Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 14C, Issue 7 - Dec 2007
Volume 14C, Issue 6 - Oct 2007
Volume 14C, Issue 5 - Aug 2007
Volume 14C, Issue 4 - Aug 2007
Volume 14C, Issue 3 - Jun 2007
Volume 14C, Issue 2 - Apr 2007
Volume 14C, Issue 1 - Feb 2007
Selecting the target year
A Study on Validation Testing for Input Files of MS Word-Processor
Yun, Young-Min ; Choi, Jong-Cheon ; Yoo, Hae-Young ; Cho, Seong-Je ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 313~320
DOI : 10.3745/KIPSTC.2007.14-C.4.313
In this paper, we propose a method to analyze security vulnerabilities of MS word-processor by checking the validation of its input files. That is, this study is to detect some vulnerabilities in the input file of the word processor by analyzing the header information of its input file. This validation test can not be conducted by the existing software fault injection tools including Holodeck and CANVAS. The proposed method can be also applied to identify the input file vulnerabilities of Hangul and Microsoft Excel which handle a data file with a header as an input. Moreover, our method can provide a means for assessing the fault tolerance and trustworthiness of the target software.
A Design and Implementation of Two-Phase Server Login Authentication System based on XML-Signature Extension
Kim, Yong-Hwa ; Kim, Jin-Sung ; Kim, Yong-Sung ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 321~330
DOI : 10.3745/KIPSTC.2007.14-C.4.321
This paper proposes a two-phase server login authentication system by XML-Signature schema extension to protect server`s information resources opened on network which offer various web contents. A proposed system requests and publishes XML-based certificate through on-line, registers certificate extension information provided by CA(Certification Authority) to XCMS(XML Certificate Management Server), and performs prior authentication using user`s certificate password. Then, it requests certificate extension information added by user besides user`s certificate password and certificate extension information registered in XCMS by using SOAP message, and performs posterior authentication by comparing these certificate extension information. As a result, a proposed system is a security reinforced system compared with existing systems.
A Study of Java-based PKI System for Secure Authentication on Mobile Devices
Choi, Byeong-Seon ; Kim, Sang-Kuk ; Chae, Cheol-Joo ; Lee, Jae-Kwang ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 331~340
DOI : 10.3745/KIPSTC.2007.14-C.4.331
Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.
Secret Information Protection Scheme for Device in Home Network
Maeng, Young-Jae ; Kang, Jeon-Il ; Mohaisen, Abedelaziz ; Lee, Kyung-Hee ; Nyang, Dae-Hun ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 341~348
DOI : 10.3745/KIPSTC.2007.14-C.4.341
Even though the secret information stored in home device in home network must be handled very safely and carefully, we have no measure for protecting the secret information without additional hardware support. Since already many home devices without consideration of the security have been used, the security protection method for those devices have to be required. In this paper, we suggest two schemes that protect the security information using networking function without additional hardware support, and those hybrid method to supplement the defects of each scheme. We also consider the our proposals in the aspects of security and cost.
Dynamic Bandwidth Allocation Algorithm with Two-Phase Cycle for Ethernet PON
Yoon, Won-Jin ; Lee, Hye-Kyung ; Chung, Min-Young ; Lee, Tae-Jin ; Choo, Hyun-Seung ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 349~358
DOI : 10.3745/KIPSTC.2007.14-C.4.349
Ethernet Passive Optical Network(EPON), which is one of PON technologies for realizing FTTx(Fiber-To-The-Curb/Home/Office), can cost-effectively construct optical access networks. In addition, EPON can provide high transmission rate up to 10Gbps and it is compatible with existing customer devices equipped with Ethernet card. To effectively control frame transmission from ONUs to OLT EPON can use Multi-Point Control Protocol(MPCP) with additional control functions in addition to Media Access Control(MAC) protocol function. For EPON, many researches on intra- and inter-ONU scheduling algorithms have been performed. Among the inter-ONU scheduling algorithms, IPS(Interleaved Polling with Stop) based on polling scheme is efficient because OLT assigns available time portion to each ONU given the request information from all ONUs. Since the IPS needs an idle time period on uplink between two consecutive frame transmission periods, it wastes time without frame transmissions. In this paper, we propose a dynamic bandwidth allocation algorithm to increase the channel utilization on uplink and evaluate its performance using simulations. The simulation results show that the proposed Two-phase Cycle Danamic Bandwidth Allocation(TCDBA) algorithm improves the throughput about 15%, compared with the IPS and Fast Gate Dynamic Bandwidth Allocation(FGDBA). Also, the average transmission time of the proposed algorithm is lower than those of other schemes.
Overlay Multicast using Geographic Information in MANET
Lim, Yu-Jin ; Ahn, Sang-Hyun ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 359~364
DOI : 10.3745/KIPSTC.2007.14-C.4.359
Current researches on the overlay multicast mechanism in the mobile ad hoc network (MANET) maintain the network topology information of the dynamically changing MANET, which may cause severe overhead. In this paper, we propose a new overlay multicast mechanism, the region-based overlay multicast in MANET(ROME), using the geometric locations of group members. In ROME, the physical topology is divided into small regions and the scope of location updates of group members is limited to a single region. ROME provides scalability by using the coordinate of the center point of a destination region as the destination of a data packet instead of the list of member addresses of that region. Our simulation results show that ROME gives better performance in terms of the packet overhead than other schemes.
TECDS Protocol for Wireless Ad Hoc Networks
Kim, Bo-Nam ; Yang, Jun-Mo ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 365~370
DOI : 10.3745/KIPSTC.2007.14-C.4.365
Connected Dominating Set(CDS) has been used as a virtual backbone in wireless ad hoc networks by numerous routing and broadcast protocols. Although computing minimum CDS is known to be NP-hard, many protocols have been proposed to construct a sub-optimal CDS. However, these protocols are either too complicated, needing non- local information, not adaptive to topology changes, or fail to consider the difference of energy consumption for nodes in and outside of the CDS. In this paper, we present two Timer-based Energy-aware Connected Dominating Set Protocols(TECDS). The energy level at each node is taken into consideration when constructing the CDS. Our protocols are able to maintain and adjust the CDS when network topology is changed. The simulation results have shown that our protocols effectively construct energy-aware CDS with very competitive size and prolong the network operation under different level of nodal mobility.
Design of a Real-time Sensor Node Platform for Efficient Management of Periodic and Aperiodic Tasks
Kim, Byoung-Hoon ; Jung, Kyung-Hoon ; Tak, Sung-Woo ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 371~382
DOI : 10.3745/KIPSTC.2007.14-C.4.371
In this paper, we propose a real-time sensor node platform that efficiently manages periodic and aperiodic tasks. Since existing sensor node platforms available in literature focus on minimizing the usage of memory and power consumptions, they are not capable of supporting the management of tasks that need their real-time execution and fast average response time. We first analyze how to structure periodic or aperiodic task decomposition in the TinyOS-based sensor node platform as regard to guaranteeing the deadlines of ail the periodic tasks and aiming to providing aperiodic tasks with average good response time. Then we present the application and efficiency of the proposed real-time sensor node platform in the sensor node equipped with a low-power 8-bit microcontroller, an IEEE802.15.4 compliant 2.4GHz RF transceiver, and several sensors. Extensive experiments show that our sensor node platform yields efficient performance in terms of three significant, objective goals: deadline miss ratio of periodic tasks, average response time of aperiodic tasks, and processor utilization of periodic and aperiodic tasks.
A Design of New Transmission Signal Structure for User Cooperative Communication
Jeong, Hwi-Jae ; Kong, Hyung-Yun ;
The KIPS Transactions:PartC, volume 14C, issue 4, 2007, Pages 383~388
DOI : 10.3745/KIPSTC.2007.14-C.4.383
In this paper, we propose a new signal frame structure based on Alamouti code that can maintain the same performance as Alamouti code and increase spectral efficiency. The proposed signal frame structure can increase spectrum efficiency to approach 1(bit/s/Hz) since it can process n bit data during (n+1) time slot. In order to verify two performances, we derive closed form BER via mathematical approach, and compare with the simulation result in Rayleigh fading plus AWGN channel. Then we find that the two performances are exactly same.