Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 6, Issue 6 - Dec 2005
Volume 6, Issue 5 - Oct 2005
Volume 6, Issue 4 - Aug 2005
Volume 6, Issue 3 - Jun 2005
Volume 6, Issue 2 - Apr 2005
Volume 6, Issue 1 - Feb 2005
Selecting the target year
A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECC
Jeong Eun-Hee ; Lee Byung-Kwan ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 1~16
This paper propose not only MDIT(Mobile Digital Investment Trust) agent design for Trust Investment under Mobile E-commerce environment, but also the symmetric key algorithm 3BC(Bit, Byte and Block Cypher) and the public encryption algorithm F2mECC for solving the problems of memory capacity, CPU processing time, and security that mobile environment has. In Particular, the MDIT Security Agent is the banking security project that introduces the concept of investment trust in mobile e-commerce, This mobile security protocol creates a shared secrete key using F2mECC and then it's value is used for 3BC that is block encryption technique. The security and the processing speed of MDIT agent are enhanced using 3BC and F2mECC.
The Distributed Authentication and Key Exchange Protocols for Smartcard
Oh Heung-Ryongl ; Yoon Ho-Sun ; Youm Heung-Youl ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 17~30
A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.
On the Security Enhancement of the OTAR Protocol and Cryptosystems
Lee HoonJae ; Lee SangGon ; Park Jongwook ; Yoon JangHong ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 31~43
OTAR system is a highly authentic key management system that has functions with access control. data integrity and data confidentiality, In this paper, we analyze the existing TIA/EIA Over-The-Air-Rekeying key managements protocol. focused to symmetric ciphers. It can be used to understand the technical trend on technologies about TIA/EIA OTAR standardization. This results can be used to evaluate security properties of a remote rekeying, The proposed system contains a highly reliable system synchronization.
Implementation of WAP Gateway Agents for Wireless Communication Efficiency Improvement
Park, Kee-Hyun ; Kang, Dong-Woo ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 45~54
Recently, researches on various base technologies for wireless Internet services have been conducted. In the WAP (Wireless Application Protocol) Forum, a WAP gateway which does mutual conversion between existent wired Internet protocols and WAP protocols was proposed. In this paper, CSA(Client Side Agent) and SSA(Server Side Agent) for WAP gateway environments are designed and implemented, as a way of improving communication efficiency in such restrictive environments as wireless communications. Located on mobile WAP devices(CSA) and a WAP Gateway(SSA), the agents perform communication efficiency improvement activities such as a packet header reduction mechanism and a data reduction mechanism using data differencing analysis in order to reduce the size of data transmission in wireless communication environments. The Internet phone emulator of Phone.com is used in order to make sure that the implemented agents work correctly, Experimental results show that the implemented agents reduce the size of data transmission significantly.
A hierarchical Xcast++ mechanism for multicast services in mobile communication environment
Kim Tae-Soo ; Lee Kwang-Hui ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 55~70
In order to provide mobile hosts with multicast service in mobile communication environment, we proposed a multicast mechanism named HXcast++ which is an extended version of the existing Xcast++ with hierarchical architecture, We assured that mobile hosts could get multicast service through an optimal path regardless of their location by making DR(Designated Router) join a group on behalf of the mobile hosts, In this present research we introduced hierarchical architecture in order to reduce the maintenance cost resulting from frequent handoff. We also proposed a GMA (Group Management Agent) based group management mechanism which enables the mobile hosts to join the group without waiting for a new IGMP Membership Query. A fast handoff method with L2 Mobile Trigger was, in this work, employed in order to reduce the amount of the packet loss which occurs as a result of the handoff, We also managed to curtail the packet loss caused by the latency of the group join by using a buffering and forward mechanism.
A Design and Implementation of In/Out Bound Call Flow Module for SOHO CTI
Park Chan Il ; Moon Seung-Jin ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 71~84
Recently, the expert call center solution has become the center of interest, since finance and tele-marketing system, which is focused on a communication industry, have been increasing, Specially, the call center market is growing up with a supporting Caller-ID for a cellular phone in Korea, In the present, although large size companies are developing expensive solutions and instruments to service only for the big companies, there little solutions for SOHO markets, Therefore, in this paper we have shown a design and an implementation of a CTI system which is capable of in/outbound call processing by using CTI, and providing stable services by linking the customer's DB. And these functionalities have become possible by integrating functions of PBX and the computer control of the PBX. First, we have constructed call flows and analyzed packets for the standard communication through the PBX in call. Then, we have designed and implemented a middleware which linked a call between a client and a customer. Finally, we have constructed a database module for applying the CRM technology to the management of customer's contents.
An Enhanced Xcast Protocol for Mobile Nodes in IP Networks
Nam Sea-Hyeon ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 85~95
Whereas the traditional multicast schemes based on Mobile IP can support a limited number of very large multicast groups, the Xcast protocol can support a very large number of small multicast groups, In the Xcast, the source node encodes the list of destinations in the Xcast header. Therefore, the maximum packet size in the network limits the number of destinations that a Xcast packet may have. In this paper, an enhanced Xcast protocol is proposed to solve the multicast group size limitation of the existing Xcast protocol in providing multicast service for mobile nodes. Moreover, the SIP (a very flexible control plane protocol) is integrated with the proposed multicast scheme to provide mobility awareness on the application layer. The simulation results verify that the proposed multicast scheme not only increases the packet delivery ratio and the data packet forwarding efficiency but also achieves low latency of packets in the network.
A Study on a Packet Forwarding Scheme based on Interworking Architecture
Kim, Seok-Hoon ; Ryoo, In-Tae ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 97~106
Generally, network QoS is determined by timeliness, bandwidth, and reliability, As IT technologies are growing day by day, the bandwidth and reliability factors are expected to be able to satisfy user's requirements. The timeliness factor, however, has not fully met user's requirements yet. In this paper, we propose a packet forwarding scheme named POSIA (Packet forwarding Scheme based on Interworking Architecture) that can provide quite a good QoS (quality of service) by minimizing processing time which is the major part of the timeliness factor. Based on path and resource reservation mechanism, the proposed POSIA makes routers on the packet forwarding path synchronize with each other and then forward packets, The POSIA has been verified to outperform the existing MPLS packet forwarding scheme through computer simulations using OPNET.
Secure Handoff Based on Dual Session Keys in Mobile IP with AAA
Choi Yumi ; Lee Hyung-Min ; Choo Hyunseung ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 107~119
The Mobile IP has evolved from providing mobility support for portable computers to support wireless handheld devices with high mobility patterns. The Mobile IP secures mobility, but does not guarantee security, In this paper, the Mobile IP has been adapted to allow AM protocol that supports authentication, authorization and accounting for authentication and collection of accounting information of network usage by mobile nodes, For this goal, we propose a new security handoff mechanism to intensify the Mobile IP security and to achieve fast handoff. In the proposed mechanism, we provide enough handoff achievement time to maintain the security of mobile nodes, According to the analysis of modeling result, the proposed mechanism composed the basic Mobile IP along with AM protocol is up to about
better in terms of normalized surcharge for the handoff failure rate that considers handoff time.
Admission Control Policy Heuristic Algorithm for fairness of Call Blocking Probability in Differentiated Service Networks
Min, Jun-Ki ; Rhea, Woo-Seop ; Chung, Jong-Soo ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 121~128
Recently, as the research of effective resource management for supporting of various next generation internet service, the admission control mechanisms using the dynamic provisioning methods in differentiated service networks are studied. However, even though admission control mechanism is applied to the network, there exits the unfairness of call blocking probability among the different bandwidth requested services. In this paper, we propose the new admission control policy heuristic algorithm that provides fairness of call blocking probability between the large bandwidth requested service and the small bandwidth requested service. The simulation results show that the proposed algorithm provides not only blocking probability fairness but also high bandwidth utilization.
Automatic Information Extraction for Structured Web Documents
Yun, Bo-Hyun ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 129~145
This paper proposes the web information extraction system that extracts the pre-defined information automatically from web documents (i.e, HTML documents) and integrates the extracted information, The system recognizes entities without lables by the probabilistic based entity recognition method and extends the existing domain knowledge semiautomatically by using the extracted data, Moreover, the system extracts the sub-linked information linked to the basic page and integrates the similar results extracted from heterogeneous sources, The experimental result shows that the system extracts the sub-linked information and uses the probabilistic based entity recognition enhances the precision significantly against the system using only the domain knowledge, Moreover, the presented system can the more various information precisely due to applying the system with flexibleness according to domains, Because bath the semiautomatic domain knowledge expansion and the probabilistic based entity recognition improve the quality of the information, the system can increase the degree of user satisfaction at its maximum. Thus, this system can satisfy the intellectual curiosity of users from movie sites, performance sites, and dining room sites, We can construct various comparison shopping mall and contribute the revitalization of e-business.
Real-time Vehicle License Plate Recognition Method using Vehicle-loaded Camera
Chang, Jae-Khun ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 147~158
Day after day the information of vehicle under the complex traffic environments is greatly required not only for traffic flow but also for vehicle disclosure of traffic violation, Vehicle information can be obtained from a recognition of vehicle license plate, This paper proposes a new vehicle plate recognition mechanism that uses moving style vehicle-loaded camera, The method is a real-time processing system using multi-step image processing and recognition process that recognizes general vehicles and special purpose vehicles, The experimental results of real environmental image and recognition using the proposed method are shown.
Fuzzy One Class Support Vector Machine
Kim, Ki-Joo ; Choi, Young-Sik ;
Journal of Internet Computing and Services, volume 6, issue 3, 2005, Pages 159~170
OC-SVM(One Class Support Vector Machine) avoids solving a full density estimation problem, and instead focuses on a simpler task, estimating quantiles of a data distribution, i.e. its support. OC-SVM seeks to estimate regions where most of data resides and represents the regions as a function of the support vectors, Although OC-SVM is powerful method for data description, it is difficult to incorporate human subjective importance into its estimation process, In order to integrate the importance of each point into the OC-SVM process, we propose a fuzzy version of OC-SVM. In FOC-SVM (Fuzzy One-Class Support Vector Machine), we do not equally treat data points and instead weight data points according to the importance measure of the corresponding objects. That is, we scale the kernel feature vector according to the importance measure of the object so that a kernel feature vector of a less important object should contribute less to the detection process of OC-SVM. We demonstrate the performance of our algorithm on several synthesized data sets, Experimental results showed the promising results.