Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 17C, Issue 6 - Dec 2010
Volume 17C, Issue 5 - Oct 2010
Volume 17C, Issue 4 - Aug 2010
Volume 17C, Issue 3 - Jun 2010
Volume 17C, Issue 2 - Apr 2010
Volume 17C, Issue 1 - Feb 2010
Selecting the target year
Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4
Kim, A-Reum ; Kim, Mi-Hui ; Chae, Ki-Joon ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 1~14
DOI : 10.3745/KIPSTC.2010.17C.1.001
IEEE 802.15.4 has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.
An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks
Seo, Yang-Jin ; Han, Sang-Yong ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 15~26
DOI : 10.3745/KIPSTC.2010.17C.1.015
Social Networks such as `Facebook` and `Myspace` are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.
Reliable Image-Text Fusion CAPTCHA to Improve User-Friendliness and Efficiency
Moon, Kwang-Ho ; Kim, Yoo-Sung ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 27~36
DOI : 10.3745/KIPSTC.2010.17C.1.027
In Web registration pages and online polling applications, CAPTCHA(Completely Automated Public Turing Test To Tell Computers and Human Apart) is used for distinguishing human users from automated programs. Text-based CAPTCHAs have been widely used in many popular Web sites in which distorted text is used. However, because the advanced optical character recognition techniques can recognize the distorted texts, the reliability becomes low. Image-based CAPTCHAs have been proposed to improve the reliability of the text-based CAPTCHAs. However, these systems also are known as having some drawbacks. First, some image-based CAPTCHA systems with small number of image files in their image dictionary is not so reliable since attacker can recognize images by repeated executions of machine learning programs. Second, users may feel uncomfortable since they have to try CAPTCHA tests repeatedly when they fail to input a correct keyword. Third, some image-base CAPTCHAs require high communication cost since they should send several image files for one CAPTCHA. To solve these problems of image-based CAPTCHA, this paper proposes a new CAPTCHA based on both image and text. In this system, an image and keywords are integrated into one CAPTCHA image to give user a hint for the answer keyword. The proposed CAPTCHA can help users to input easily the answer keyword with the hint in the fused image. Also, the proposed system can reduce the communication costs since it uses only a fused image file for one CAPTCHA. To improve the reliability of the image-text fusion CAPTCHA, we also propose a dynamic building method of large image dictionary from gathering huge amount of images from theinternet with filtering phase for preserving the correctness of CAPTCHA images. In this paper, we proved that the proposed image-text fusion CAPTCHA provides users more convenience and high reliability than the image-based CAPTCHA through experiments.
A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack
Lim, Ji-Hwan ; Oh, Hee-Kuck ; Kim, Sang-Jin ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 37~46
DOI : 10.3745/KIPSTC.2010.17C.1.037
In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user`s multi-STB device effectively.
A Method of Statistical Randomness Test for Key Derivation Functions
Kang, Ju-Sung ; Yi, Ok-Yeon ; Youm, Ji-Sun ; Cho, Jin-Woong ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 47~60
DOI : 10.3745/KIPSTC.2010.17C.1.047
Randomness is a basic security evaluation item for the most cryptographic algorithms. NIST has proposed a statistical test suit for random number generators for cryptographic applications in the process of AES project. However the test suit of NIST is customized to block ciphers which have the same input and output lengths. It needs to revise NIST`s test suit for key derivation functions which have multiple output blocks. In this paper we propose a revised method of NIST`s statistical randomness test adequate to the most key derivation functions and some experimental results for key derivation functions of 3GSM and NIST.
Double-layered Peer-to-Peer Systems in MobileAd-hoc Networks
Kim, Ji-Hoon ; Yang, Sung-Bong ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 61~68
DOI : 10.3745/KIPSTC.2010.17C.1.061
As the mobile technology advances, file searching among the mobile device users becomes more important. In this paper, we propose the uniform grid, greedy, and MIS P2P systems that have double-layered topology to search files efficiently for mobile ad-hoc networks. In these systems, peers are classified into two groups, super-peers and sub-peers, and each super-peer manages its neighboring sub-peers. In the proposed systems, each super-peer maintains the appropriate information of its sub-peers so that when a peer requests a file, the request is sent to its super-peers and then to neighboring super-peers. Hence the proposed systems could avoid multi-broadcasting and reduce network overheads. The experimental results show that the proposed systems outperform a single-layered P2P system in terms of the average number of messages to find target files. Especially the MISsystem improves by reducing the average number of messages by 48.9% while maintaining the same search accuracy.
Tree-Based Clustering Protocol for Energy Efficient Wireless Sensor Networks
Kim, Kyung-Tae ; Youn, Hee-Yong ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 69~80
DOI : 10.3745/KIPSTC.2010.17C.1.069
Wireless sensor networks (WSN) consisting of a large number of sensors aim to gather data in a variety of environments and are being used and applied to many different fields. The sensor nodes composing a sensor network operate on battery of limited power and as a result, high energy efficiency and long network lifetime are major goals of research in the WSN. In this paper we propose a novel tree-based clustering approach for energy efficient wireless sensor networks. The proposed scheme forms the cluster and the nodes in a cluster construct a tree with the root of the cluster-head., The height of the tree is the distance of the member nodes to the cluster-head. Computer simulation shows that the proposed scheme enhances energy efficiency and balances the energy consumption among the nodes, and thus significantly extends the network lifetime compared to the existing schemes such as LEACH, PEGASIS, and TREEPSI.
An Energy Efficient Routing Protocol using Transmission Range and Direction for Sensor Networks
Lee, Hyun-Jun ; Lee, Young-Han ; Lee, Kyung-Oh ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 81~88
DOI : 10.3745/KIPSTC.2010.17C.1.081
Sensors in sensor networks are operated by their embedded batteries and they can not work any more if the batteries run out. The data collected by sensors should be transferred to a sink node through the efficient routes. Many energy efficient routing algorithms were proposed. However, the previous algorithms consume more energy since they did not consider the transmission range and direction. In this paper we propose an algorithm TDRP(Transmission range and Direction Routing Protocol) that considers the transmission range and direction for the efficient data transmission. Since TDRP does not produce clusters or grids but four quadrants and send data to the nodes in one quadrant in the direction of the sink node, it has less network overhead. Furthermore since the proposed algorithm sends data to the smaller number of nodes compared to the previous algorithms, the energy efficiency is better than other algorithms in communication node fields that are located in packet transmit directions.
A Reconfigurable, General-purpose DSM-CC Architecture and User Preference-based Cache Management Strategy
Jang, Jin-Ho ; Ko, Sang-Won ; Kim, Jung-Sun ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 89~98
DOI : 10.3745/KIPSTC.2010.17C.1.089
In current digital broadcasting systems, GEM(Globally Executable MHP)-based middlewares such as MHP(Multimedia Home Platform), OCAP(OpenCable Application Platform), ACAP(Advanced Common Application Platform) are the norm. Despite much of the common characteristics shared, such as MPEG-2 and DSM-CC(Digital Storage Media-Command and Control) protocols, the information and data structures they need are slightly different, which results in incompatibility issues. In this paper, in line with an effort to develop an integrated DTV middleware, we propose a general-purpose, reconfigurable DSM-CC architecture for supporting various standard GEM-based middlewares without code modifications. First, we identify DSM-CC components that are common and thus can be shared by all GEM-based middlewares. Next, the system is provided with middleware-specific information and data structures in the form of XML. Since the XML information can be parsed dynamically at run time, it can be interchanged either statically or dynamically for a specific target middleware. As for the performance issues, the response time and usage frequency of DSM-CC module highly contribute to the performance of STB(Set-Top-Box). In this paper, we also propose an efficient application cache management strategy and evaluate its performance. The performance result has shown that the cache strategy reflecting user preferences greatly helps to reduce response time for executing application.
Development of Signature Generation and Update System for Application-level Traffic Classification
Park, Jun-Sang ; Park, Jin-Wan ; Yoon, Sung-Ho ; Lee, Hyun-Shin ; Kim, Myung-Sup ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 99~108
DOI : 10.3745/KIPSTC.2010.17C.1.099
The traffic classification is a preliminary but essentialstep for stable network service provision and efficient network resource management. While various classification methods have been introduced in literature, the payload signature-based classification is accepted to give the highest performance in terms of accuracy, completeness, and practicality. However, the collection and maintenance of up-to-date signatures is very difficult and time consuming process to cope with the dynamics of Internet traffic over time. In this paper, We propose an automatic payload signature generation mechanism which reduces the time for signature generation and increases the granularity of signatures. Furthermore, We describe a signature update system to keep the latest signatures over time. By experiments with our campus network traffic we proved the feasibility of our mechanism.
A New Mobility Management Scheme Using Pointer Forwarding in Proxy Mobile IPv6 Networks
Yi, Myung-Kyu ; Kim, Hyung-Heon ; Park, Seok-Cheon ; Yang, Young-Kyu ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 109~118
DOI : 10.3745/KIPSTC.2010.17C.1.109
Proxy mobile IPv6 (PMIPv6) protocol is a network-based mobility management protocol to support mobility for IPv6 nodes without host involvement. In PMIPv6, the Mobile Access Gateway (MAG) incurs a high signaling cost to update the location of a mobile node to the remote Local Mobility Anchor (LMA) if it moves frequently. This increases network overhead on the LMA, wastes network resources, and lengthens the delay time. Therefore, we propose a new mobility management scheme for minimizing signaling cost using the pointer forwarding. Our proposal can reduce signaling costs by registration with the neighbor MAG instead of the remote LMA using the pointer forwarding. The cost analysis using imbedded Markov chain presented in this paper shows that our proposal can achieve performance superior that of PMIPv6 scheme.
Design of Dual Network Topology and Redundant Transmitting Protocol for High Survivability of Ship Area Network (SAN)
Son, Chi-Won ; Shin, Jung-Hwa ; Jung, Min-Young ; Moon, Kyeong-Deok ; Park, Jun-Hee ; Lee, Kwang-Il ; Tak, Sung-Woo ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 119~128
DOI : 10.3745/KIPSTC.2010.17C.1.119
In the shipbuilding industry, due to the global trends where the number of IT (Information Technology) devices of a smart ship have been increased rapidly, the need to develop a new shipboard backbone network has recently emerged for integrating and managing the IT devices of a smart ship efficiently. A shipboard backbone network requires high survivability because it is constructed in automatic and unmanned smart ships where a failure of the backbone network can cause critical problems. The purpose of this paper thus is to study SAN (Ship Area Network) as a efficient shipboard backbone network, considering particularity of shipboard environment and requirement of high survivability. In order to do so, we designed a dual network topology that all network nodes, including the IT devices installed in a smart ship, are connected each other through dual paths, and reuding tht IT devices pnstalles supporices network survivability as well as t Iffic efficiency for the dual network topology. And then, we verified the performance of the suggested SAN by theoretical and practical analysis including the graph theory, the probability theory, implemental specifications, and computer simulations.
Embedded System with Controller Area Network(CAN) for Intelligent Power Switches in Automobiles
Kim, Sun-Woo ; Jang, Yong-Joon ; Park, Joon-Sang ; Ro, Won-Woo ;
The KIPS Transactions:PartC, volume 17C, issue 1, 2010, Pages 129~134
DOI : 10.3745/KIPSTC.2010.17C.1.129
Intelligent Power Switch (IPS) is a semiconductor device which contains a logic circuit in itself. It has received significant attention as a switching component to substitute the fuse and relay components in common automobile since the internal logic provides the controllability on the loads. However, a control system for the IPS status control and a network system to share the status information of IPS are required to fully exploit the capabilities of IPS. In this paper, we propose a control circuit and algorithm using IPS. Also the communication system between the control systems and IPS components using Control Area network (CAN) are proposed.