method without guaranteeing QoS.
DiffServ QoS Support in DSL Broadband Access Networks
Park, Seung-Chul ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 613~620
DOI : 10.3745/KIPSTC.2006.13C.5.613
From both techlical and economic viewpoints, DiffServ IP QoS architecture is accepted as a more practical solution because of the complexity Problem of the other IntServ architecture. In this paper, we propose several models to support DiffServ QoS in DSL broadband access networks and discuss about migration path from current best-effort DSL networks to DiffServ-enabled ones. Since DSL networks are recently and widely deployed in the world amount ot new investment, compatibility with existing QoS-unaware DSL systems, and compatibility with existing charging systems as well as effective support of various QoS services must be carefully considered when we design DiffServ QoS support models in DSL networks. The DiffServ models proposed in this paper are divided into static DiffServ models and dynamic DiffServ models which are near-term solutions and long-term solutions repecitively. The static DiffServ models include Flat DiffServ which suworts per-subscriber DiffServ QoS and Structured DiffServ which supports per-subscriber and per-service DiffServ QoS. And the dynamic DiffServ models include Direct DiffServ for P2P(Peer to Peer) applications and Indirect DiffServ for ASP(Application Service Provider) applications.
Load Balancing Schemes in the MANET with Multiple Internet Gateways
Kim, Young-Min ; Lim, Yu-Jin ; Yu, Hyun ; Lee, Jae-Hwoon ; Ahn, Sang-Hyun ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 621~626
DOI : 10.3745/KIPSTC.2006.13C.5.621
A mobile ad hoc network (MANET) is an infrastructureless network that supports multi-hop communication. For the MANET nodes wishing to communicate with nodes in the wired Internet, the global Internet connectivity is required and this functionality can be achieved with the help of the Internet gateway. For the support of reliability and flexibility, multiple Internet gateways can be provisioned for a MANET. In this case, load-balancing becomes one of the important issues since the network performance such as the network throughput can be improved if the loads of the gateways are well-balanced. In this paper, we categorize the load-balancing mechanisms and propose a new metric for load-balancing. Simulation results show that our proposed mechanism using the hop distance and the number of routing table entries as a load-balancing metric enhances the overall network throughput.
A Study on Hierarchical Overlay Multicast Architecture in Mobile Ad Hoc Networks
Kim, Kap-Dong ; Park, Jun-Hee ; Lee, Kwang-Il ; Kim, Hag-Young ; Kim, Sang-Ha ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 627~634
DOI : 10.3745/KIPSTC.2006.13C.5.627
Overlay network eliminates the need to change the application-layer tree when the underlying network changes and enables the overlay network to survive in environments where nonmember nodes do not support multicast functionality. An overlay protocol monitors group dynamics, while underlying unicast protocols track network dynamics, resulting in more stable protocol operation and low control overhead even in a highly dynamic environment. But, if overlay multicast protocols does not know the location information of node, this makes it very difficult to build an efficient multicasting tree. So, we propose a Hierarchical Overlay Multicast Architecture (HOMA) with the location information. Because proposed architecture makes static region-based dynamic group by multicast members, it is 2-tired overlay multicasts of application layer that higher layer forms overlay multicast network between members that represent group, and support multicast between multicast members belonging to region at lower layer. This use GPS, take advantage of geographical region, and realizes a region-sensitive higher layer overlay multicast tree which is impervious to the movements of nodes. The simulation results show that our approach solves the efficiency problem effectively.
Improving the Performance of TCP over Wired-Wireless Networks Using the Received Signal Strengths of Mobile Host
Kim, Jin-Hee ; Kwon, Kyun-Hee ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 635~640
DOI : 10.3745/KIPSTC.2006.13C.5.635
The Snoop in the BS (Base Station) performs a local retransmission over wired-wireless networks to recover packet loss quickly. However, when the MH (Mobile Host) leaves the reception range of the signal, the local retransmission causes performance to degrade. In this paper, we minimize the packet loss and local retransmission caused by the unreachability from BS to MH to improve network performance. To do this, we suggest to add RSS(Received Signal Strengths) flag bit in ACK packet of MH. By using this flag bit, the BS decides whether it retransmits or not to minimize packet loss. The result of the simulation by ns-2 shows a big improvement of performance in the networks.
Software Release Management System : ThinkSync DM-SoftMan for Wireless Device based on OMA DM
Ju, Hong-Taek ; Park, Kee-Hyun ; Bang, Dae-Wook ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 641~650
DOI : 10.3745/KIPSTC.2006.13C.5.641
There has been a continued increase in the complexity of software equipped with wireless mobile devices, due to the introduction of new device functionality and services via network connection. The increasement expected to be accelerated by convergence of telecommunication and broadcasting, and proliferation of telematics and home networking services using wireless mobile devices. The higher the complexity of mobile device software, the higher the necessity of management for the software. As for the global standard of mobile device management technology, OMA DM has been widely adopted by device manufacture and expected to be accelerated its adoption. In this paper, we present a development result of mobile device software release management system ThinkSync DM SoftMan. The implementation details of ThinkSync DM SoftMan are provided in implementation architecture and its working scenario based on the design of ThinkSync DM SoftMan that is summarized in this paper as our previous work. The conformance and performance test of the system are presented.
Prefetching Methods with User`s Preference in Mobile Computing Environment
Choi, In-Seon ; Cho, Gi-Hwan ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 651~658
DOI : 10.3745/KIPSTC.2006.13C.5.651
Mobile computing environment is known to be quite difficult to provide user with a stable QoS(Qualify of Service) due to its mobility nature. In order to protect the inherent characteristics of wireless network such as low bandwidth and high transmission delay along with the user`s mobility, many works are conducted to apply caching and prefetching methods. This paper presents a novel prefetching technique which is based on user`s preference, that is, interest and Uuかity. It tries to improves the effectiveness of prefetching by separating and appling the interest with personal tendency of a given information, and the popularity with general tendency of the information. The proposed scheme shown relatively superior performance in terms of the utilization ratio of prefetched information and the failure ratio of information retrieval than the existing methods.
Comparison and Analysis of Mobility Support Schemes for NGN standardization plan
Yu, Myoung-Ju ; Lee, Jong-Min ; Kim, Hyun-Jong ; Jeong, Tae-Soo ; Choi, Seong-Gon ;
The KIPS Transactions:PartC, volume 13C, issue 5, 2006, Pages 659~668
DOI : 10.3745/KIPSTC.2006.13C.5.659
Various schemes for mobility support are currently proposed in NGN. However the performance comparison of all existing schemes is not relatively examined as yet. Therefore, in this paper, we investigate the location registration and handover procedure of MIPv6, IP2, Q.MMF, IMS, compare and analyze the location registration time and cost and handover latency time using various performance parameters and simulation for the performance analysis. As a result of analysis, when Location Manager locates in the center of core network, IP2 showed better performance than other schemes.