Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 15C, Issue 6 - Dec 2008
Volume 15C, Issue 5 - Oct 2008
Volume 15C, Issue 4 - Aug 2008
Volume 15C, Issue 3 - Jun 2008
Volume 15C, Issue 2 - Apr 2008
Volume 15C, Issue 1 - Feb 2008
Selecting the target year
Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network
Kim, Eun-Kyung ; Seo, Jae-Won ; Chae, Ki-Joon ; Choi, Doo-Ho ; Oh, Kyung-Hee ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 329~342
DOI : 10.3745/KIPSTC.2008.15-C.5.329
The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.
A Study on User Authentication for Roaming in Mobile Device
Kang, Seo-Il ; Park, Choon-Sik ; Lee, Im-Yeong ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 343~350
DOI : 10.3745/KIPSTC.2008.15-C.5.343
In ubiquitous environment, a user has been provided with service and mobility using various devices. The users' network can be divided into a home network (a user belongs to the network through an authentication server) and an external network (when a user moves or external authentication server is). Users can use a mobile device or a device at an external network. In this paper, when a user has access to a service in an external network with a mobile device, there is a skim that a service is securely provided by roaming private information (encryption key etc
) and a skim which gives access to a home network using a device in an external network. If you use these skims, roaming is provided in order that you can use a secure service in an external network.
Traffic Flooding Attack Detection on SNMP MIB Using SVM
Yu, Jae-Hak ; Park, Jun-Sang ; Lee, Han-Sung ; Kim, Myung-Sup ; Park, Dai-Hee ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 351~358
DOI : 10.3745/KIPSTC.2008.15-C.5.351
Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems(IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network environment. In this paper we propose a lightweight and fast detection mechanism for traffic flooding attacks. Firstly, we use SNMP MIB statistical data gathered from SNMP agents, instead of raw packet data from network links. Secondly, we use a machine learning approach based on a Support Vector Machine(SVM) for attack classification. Using MIB and SVM, we achieved fast detection with high accuracy, the minimization of the system burden, and extendibility for system deployment. The proposed mechanism is constructed in a hierarchical structure, which first distinguishes attack traffic from normal traffic and then determines the type of attacks in detail. Using MIB data sets collected from real experiments involving a DDoS attack, we validate the possibility of our approaches. It is shown that network attacks are detected with high efficiency, and classified with low false alarms.
CipherSuite Setting Problem of SSL Protocol and It's Solutions
Lee, Yun-Young ; Hur, Soon-Haeng ; Park, Sang-Joo ; Shin, Dong-Hwi ; Won, Dong-Ho ; Kim, Seung-Joo ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 359~366
DOI : 10.3745/KIPSTC.2008.15-C.5.359
As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session through the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.
The Research about Voice Transmission between CDMA Network and PSTN Network Using CDMA Circuit Data Service
Park, Yong-Seok ; Ahn, Jae-Hwan ; Ryou, Jae-Cheol ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 367~374
DOI : 10.3745/KIPSTC.2008.15-C.5.367
To realize the voice privacy between CDMA mobile phone and PSTN terminal, the voice frames shall be transmitted transparently between the heterogeneous networks. For satisfying this requirement, we propose the method which transmits voice frames using the CDMA circuit data channel in real time. In this paper we analyze the causes of voice delay which occurs during voice transmission using circuit data channel. And in order to overcome this kind of delay, the technique controlling the TCP control flag and the variable audio block construction algorithm according to the vocoder output rate are proposed. As a result of experimenting by applying the proposed method, we confirmed that the transit delay was improved with about average 70%.
A Probabilistic Load Balancing Scheme for Improving Service Quality of a Wireless Mesh Network
Park, Jae-Sung ; Lim, Yu-Jin ; Ahn, Sang-Hyun ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 375~382
DOI : 10.3745/KIPSTC.2008.15-C.5.375
As the use of Internet and information communication technology is being generalized, the SSL protocol is essential in Internet because the important data should be transferred securely. While the SSL protocol is designed to defend from active attack such as message forgery and message alteration, the cipher suite setting can be easily modified. If the attacker draw on a malfunction of the client system and modify the cipher suite setting to the symmetric key algorithm which has short key length, he should eavesdrop and cryptanalysis the encrypt data. In this paper, we examine the domestic web site whether they generate the security session in the symmetric key algorithm which has short key length and propose the solution of the cipher suite setting problem.
Data Dissemination Protocol based on Home Agent and Access Node for Mobile Sink in Sensor Network
Lee, Joa-Hyoung ; Jung, In-Bum ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 383~390
DOI : 10.3745/KIPSTC.2008.15-C.5.383
The mobile sink is most suitable to guarantee the real time processing to events in ubiquitous environment. However it brings many challenges to wireless sensor networks. In particular, the question of how to transfer the collected data to the mobile sink is an important topic in the aspect of effective management of wireless sensor nodes. In this paper, a new data dissemination model is proposed. Since this method uses the home agent and the access node concepts, it provides reliable and efficient data delivery to mobile sink with minimum overhead. In this proposed method, the information of the mobile sink which is constantly moving is informed only to the home agent node and the access node, instead of all sensor nodes. Thus, the collected data from sensor nodes are transferred to the fixed home agent and it sends these data to the mobile sink. Since the confliction phenomenon between data packets in wireless networks could be reduced, the success ratio of data arriving in the mobile sink is highly enhanced. In our experiments, the proposed method reduces the number of broadcast packets so that it saves the amount of energy consumed for transmitting and receiving the data packets. This effect contributes to prolong the lifetime of the wireless sensor networks operated by batteries.
Dynamic Buffer Allocation for Seamless IPTV Service Considering Handover Time and Jitter
Oh, Jun-Seok ; Lee, Ji-Hyun ; Lim, Kyung-Shik ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 391~398
DOI : 10.3745/KIPSTC.2008.15-C.5.391
To provide IPTV service over mobile networks, the mechanism that reduce packet loss and interrupt of multimedia service during the handover should be supported. Especially, buffering based mechanism is preferable for supporting IPTV services in the way of preserving streaming service using stored data and recovering non-received data after handover. But previous research doesn't consider the buffer allocation for applying various environments which can change handover time or end to end delay of relay node. This paper propose DBAHAJ mechanism that optimize buffer size of mobile nodes and relay node for supporting seamless IPTV service over mobile environments. Mobile node determines buffer size by checking handover time and maximum difference of sequence to keep playing video data. And multicast agent recovers packet loss during the handover by sending buffered data. By these two procedure, node supports seamless IPTV service on mobile networks. We confirm performance of this mechanism on NS-2 simulator.
Performance Analysis of ROHC RTP profile for Efficient Utilization of the bandwidth in Mobile WiMAX
Woo, Hyun-Je ; Kim, Joo-Young ; Kwon, Jeong-Min ; Lee, Mee-Jeong ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 399~408
DOI : 10.3745/KIPSTC.2008.15-C.5.399
Mobile WiMAX provides wireless broadband services for data communication based on IP protocol. The limitation of physical bandwidth in the radio links may cause performance degradation in providing wireless broadband services in WIMAX. To enhance the efficiency of the radio link utilization, Payload Header Suppression (PHS) is defined as an optional header compression mechanism for mobile WiMAX. It has, however, a very limited compression capability since it has very restrictive compression fields. In this paper, hence, we assumed the application of Robust Header Compression (ROHC), a header compression scheme proposed for links characterized by high bit error ratios, long round-trip times (RTT), and scarce resource, to Mobile WiMAX, and studied its performance. Previous studies on ROHC performance merely focused on the impact of high bit error rate. However, bit error is virtually transparent to ROHC in the wireless systems like WiMAX, since the MAC provides the bit error checking function. In order to evaluate the performance of ROHC in the Mobile WiMAX environments, therefore, we evaluated the performance of ROHC with respect to the packet losses instead of bit error. We investigated the impact of the ROHC parameters that are recommended for the implementation in the ROHC and compared the performance of ROHC with PHS.
Embedded Processor based PPP Implementation for Globalstar Satellite Modem
Moon, Hyun-Geol ; Lee, Myung-Eui ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 409~418
DOI : 10.3745/KIPSTC.2008.15-C.5.409
In this paper, we programed the PPP(Point-to-Point Protocol) used in embedded application environments for Globalstar Satellite Modem. There are number of satellite communication systems such as Orbcomm, Globalstar, Inmarsat and etc. But each satellite data service have provided a communication interface only for their own data links. A data communication link is needed to communicate with Globalstar satellite service. Globalstar communication system uses PPP to establish data communication link, so we implemented the embedded processor based PPP protocol. The user terminal equipment also designed in this paper has various input/output devices and sensors applicable to any user specific application. The proposed PPP program works well with Globalstar data communication link through experimental tests.
An Analytical Model for GTS Service Delay of IEEE 802.15.4 with Two Priority Queues
Lee, Kang-Woo ; Shin, Youn-Soon ; Ahn, Jong-Suk ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 419~428
DOI : 10.3745/KIPSTC.2008.15-C.5.419
IEEE 802.15.4 reserves transmission time to support real-time transport by sending GTS request packets to the PAN coordinator in advance. This paper introduces GTS-FAT technique to reduce the reservation time by giving a higher sending priority to GTS request packets than data packets. Differently from the conventional scheme where these two kinds of packets share a single transmission queue, GTS-FAT scheme allocates two queues with two different contention window sizes like IEEE 802.11e. This paper also proposes an analytical GTS delay model by combining the two legacy models for 802.15.4 and 802.11e to accurately predict the GTS-FAT delay over a given network topology. Our analysis shows that GTS-FAT reduces GTS service delay by up to 50% at the expense of the data delay by only up to 6.1% when GTS request packets four times outnumber data packets.
Mapping of QoS Information Elements and Implementation of Rs/Rw Interface Resource Control Protocols in NGN
Jeon, Jin-Su ; Kim, Hae-Hyun ; Cha, Young-Wook ; Kim, Choon-Hee ; Jeong, You-Hyeon ;
The KIPS Transactions:PartC, volume 15C, issue 5, 2008, Pages 429~438
DOI : 10.3745/KIPSTC.2008.15-C.5.429
NGN is a packet-based converged network to support session and non-session services in QoS-enabled broadband transport network. QoS based resource control must be defined to support differentiated services for various network users in NGN. We designed and implemented DIAMETER protocol as the Rs interface, and also defined mapping rules between DIAMETER information elements and SDP(Session Description Protocol) attributes for QoS based resource control in NGN. We selected and implemented DIAMETER protocol among alternate resource control protocols in ITU-T as the Rw interface because of simple interworking method with Rs interface and adequate AAA functionality. We defined mapping rules of messages and information elements between Rs and Rw interfaces for resource control from a service layer to a transport layer. Based on the mapping rule of QoS information elements and the interworking method between Rs and Rw interfaces, we built up a test-bed that support differentiated delivery services.