Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 18C, Issue 6 - Dec 2011
Volume 18C, Issue 5 - Oct 2011
Volume 18C, Issue 4 - Aug 2011
Volume 18C, Issue 3 - Jun 2011
Volume 18C, Issue 2 - Apr 2011
Volume 18C, Issue 1 - Feb 2011
Selecting the target year
Effective Searchable Symmetric Encryption System using Conjunctive Keyword on Remote Storage Environment
Lee, Sun-Ho ; Lee, Im-Yeong ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 199~206
DOI : 10.3745/KIPSTC.2011.18C.4.199
Removable Storage provides the excellent portability with light weight and small size which fits in one's hand, many users have recently turned attention to the high-capacity products. However, due to the easy of portability for Removable Storage, Removable Storage are frequently lost and stolen and then many problems have been occurred such as the leaking of private information to the public. The advent of remote storage services where data is stored throughout the network, has allowed an increasing number of users to access data. The main data of many users is stored together on remote storage, but this has the problem of disclosure by an unethical administrator or attacker. To solve this problem, the encryption of data stored on the server has become necessary, and a searchable encryption system is needed for efficient retrieval of encrypted data. However, the existing searchable encryption system has the problem of low efficiency of document insert/delete operations and multi-keyword search. In this paper, an efficient searchable encryption system is proposed.
A Message Authentication Scheme for V2V message based on RSSI with anonymity
Seo, Hwa-Jeong ; Kim, Ho-Won ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 207~212
DOI : 10.3745/KIPSTC.2011.18C.4.207
Vehicular Ad Hoc Network(VANET) is a communication technology between vehicles and vehicles(V2V) or vehicles and infrastructures(V2I) for offering a number of practical applications. Considering the importance of communicated information through VANET, data authentication, confidentiality and integrity are fundamental security elements. Recently, to enhance a security of VANET in various circumstances, message authentication is widely researched by many laboratories. Among of them, Zhang. et. al. is an efficient method to authenticate the message with condition of anonymity in dense space. In the scheme, to obtain the vehicular ID with condition of anonymity, the k-anonymity is used. However it has a disadvantage, which conducts hash operations in case of determining the vehicular ID. In the paper, we present a location based algorithm using received signal strength for the location based authentication and encryption technique as well, and to enhance the accuracy of algorithm we apply a location determination technique over the 3-dimensional space.
Enhanced Differential Power Analysis based on the Generalized Signal Companding Methods
Choi, Ji-Sun ; Ryoo, Jeong-Choon ; Han, Dong-Guk ; Park, Tae-Hoon ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 213~216
DOI : 10.3745/KIPSTC.2011.18C.4.213
Differential Power Analysis is fully affected by various noises including temporal misalignment. Recently, Ryoo et al have introduced an efficient preprocessor method leading to improvements in DPA by removing the noise signals. This paper experimentally proves that the existing preprocessor method is not applied to all processor. To overcome this defect, we propose a Differential Trace Model(DTM). Also, we theoretically prove and experimentally confirm that the proposed DTM suites DPA.
Sensitive Privacy Data Acquisition in the iPhone for Digital Forensic Analysis
Jung, Jin-Hyung ; Byun, Keun-Duck ; Lee, Sang-Jin ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 217~226
DOI : 10.3745/KIPSTC.2011.18C.4.217
As a diverse range of smartphones has been recently developed and diffused, the users of SNS (Social Network Service) also have been sharply increased. The SNS saves a variety of information such as exchanged pictures and videos, voice mails or location sharing, chat history, etc. as well as simple user data, so that the acquisition of data that are useful in the aspect of digital forensic is achievable. This thesis reviews the types of SNS that are available for the iPhone, a recent example of highly used smartphones, and types of data by each client. Also, efficient data analysis method for digital forensic investigations is suggested by analyzing the relationships within the collected data by each client.
User Authentication and Key Distribution on Open IPTV System
Jung, Ji-Yeon ; Doh, In-Shil ; Chae, Ki-Joon ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 227~236
DOI : 10.3745/KIPSTC.2011.18C.4.227
IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.
Optimal Handover Key Refresh Interval in 3GPP LTE/SAE Network
Han, Chan-Kyu ; Choi, Hyoung-Kee ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 237~242
DOI : 10.3745/KIPSTC.2011.18C.4.237
LTE/SAE has presented the handover key management to revoke the compromised keys and to isolate corrupted network devices. In this paper, we identify that the handover key management is vulnerable to so-called de-synchronization attacks, which is jeopardizing the forward secrecy of handover key management. We place an emphasis on periodic root key update to minimize the effect of the de-synchronization attacks. An optimal value for the root key update interval is suggested in order to minimize signaling load and ensure security of user traffic.
Performance Improvement of the Statistic Signature based Traffic Identification System
Park, Jin-Wan ; Kim, Myung-Sup ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 243~250
DOI : 10.3745/KIPSTC.2011.18C.4.243
Nowadays, the traffic type and behavior are extremely diverse due to the appearance of various services on Internet, which makes the need of traffic identification important for efficient operation and management of network. In recent years traffic identification methodology using statistical features of flow has been broadly studied. We also proposed a traffic identification methodology using payload size distribution in our previous work, which has a problem of low completeness. In this paper, we improved the completeness by solving the PSD conflict using IP and port. And we improved the accuracy by changing the distance measurement between flow and statistic signature from vector distance to per-packet distance. The feasibility of our methodology was proved via experimental evaluation on our campus network.
A Selection Method of Access Points to Improve IPTV Service Quality in WLAN Environments
Park, Jae-Sung ; Lim, Yu-Jin ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 251~254
DOI : 10.3745/KIPSTC.2011.18C.4.251
In a WLAN, the data reception rate of a user station depends not only on the received signal strength (RSS) from an AP (Access Point) but also on the contention level of the AP. However, since only the RSSs measured at the physical layer have been used for a station to select an AP to associate with, the station may not satisfy the minimum quality requirements necessary for a seamless IPTV service. Thus, in this paper, we propose an AP selection method to support quality requirements of the IPTV service in a wireless LAN without modifying the IEEE 802.11 standard. A user station keeps monitoring a contention level of APs around it and a quality of an ongoing IPTV service. If the quality deteriorates below a threshold, the station reassociates with another AP having the least load so that the ongoing IPTV program is played without disruption.
Design and Implementation of an Optimization information based Metadata Encapsulation Architecture for IPTV Service Discovery
Oh, Bong-Jin ; Paik, Eui-Hyun ; Yoo, Kwan-Jong ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 255~264
DOI : 10.3745/KIPSTC.2011.18C.4.255
TV-Anytime is an XML-based standard for description of PVR and digital broadcast services. It is referenced by many standards of digital broadcast service for their schemas and delivery protocols of contents guide. Although its readability and extensibility, TV-Anytime has a big problem which generates massive documents due to its text-based description method. Therefore, various encoding algorithms have been proposed to reduce the size of XML documents. This paper proposes efficient metadata encapsulation architecture based on the optimization information generated at server-side to minimize XML documents. Advanced indexing method is also proposed to reduce resources needed to encapsulate indices and to receive metadata with fast and explicit mechanism.
End-to-end Packet Statistics Analysis using OPNET Modeler Wireless Suite
Kim, Jeong-Su ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 265~278
DOI : 10.3745/KIPSTC.2011.18C.4.265
The objective of this paper is to analyze and characterize end-to-end packet statistics after modeling and simulation of WiFi (IEEE 802.11g) and WiMAX (IEEE 802.16e) of a virtual wireless network using OPNET Modeler Wireless Suite. Wireless internal and external network simulators such as Remcom's Wireless InSite Real Time (RT) module, WinProp: W-LAN/Fixed WiMAX/Mobile WiMAX, and SMI system, are designed to consider data transfer rate based on wireless propagation signal strength. However, we approached our research in a different perspective without support for characteristic of these wireless network simulators. That is, we will discuss the purpose of a visual analysis for these packets, how to receive each point packets (e.g., wireless user, base station or access point, and http server) through end-to-end virtual network modeling based on integrated wired and wireless network without wireless propagation signal strength. Measuring packet statistics is important in QoS metric analysis among wireless network performance metrics. Clear packet statistics is an especially essential metric in guaranteeing QoS for WiMAX users. We have found some interesting results through modeling and simulation for virtual wireless network using OPNET Modeler Wireless Suite. We are also able to analyze multi-view efficiency through experiment/observation result.
A Routing Algorithm with Small Routing Traffic
Choi, Ick-Sung ; Kwark, Gwang-Hoon ; Kim, Geun-Hyung ;
The KIPS Transactions:PartC, volume 18C, issue 4, 2011, Pages 279~286
DOI : 10.3745/KIPSTC.2011.18C.4.279
This paper proposes techniques for wireless sensor network routing algorithm with small routing traffics. It reduces routing traffic by gathering routing messages for fixed duration of time and the routing message for the configuration result is sent once. The routing traffic gathering technique has disadvantage of longer network configuration time. To overcome this, first one or first few routing messages are delivered immediately and later routing messages are gathered for fixed duration of time. The proposed scheme was modelled and implemented in Qualnet simulator using C language. Experimental results show that the proposed techniques are effective for reducing routing traffics.