Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The KIPS Transactions:PartC
Journal Basic Information
Journal DOI :
Korea Information Processing Society
Editor in Chief :
Volume & Issues
Volume 9C, Issue 6 - Dec 2002
Volume 9C, Issue 5 - Oct 2002
Volume 9C, Issue 4 - Aug 2002
Volume 9C, Issue 3 - Jun 2002
Volume 9C, Issue 2 - Apr 2002
Volume 9C, Issue 1 - Feb 2002
Volume 9, Issue 6 - 00 2002
Volume 9, Issue 5 - 00 2002
Volume 9, Issue 1 - 00 2002
Selecting the target year
A Detecting Method of Polymorphic Virus Using Advanced Virtual Emulator
Kim, Du-Hyeon ; Baek, Dong-Hyeon ; Kim, Pan-Gu ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 149~156
DOI : 10.3745/KIPSTC.2002.9C.2.149
Current vaccine program which scans virus code patterns has a difficult to detect the encrypted viruses or polymorphic viruses. The decryption part of polymorphic virus appears to be different every time it replicates. We must monitor the behavior of the decryption code which decrypts the body of the virus in order to detect these kinds of viruses. Specialty, it is not easy for the existing methods to detect the virus if the virus writer has modified the loop count of execution intentionally. In this paper, we propose an advanced emulator using a new algorithm so as to detect various kinds of polymorphic viruses. As a result of experiment using advanced emulator, we found that our proposed method has improved the virus detecting rate about 2%. In addition, our proposed system has a merit that it runs on not only MS-Windows but also Linux, and Unix-like Platform.
A Design and Implementation of a Secure Internet Phone System
Park, Jae-Hui ; Kim, Il-Min ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 157~162
DOI : 10.3745/KIPSTC.2002.9C.2.157
In this study, the secure Internet phone system using digital signature and data encryption with DES algorithm and EDE algorithm was implemented. And new key distribution algorithm was suggested utilizing the Diffie-bellman algorithm. For reducing processing time, a table combined with S-BOX and P-BOX of the DES was used. The proposed system was implemented with Java and the results showed the processing time using DES algorithm for encryption was 1.46 seconds and that of EDE algorithm was 3.25 seconds respectively. This system can be applied to Protect the copyright of sound products and data using internet.
Design and Implementation of Arbitrary Precision Class for Public Key Crypto API based on Java Card
Kim, Sung-Jun ; Lee, Hei-Gyu ; Cho, Han-Jin ; Lee, Jae-Kwang ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 163~172
DOI : 10.3745/KIPSTC.2002.9C.2.163
Java Card API porvide benifit for development program based on smart card using limmited resource. This APIs does not support arithmetic operations such as modular arithmetic, greatest common divisor calculation, and generation and certification of prime number, which is necessary arithmetic in PKI algorithm implementation. In this paper, we implement class BigInteger acted in the Java Card platform because that Java Card APIs does not support class BigInteger necessary in implementation of PKI algorithm.
Cut off of Smartcard Forgery and Alteration Based on Holographic Security Encryption
Jang, Hong-Jong ; Lee, Seong-Eun ; Lee, Jeong-Hyeon ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 173~180
DOI : 10.3745/KIPSTC.2002.9C.2.173
Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This Paper makes cut off of Smartcard forgery and alteration that use angular multiplexing and private key multiplexing hologram on holographic security Encryption, and proposes system capable verfication of forgery and alteration impossible on existing smartrard by adopting smartcard chip and holographic memory chip.
Implementation of Client Authentication System on Transparency Cache
Kim, Seong-Rak ; Gu, Yong-Wan ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 181~188
DOI : 10.3745/KIPSTC.2002.9C.2.181
There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.
The problem resolution algorithm in ESP protocol
Lee, Yeong-Ji ; Kim, Tae-Yun ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 189~196
DOI : 10.3745/KIPSTC.2002.9C.2.189
IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to Provide data encryption, authentication and integrity in real transmission Packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that tome. This vague has many risks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrpty IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee more safe transmission on the public network.
A Study on the High Performance TCP over Various Communication Links
Kim, Sang-Mi ; Choe, Seon-Wan ; Han, Seon-Yeong ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 197~212
DOI : 10.3745/KIPSTC.2002.9C.2.197
Transmission Control Protocol (TCP)  has been tuned as a reliable transfer protocol for traditional networks comprising wired links and stationary hosts with same link characteristics. TCP assumes that congestion in the network be a primary cause for packet losses and unusual delays. TCP performs welt over such networks adapting to end-to-end delays and congestion losses, by standard congestion control mechanisms, such as slow-start, congestion avoidance, fast retransmit and recovery. However, networks with wireless and other lossy links suffer from significant losses due to bit errors and handoffs. An asymmetry network such as ADSL has different bandwidth for both directions. As a result, TCP's standard mechanisms incur end-to-end performance degradation in various links. In this paper, we analyze the TCP problems in wireless, satellite, and asymmetry links, and measure the new TCP mechanisms that are recommended by IETF Performance Implications of Link Characteristics (PILC) WG, by using Network Simulator 2 (NS-2).
Design and Implementation of CORBA based on Multi-Threaded in Open Network Environments
Jang, Jong-Hyeon ; Lee, Dong-Gil ; Han, Chi-Mun ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 213~220
DOI : 10.3745/KIPSTC.2002.9C.2.213
Distributed competing system gives a new system architecture to be taken into consideration for solving the problems of interoperability of heterogeneous systems. In the present paper, CORBA based on multi-threaded interoperates with software blocks at physically isolated hardware. We show how archives optimal CORBA system from analysis of required functions, implementations of protocols and benchmarking of system performance in the Open Multi-service Network System Environment. The core features of our CORBA system are restricted Quality of Service based on priority, timeout service and exception status information notify to the related software blocks. And the objectives are design and implementation of high performance multi-threaded middleware and satisfied with extendibility, flexibility and stability of CORBA platform.
Cycling Packet Dropping Mechanism for Assured Forwarding Packets in Internet
Kim, Su-Yeon ; Gang, Hyeon-Guk ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 221~226
DOI : 10.3745/KIPSTC.2002.9C.2.221
Cycling Packet Dropping mechanism we proposed in this paper adaptively drops packets, as predicting traffic pattern between each cycle. Therfore the proposed mechanism makes up for the drawback of RIO mechanism and minimizes errors being capable of predicting in Dynamic and Strict Packet Dropping mechanism. And we executed a simulation and analyzed the throughput and packet drop rate based on the Sending Drop Precedence changing dynamically depending on the network traffic. The results show that the proposed mechanism provides better performance on drop precedence levels and stricter drop precedence policy for AF class.
Network Management for the GSMP Open Interface in the MPLS
Cha, Yeong-Uk ; Kim, Jin-Nyeon ; Kim, Chun-Hui ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 227~234
DOI : 10.3745/KIPSTC.2002.9C.2.227
MPLS which integrates routing of layer 3 and switching of layer 2, enables support for fast forwarding, traffic engineering and virtual private network services. GSMP is open interface protocol between a label switch and a controller, and it provides connection, configuration, event, performance management and synchronization. In the GSMP open interface, the functions of network management can be located either in the controller or in the label switch. To simplify the label switch and enhance the efficiency of resources, we adopt the network management model, in which the SNMP agent is located in the controller and is interworked with the GSMP. We presented the interworking scenrios between the GSMP and the network management of MPLS. We implemented the controller to verify the realization of our adopted network management model, and measured the connection setup delay of the provisioned connection.
Design and Implementation of Tree-based Reliable Dissemination Multicast Protocol With Differential Control and Key Management
Kim, Yeong-Jae ; Park, Eun-Yong ; An, Sang-Jun ; Hyeon, Ho-Jae ; Han, Seon-Yeong ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 235~246
DOI : 10.3745/KIPSTC.2002.9C.2.235
While the Internet is suffering from the massive data such as video stream, IP multicast can ease the load of the Internet by enabling one copy of digital information to be received by multiple computers simultaneously. But If multicast is based on UDP, packets are delivered using a best-effort Policy without any reliability, congestion control or flow control. Multicast group members can join or leave a multicast group at will, and multicast uses broadcast mechanism, it's very hard to keep security from unauthorized members. In this paper, we introduce a new reliable multicast protocol TRDMF proper for one-to-many multicast model with reliability, flow control, congestion control and key management.
A Study on Information Exchange Scheme for Reliability in the Wireless Multicasting
Im, Ji-Yeong ; Jeong, Tae-Myeong ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 247~256
DOI : 10.3745/KIPSTC.2002.9C.2.247
In a wireless multicasting when a mobile host moves to the new bate station being in the same multicast group it needs to exchange information about data delivery between base stations to receive data from the new base station at once. However it is inefficient to use the existence schemes because it takes too much time to exchange information and many overheads. The next, a mobile host moving to the base station not being in the same multicast group, the old base station will pre-forward data to neighboring base stations to avoid transmission delay. However, if other mobile hosts move at short interval, the old base station may retransmit the same data to the same neighboring base stations. In this paper we proposed called Information Exchange Scheme (IES). In IES in the same multicast grope the base stations exchange information locally so it takes the minimum time and overheads to use IES. Also in IES the neighboring base stations delay to delete data for continuous moving of other MHs. We also present how our scheme is efficient by producing cost ad simulating.
The Study of the Seamless Handoff Algorithm in PDSNs
Sin, Dong-Jin ; Kim, Su-Chang ; Im, Seon-Bae ; Jeon, Byeong-Jun ; Song, Byeong-Gwon ; Jeong, Tae-Ui ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 257~266
DOI : 10.3745/KIPSTC.2002.9C.2.257
In 3GPP2 wireless data communications, Mobile IP is used to support macro mobility and PDSN performs the function of foreign agent. The mobility supported when a mobile station moves from one PDSN to another is called a macro mobility. In this Paper, we first examine the possibilities of packet loss and change of packet sequences that can be occurred in macro mobility. Then, to resolve such Problems, we suggest a seamless handoff algorithm in PDSNs based on packet sequence control for each of down-stream and up-stream cases respectively.
An Improvement of Fast Handoff Protocol using Modified Local Registration in Mobile Computing Environment
Han, Seung-Jin ; Choe, Seong-Yong ; Lee, Jeong-Hyeon ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 267~276
DOI : 10.3745/KIPSTC.2002.9C.2.267
By using wireless terminal, User that want to transmit multimedia traffic as well as simple text and voice have a tendency to increase. This paper proposes a fast handoff protocol that is suitable transmission for real-tim of multimedia traffic by using modified local registration. The proposed protocol solves the Triangle Routing Protocol that is one of existing opened issues without modifying protocol of CN, and we propose the method that MN is able to received a packet by real-time, even if MN is being handoff. We compare fast handoff protocol proposed in this paper with existing method n the registration cost and data packet transmission cost. As a result, we showed that fast handoff protocol proposed in this paper outperforms existing method
A scheme to minimize transmission delay during handoff for rt-VBR service in the wireless ATM Networks
Kim, Jun-Bae ; Jang, Dong-Hyeok ; Lee, Seon-Suk ; Lee, Jae-Hong ; Kim, Seung-Hwan ; Gwon, O-Seok ; Park, Jin-Su ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 277~282
DOI : 10.3745/KIPSTC.2002.9C.2.277
In general, requirements for QoS are different according to the type of services in wire-line and wireless ATM networks, and real-time video service is more sensitive to cell transmission delay than to cell loss. Existing handoff schemes emphasizing prevention of cell loss had limitations in cell transmission delay to satisfy QoS. In this paper, a novel scheme to transmit ATM cells with low CLP(when CLP = 0) prior to others and discarding cells with high CLP(when CLF = 1) in ATM cell header among cells to be forwarded to new base station during handoffs in real-time VBR service is proposed. The proposed scheme is proven to be suitable for the satisfaction of QoS of real-time VBR service and appropriate for fast handoffs by giving high CLP value to less meaningful MPEG frames through simulations.
Performance analysis of the Resource Reservation Schemes using Mobile Cluster based H-MRSVP in Wireless Mobile Networks
Ma, Gyeong-Min ; Won, Jeong-Jae ; Lee, Hyeong-U ; Jo, Chung-Ho ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 283~292
DOI : 10.3745/KIPSTC.2002.9C.2.283
This paper develops a scheme of resource management for guaranteeing QoS of realtime traffic in wireless mobile internet environments Mobile terminal has significant impact on the QoS originating mobility provided to a real-time application. The currently proposed MRSVP is not clear the boundary of resource reservation tregion and also can give rise to signal overhead to maintain sessions. To solve above problem, we propose the new reservation protocol, mobile cluster based H-MRSVP to combine MRSVP with moving cluster concept. In this paper, we analytically design our model for guaranteeing the QoS of realtime traffic and compare the three schemes: guard channel allocation schemes, DCA and our model. The performance measures are the probabilities of new call blocking, handoff dropping, resource utilization and service completion versus the system offered Erlang load. Consequently, Simulation indicate our model is more flexible than DCA in a view pint of channel utilization and gains the advantage over guard channel scheme with respects to the mobility.
Development of Convertor supporting Multi-languages for Mobile Network
Choe, Ji-Won ; Kim, Gi-Cheon ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 293~296
DOI : 10.3745/KIPSTC.2002.9C.2.293
UP Link is One of the commercial product which converts HTML to HDML convertor in order to show the internet www contents in the mobile environments. When UP browser accesses HTML pages, the agent in the UP Link controls the converter to change the HTML to the HDML, I-Mode, which is developed by NTT-Docomo of Japan, has many contents through the long and stable commercial service. Micro Explorer, which is developed by Stinger project, also has many additional function. In this paper, we designed and implemented WAP convertor which can accept C-HTML contents and mHTML contents. C-HTML format by I-Mode is a subset of HTML format, mHTML format by ME is similar to C-HTML, So the content provides can easily develop C-HTML contents compared with WAP and the other case. Since C-HTML, mHTML and WML are used under the mobile environment, the limited transmission capacity of one page is also similar. In order to make a match table. After that, we apply conversion algorithm on it. If we can not find matched element, we arrange some tags which only can be supported by WML to display in the best shape. By the result, we can convert over 90% contents.
Efficient Support for Adaptive Bandwidth Scheduling in Video Servers
Lee, Won-Jun ;
The KIPS Transactions:PartC, volume 9C, issue 2, 2002, Pages 297~306
DOI : 10.3745/KIPSTC.2002.9C.2.297
Continuous multimedia applications require a guaranteed retricval and transfer rate of streaming data, which conventional file server mechanism generally does not provide. In this paper we describe a dynamic negotiated admission control and dick bandwidth scheduling framework for Continuous Media (CM : e.g., video) servers. The framework consists of two parts. One is a reserve-based admission control mechanism and the other part is a scheduler for continuous media streams with dynamic resource allocation to achieve higher utilization than non-dynamic scheduler by effectively sharing available resources among contending streams to improve overall QoS. Using our policy, we could increase the number of simultaneously running: clients that coo]d be supported and cot]d ensure a good response ratio and better resource utilization under heavy traffic requirements.