Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 15C, Issue 6 - Dec 2008
Volume 15C, Issue 5 - Oct 2008
Volume 15C, Issue 4 - Aug 2008
Volume 15C, Issue 3 - Jun 2008
Volume 15C, Issue 2 - Apr 2008
Volume 15C, Issue 1 - Feb 2008
Selecting the target year
Design and Implementation of Method of Authentication and Cryptography between EPC Systems
Kim, Dae-Jung ; Kim, Jung-Jae ; Lee, Seung-Min ; Jun, Moon-Seog ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 439~446
DOI : 10.3745/KIPSTC.2008.15-C.6.439
Recently, the importance of EPCglobal Network and brisk researches on the RFID technologies and application have been increasing, also a number of industries including distribution and logistics are proposing various systems of the application. The Standard for EPCglobal Network, as now being in the process of its legislation, stipulates X.509 only for the method of encryption, without accurate specifications. This paper is, thus, to suggest the way of sending safely messages for the web-based service constituting EPCglobal Network, of verifying whether the received messages are effective, of encoding the messages for safer sending and of certifying between systems, and then to implement the way.
An OTP(One Time Password) Key Generation Method and Simulation using Homomorphic Graph by the Fingerprint Features
Cha, Byung-Rae ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 447~454
DOI : 10.3745/KIPSTC.2008.15-C.6.447
In this paper, we propose new technique which uses the fingerprint features in order to generate one time passwords(OTPs). Fingerprint is considered to be one of the powerful personal authentication factors and it can be used for generating variable passwords for one time use. Also we performed a simulation of homomorphic graph variable of fingerprint feature point using dendrogram and distribution of fingerprint feature points for proposed password generation method.
RBAC-based Trust Negotiation Model for Grid Security
Cho, Hyun-Sug ; Lee, Bong-Hwan ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 455~468
DOI : 10.3745/KIPSTC.2008.15-C.6.455
In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.
A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem
Lim, Ji-Hwan ; Oh, Hee-Kuck ; Kim, Sang-Jin ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 469~480
DOI : 10.3745/KIPSTC.2008.15-C.6.469
The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.
AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment
Moon, Jong-Sik ; Lee, Im-Yeong ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 481~492
DOI : 10.3745/KIPSTC.2008.15-C.6.481
With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.
Context-based Dynamic Access Control Model for u-healthcare and its Application
Jeong, Chang-Won ; Kim, Dong-Ho ; Joo, Su-Chong ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 493~506
DOI : 10.3745/KIPSTC.2008.15-C.6.493
In this paper we suggest dynamic access control model based on context satisfied with requirement of u-healthcare environment through researching the role based access control model. For the dynamic security domain management, we used a distributed object group framework and context information for dynamic access control used the constructed database. We defined decision rule by knowledge reduction in decision making table, and applied this rule in our model as a rough set theory. We showed the executed results of context based dynamic security service through u-healthcare application which is based on distributed object group framework. As a result, our dynamic access control model provides an appropriate security service according to security domain, more flexible access control in u-healthcare environment.
Design of High Speed Modular Exponentiation Operation Method for RSA Algorithm
Kim, Kap-Yol ; Lee, Chul-Soo ; Park, Seok-Cheon ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 507~512
DOI : 10.3745/KIPSTC.2008.15-C.6.507
At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.
An Proxy Trajectory Based Storage in Sensor Networks
Lim, Hwa-Jung ; Lee, Heon-Guil ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 513~522
DOI : 10.3745/KIPSTC.2008.15-C.6.513
Efficient data dissemination is one of the important subjects for sensor networks. High accessibility of the sensed data can be kept by deploying the data centric storage approach in which data is stored over the nodes in the sensor network itself rather than external storages or systems. The advantage of this approach is its direct accessibility in a real-time without the severe burden on delay and power dissipation on the data path to the external storages or systems. However, if the queries from many users are concentrated to the few nodes with data, then the response time could be increased and it could lead to the reduction of network life time by rapid energy dissipation caused by concentrated network load. In this paper, we propose a adaptive data centric storage scheme based on proxy trajectory (APT) mechanism. We highlight the data centric storage mechanism by taking account of supporting large number of users, and make it feasible to provide high-performance accessibility when a non-uniform traffic pattern is offered. Storing data around the localized users by considering spatial data-access locality, the proxy trajectory of APT provides fast response for the users. The trajectory, furthermore, may help the mobile users to roams freely within the area they dwell.
Queuing Analysis Model for the SR-ARQ Protocol with a Finite Retransmission Persistence
Han, Je-Chan ; Kim, Beom-Joon ; Lee, Jai-Yong ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 523~530
DOI : 10.3745/KIPSTC.2008.15-C.6.523
In this paper, we analyze the mean queuing delay of selective-repeat automatic repeat request (SR-ARQ) protocol with the finite retransmission persistence. The retransmission persistence means the willingness of the protocol to retransmit a lost (or corrupted) packet to ensure reliable packet delivery across a lossy link. According to the retransmission persistence, SR-ARQ protocols have a different performance in terms of both packet delay and link reliability. So far, however, there is no serious study in the effect of the retransmission persistence on the SR-ARQ performance. We present a simple M/G/1 queuing model for the SR-ARQ protocol with the finite retransmission persistence by using the ideal SR-ARQ approximation. The mean queuing delay is obtained from the queuing model and verified its accuracy through the simulation results using the OPNET simulator. Both the analytical predictions and simulation results clearly show the effect of retransmission persistence on the queuing delay of the SR-ARQ protocol in various network conditions: packet loss rate and traffic condition over a wireless link.
A Study of Routing based on Adjacency Matrix in Ad hoc Networks
Lee, Sung-Soo ; Kim, Jeong-Mi ; Park, Hee-Joo ; Kim, Chong-Gun ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 531~538
DOI : 10.3745/KIPSTC.2008.15-C.6.531
With the dynamic and mobile nature of ad hoc networks, links may fail due to topology changes. So, a major challenge in ad hoc network is dynamically to search paths from a source to destination with an efficient routing method, which is an important issue for delay-sensitive real-time application. The main concerns of graph theory in communications are finding connectivity and searching paths using given nodes. A topology of the nodes in ad hoc networks can be modeled as an adjacency matrix. In this paper, based on this adjacency matrix, we propose new path search algorithms using a sequence of matrix calculation. The proposed algorithms can search paths from a destination to a source using connectivity matrix. Two matrix-based algorithms for two different purposes are proposed. Matrix-Based Backward Path Search(MBBS) algorithm is designed for shortest path discovery and Matrix-Based Backward Multipath Search(MBBMS) algorithm is for multipath search.
Address Configuration and Route Determination in the MANET Connected to the External Network
Lee, Jae-Hwoon ; Ahn, Sang-Hyun ; Yu, Hyun ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 539~546
DOI : 10.3745/KIPSTC.2008.15-C.6.539
In this paper, we propose an address autoconfiguration mechanism and a route establishment mechanism appropriate for the modified MANET architecture which overcomes the multi-link subnet problem. For the delivery of Router Advertisement (RA) messages without causing the duplicate packet reception problem in the multi-hop wireless network environment, the Scope-Extended RA (Scope-Extended Router Advertisement) message is defined. Also, by defining the MANET Prefix option, a MANET node is allowed to send packets destined to a host not in the MANET directly to the gateway. This can prevent the performance degradation caused by broadcasting control messages of the reactive routing protocol for route establishment. The performance of the proposed mechanism is analyzed through NS-2 based simulations and, according to the simulation results, it is shown that the proposed mechanism performs well in terms of the control message overhead.
Network Adaptive Prefetching for Constant QoS Guarantee in Media Streaming
Lee, Joa-Hyoung ; Jung, In-Bum ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 547~556
DOI : 10.3745/KIPSTC.2008.15-C.6.547
Recently, with the advance of computing and networking technique, the high speed internet becomes widespread, however, it is still hard job to do streaming the media which requires high network bandwidth over the internet. Previous researches for streaming over the internet mainly proposed techniques that controls the QoS(Quality of Service) of the media in proportion to the network status. Though, this could be the solution for the service provider while the service user who wants constant QoS may not satisfy with variable QoS. In the paper, we propose a network adaptive prefetching technique, NAP, for guarantee of constant QoS. The NAP prefetches frames by increasing the frame transmission rate while the available network bandwidth is high. The NAP uses the prefetched frames to guarantee the QoS while the available network bandwidth is low. The experiment result shows that the proposed NAP could guarantee the constant QoS by prefetching the frames adaptively to the network bandwidth with the characteristic of video stream.
Overlay Multicast Mechanism Supporting Differentiated QoS According to Service Level and User Environment over NGN
Rhee, Bo-Young ; Cho, Sung-Chol ; Han, Sun-Young ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 557~566
DOI : 10.3745/KIPSTC.2008.15-C.6.557
NGN(Next Generation Network) is a communication network which can make use of broadband and QoS-enabled transport technologies. One of the main service issues over NGN is a multimedia service, such as IPTV, using a multicast method. And overlay multicast technology is one of the promising solutions instead of traditional multicast technology which has a few problems, and supports flexibility and scalability for multicast services. Also, the main controversial topic in NGN and overlay multicast is QoS. In the present paper, we designed an agent in each receiver's network, and a manager which is in a source network and which manages the whole multicast network. Both of them are communicating with each other and applying resource policies to their multicast network. This mechanism enables overlay multicast to support QoS, focusing on RACF(Resource and Admission Control Functions) in NGN QoS architecture.
Encapsulation of IP Traffic through GFP in OTN Transmission Network
Lee, Chang-Ki ; Yang, Choong-Reol ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 567~572
DOI : 10.3745/KIPSTC.2008.15-C.6.567
It is necessary to study about the scheme to accept IP traffic effectively in OTN, according to expect that IP traffic data will be increase constantly. In this paper, we studied the encapsulation method of IP traffic through GFP in OTN transmission network. Therefore we knew the IP/GFP/OTN method is more efficient than existing methods from structure, overhead rates and possibility of grow, and showed the functional block of high level about this method. Also we showed the implementation scheme of this method by processing the functional simulation to make use of VHDL programming.
A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key
Kang, Ho-Seok ; Shim, Young-Chul ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 573~586
DOI : 10.3745/KIPSTC.2008.15-C.6.573
The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.
Design and Performance Analysis of Active Router for Performance Improvement of Active Network
Kim, Cheol-Joong ; Jung, Sun-Hwa ; Park, Seok-Cheon ;
The KIPS Transactions:PartC, volume 15C, issue 6, 2008, Pages 587~594
DOI : 10.3745/KIPSTC.2008.15-C.6.587
An Active Network is the next generation network that endows ""save program"" and ""execute program"" function to router and switch located middle of the network. Although there are many studies about active network technology to overcome the limitation of Internet but the studies are stagnant at just traffic control level. Also studies mainly focus on active router-constructed network so introduction into current network is hard. This paper implemented and evaluated active router that adopt a ""copy and forward"" method to resolve these problems. It reduces active packet handling time in active router so efficiency of network can be increased.