Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 18C, Issue 6 - Dec 2011
Volume 18C, Issue 5 - Oct 2011
Volume 18C, Issue 4 - Aug 2011
Volume 18C, Issue 3 - Jun 2011
Volume 18C, Issue 2 - Apr 2011
Volume 18C, Issue 1 - Feb 2011
Selecting the target year
Spam Message Filtering for Internet Communities using Collection and Frequency Analysis
Kim, Tae-Hee ; Kang, Moon-Seol ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 61~70
DOI : 10.3745/KIPSTC.2011.18C.2.061
Even though internet community is becoming the basic communication tool with rapidly changing internet environment, its damage is on the rise due to increasing spam messages of unspecified individuals. Currently, various methods to block spam mails, but studies on block spam messages from being automatically posted in community are still insufficient. This study suggested methods to block spam messages in internet community by collecting spam messages posted in internet community to analyze characteristics and frequencies of the messages and create block regulations. It collects spam messages of all messages saved in database of internet community, analyze the collected messages to create normalized rules that can define spam messages, and inspect spam messages among posted messages by using the regulations to block them. The suggested method has a structure that can block various types of spam messages by using information of spam messages collected and flexibly deal with changing spam message types.
Advanced Password Input Method in Automated Teller Machines/Cash Dispenser
Kim, Tae-Hee ; Park, Seung-Bae ; Kang, Moon-Seol ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 71~78
DOI : 10.3745/KIPSTC.2011.18C.2.071
Financial accidents such as password exposure of credit cards or bankbooks occur often when a password is inputted to ATM/CD(Automated Teller Machines and Cash Dispenser), so particular attention is required when inputting a password. This study suggested a method to input a password safely to prevent stealing a glance at a password in case of the use of ATM/CD. The method is that users input a password when numbers are randomly displayed and disappear not to notice the password even though someone is next to or behind the users. As methods to input a password safely, the study verified safety by dividing the methods into a test of shoulder surfing, an intuitive perspective, and a theoretical analysis. In addition, the result of implementation to apply the method to ATM/CD shows that a percentage of acquiring a password from the attack of shoulder surfing is found to be lower than an existing method, so password exposure can be prevented.
Design and Implementation of Voice One-Time Password(V-OTP) based User Authentication Mechanism on Smart Phone
Cho, Sik-Wan ; Lee, Hyung-Woo ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 79~88
DOI : 10.3745/KIPSTC.2011.18C.2.079
It is necessary for us to enhance the security service on smart phone by using voice data on authentication procedure. In this study, a voice data based one-time password generation mechanism is designed and implemented for enhancing user authentication on smart phone. After receiving a PIN value from the server, a user inputs his/her own voice biometric data using mike device on smart phone. And then this captured a voice biometric data will be used to generate one-time token on server side after verification procedures. Based on those mutual authentication steps, a voice data based one-time password(V-OTP) will be generated by client module after receiving the one-time token from the server finally. Using proposed voice one-time password mechanism, it is possible for us to provide more secure user authentication service on smart phone.
Multiple ASR for efficient defense against brute force attacks
Park, Soo-Hyun ; Kim, Sun-Il ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 89~96
DOI : 10.3745/KIPSTC.2011.18C.2.089
ASR is an excellent program security technique that protects various data memory areas without run-time overhead. ASR hides the addresses of variables from attackers by reordering variables within a data memory area; however, it can be broken by brute force attacks because of a limited data memory space. In this paper, we propose Multiple ASR to overcome the limitation of previous ASR approaches. Multiple ASR separates a data memory area into original and duplicated areas, and compares variables in each memory area to detect an attack. In original and duplicated data memory areas variables are arranged in the opposite order. This makes it impossible to overwrite the same variables in the different data areas in a single attack. Although programs with Multiple ASR show a relatively high run-time overhead due to duplicated execution, programs with many I/O operations such as web servers, a favorite attack target, show 40~50% overhead. In this paper we develop and test a tool that transforms a program into one with Multiple ASR applied.
Performance Comparison among Bandwidth Allocation Schemes using Cooperative Game Theory
Park, Jae-Sung ; Lim, Yu-Jin ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 97~102
DOI : 10.3745/KIPSTC.2011.18C.2.097
Since the game theory provides a theoretical ground to distribute a shared resource between demanding users in a fair and efficient manner, it has been used for the bandwidth allocation problem in a network. However, the bandwidth allocation schemes with different game theory assign different amount of bandwidth in the same operational environments. However, only the mathematical framework is adopted when a bandwidth allocation scheme is devised without quantitatively comparing the results when they applied to the bandwidth allocation problem. Thus, in this paper, we compare the characteristics of the bandwidth allocation schemes using the bankrupt game theory and the bargaining game theory when they applied to the situation where nodes are competing for the bandwidth in a network. Based on the numerical results, we suggest the future research direction.
A Software Development and Its Verification for Implementing a Proactive Service Quality Management System for Mobile Internet Telephony Services
Kim, Chin-Chol ; Kim, Beom-Joon ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 103~110
DOI : 10.3745/KIPSTC.2011.18C.2.103
Although a mobile Internet telephony service becomes popular with the rapid propagation of smart phones, its service quality management system has not been prepared enough yet. For successful settlement and deployment of the mobile Internet telephony service in future, a strict service quality management is required. The service quality management using a specific measurement equipment has limitations that real-time monitoring is impossible. In this paper, therefore, we propose a proactive service quality management system for the mobile Internet telephony service and develop a software for its implementation. The developed software is verified by comparing the measurement results from the developed software to those from the softwares commonly used, and it is proved that the developed software is quite reliable.
Hybrid Home Network Prefix Model for Supporting Inter-Technology Handover in Proxy MIPv6 Domains
Hong, Yong-Geun ; Kim, Young-Hyun ; Pack, Sang-Heon ; Youn, Joo-Sang ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 111~118
DOI : 10.3745/KIPSTC.2011.18C.2.111
Recently, with the popularity of smartphones, an interest in multi-networking service through wireless multi-interface of a mobile node is increased. Also, wireless networking technology for using wireless multi-interface has been studied. As the related work, in the IETF Netext WG, the extension of PMIPv6 protocol for multi-interface support is being discussed. Existing PMIPv6 protocol includes the functions for simultaneous access over multi-interfaces of a mobile node and inter-technology handover between multi-interfaces of the mobile node. However, in case of the existing protocol, the problem occurs when inter-technology handover is performed after simultaneous access on the PMIPv6 domain, this problem is the discontinuous of simultaneous connections. Therefore, the PMIPv6 Protocol cannot support flow based multi-homing service. In this paper, as a way to solve the problem, Hybrid Home Network Prefix scheme is proposed.
A Time Synchronization Protocol of Sensor Nodes Combining Flooding-Routing Protocol with Bidirectional LTS
Shin, Jae-Hyuck ; Oh, Hyun-Su ; Jeon, Joong-Nam ;
The KIPS Transactions:PartC, volume 18C, issue 2, 2011, Pages 119~126
DOI : 10.3745/KIPSTC.2011.18C.2.119
In wireless sensor networks Time synchronization used to be performed after routing tree is constructed. It results in increasing the number of packets and energy consumption. In this paper, we propose a time synchronization algorithm combined with flooding routing tree construction algorithm, which applies LTS (Lightweight Time Synchronization) information packed into the forwarding and backward routing packets. Furthermore, the proposed algorithm compensates the time error due to clock drift using the round time with fixed period. We prove that the proposed algorithm could synchronize the time of among sensor nodes more accurately compared to TSRA (Time Synchronization Routing Algorithm) using NS2 simulation tool.