首页 > 最新文献

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.最新文献

英文 中文
The mobile controlled handover method for fixed mobile convergence between WLAN, CDMA and LAN 无线局域网、CDMA和局域网之间固定移动融合的移动控制切换方法
HyangDuck Cho, JaeKyun Park, Keumsang Lim, Jong-Woo Kim, Wooshick Kim
The wired wireless integration network (WWIN) can be sorted out two approach ways of fixed mobile convergence (FMC) and fixed mobile integration (FMI). FMC means the convergence of the existing wired network and wireless network. The FMC infrastructure consists of wired and wireless network infra. Therefore a mobile device needs the function of connection method on the FMC infrastructure. Handover is one of methods for channel connect and connection control. Authors develop the mobile controlled handover algorithm, which can keep channel continuity in the wired wireless mixture network environment that consists of WLAN, CDMA and wired network. Mobile controlled handover algorithm accesses data by using transport layer and TCP/IP through each network in the wired wireless mixture network environment. User can move freely by using PDA in the wired wireless mixture network environment. Mobile controlled handover maintains the channel and the seamless transmission from PDA to server to provide real time service continuity. The channel of mobile controlled handover and the result of data transmission are presented by using data recorded on server. It is expected that the result of this thesis will contribute for a study on FMC network by using the wired wireless mixture network
有线无线集成网络(WWIN)可分为固定移动融合(FMC)和固定移动融合(FMI)两种途径。FMC是指现有有线网络和无线网络的融合。FMC基础设施由有线和无线网络基础设施组成。因此,移动设备需要在FMC基础设施上实现连接方式的功能。切换是信道连接和连接控制的方法之一。在由WLAN、CDMA和有线组成的有线-无线混合网络环境下,提出了一种保持信道连续性的移动控制切换算法。在有线无线混合网络环境下,移动控制切换算法通过传输层和TCP/IP协议在各网络之间进行数据访问。利用PDA,用户可以在有线无线混合网络环境下自由移动。移动控制切换保持了从PDA到服务器的通道和无缝传输,提供了实时的服务连续性。利用服务器上记录的数据,给出了移动控制切换的通道和数据传输结果。期望本文的研究成果能对利用有线无线混合网络进行FMC网络的研究有所贡献
{"title":"The mobile controlled handover method for fixed mobile convergence between WLAN, CDMA and LAN","authors":"HyangDuck Cho, JaeKyun Park, Keumsang Lim, Jong-Woo Kim, Wooshick Kim","doi":"10.1109/ICACT.2005.245932","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245932","url":null,"abstract":"The wired wireless integration network (WWIN) can be sorted out two approach ways of fixed mobile convergence (FMC) and fixed mobile integration (FMI). FMC means the convergence of the existing wired network and wireless network. The FMC infrastructure consists of wired and wireless network infra. Therefore a mobile device needs the function of connection method on the FMC infrastructure. Handover is one of methods for channel connect and connection control. Authors develop the mobile controlled handover algorithm, which can keep channel continuity in the wired wireless mixture network environment that consists of WLAN, CDMA and wired network. Mobile controlled handover algorithm accesses data by using transport layer and TCP/IP through each network in the wired wireless mixture network environment. User can move freely by using PDA in the wired wireless mixture network environment. Mobile controlled handover maintains the channel and the seamless transmission from PDA to server to provide real time service continuity. The channel of mobile controlled handover and the result of data transmission are presented by using data recorded on server. It is expected that the result of this thesis will contribute for a study on FMC network by using the wired wireless mixture network","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design of performance analysis model for efficient random access protocol in CDMA based OFDMA-PHY system 基于CDMA的OFDMA-PHY系统中高效随机接入协议的性能分析模型设计
Hyunhwa Seo, B. Ryu, J. Won, Choong-Ho Cho, Hyong-Woo Lee
Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment of downlink and uplink subframe size on the MAC frame of OFDMA-PHY system. In this paper, the design performance analytical model for correct interpretation of ranging subsystem is presented. Until now, the Internet traffic study have achieved wire net, but there is still a need for Internet traffic study that correctly reflects the radio environment. In this paper, the performance analysis result of this paper can perform the reference mark for random access protocol in OFDMA-CDMA ranging system. Traffic modeling can also be used to prepare the network resources in radio networks
目前,IEEE 802.16a无线城域网支持基于争用的OFDMA-CDMA测距子系统进行测距操作(初始测距、周期测距、带宽请求)。该系统基本类似于有槽ALOHA (K. Leonard and S.S. Lam, April 1975),但分配给随机访问或测距请求的帧大小(码槽/帧)比较大,可以通过OFDMA-PHY系统MAC帧上的下行和上行子帧大小的动态调整来改变。本文提出了测距子系统正确判读的设计性能分析模型。到目前为止,互联网流量研究已经实现了有线网络,但仍然需要正确反映无线电环境的互联网流量研究。本文的性能分析结果可以为OFDMA-CDMA测距系统中的随机接入协议提供参考。通信量建模还可以用于无线网络中网络资源的准备
{"title":"Design of performance analysis model for efficient random access protocol in CDMA based OFDMA-PHY system","authors":"Hyunhwa Seo, B. Ryu, J. Won, Choong-Ho Cho, Hyong-Woo Lee","doi":"10.1109/ICACT.2005.245868","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245868","url":null,"abstract":"Currently, IEEE 802.16a wireless MAN supports the contention based OFDMA-CDMA ranging subsystem for ranging operation (initial ranging, periodic ranging, bandwidth request). This system is basically similar to slotted ALOHA (K. Leonard and S.S. Lam, April 1975), but the frame size (code-slot/frame) allocated for random access or ranging request is relatively big and can be altered by the dynamic adjustment of downlink and uplink subframe size on the MAC frame of OFDMA-PHY system. In this paper, the design performance analytical model for correct interpretation of ranging subsystem is presented. Until now, the Internet traffic study have achieved wire net, but there is still a need for Internet traffic study that correctly reflects the radio environment. In this paper, the performance analysis result of this paper can perform the reference mark for random access protocol in OFDMA-CDMA ranging system. Traffic modeling can also be used to prepare the network resources in radio networks","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122661504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Traffic load on interconnection lines of generalized double ring network structures 广义双环网结构互联线路上的交通负荷
J. Pedersen, T. Riaz, O. Madsen
Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter
广义双环(N2R)网络结构具有许多良好的性能,但由于其不是平面的,因此难以物理嵌入到通信网络中。然而,如果其中一些线路,即互连线路,是通过无线技术实现的,那么其余的结构由两个平面环组成,它们很容易被光纤或其他有线解决方案嵌入。研究表明,对于大型N2R结构,如果采用最短路径路由,互连线的负载明显低于其他线路,并探讨了其他两种路由方案的影响,从而以更大的有效平均距离和直径为代价降低互连线的负载
{"title":"Traffic load on interconnection lines of generalized double ring network structures","authors":"J. Pedersen, T. Riaz, O. Madsen","doi":"10.1109/ICACT.2005.246198","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246198","url":null,"abstract":"Generalized double ring (N2R) network structures possess a number of good properties, but being not planar they are hard to physically embed in communication networks. However, if some of the lines, the interconnection lines, are implemented by wireless technologies, the remaining structure consists of two planar rings, which are easily embedded by fiber or other wired solutions. It is shown that for large N2R structures, the interconnection lines carry notably lower loads than the other lines if shortest-path routing is used, and the effects of two other routing schemes are explored, leading to lower load on interconnection lines at the price of larger efficient average distance and diameter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125675701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security considerations for RFID technology adoption 采用RFID技术的安全考虑
Park Joo-Sang, Kim Young-il, Lee Yong-Joon
RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained
RFID技术有望取代条形码或其他识别方案。但它还没有被广泛使用。RFID技术使用方便,具有AIDC自动识别和数据捕获的优点,但也存在严重的安全问题。RFID的主要目标是供应链管理,其中可能包含客户和公司的重要信息。然而,安全威胁成为RFID技术推广的障碍。本文首先阐述了RFID技术的安全问题。说明了RFID的安全方法和必要的标签存储结构
{"title":"Security considerations for RFID technology adoption","authors":"Park Joo-Sang, Kim Young-il, Lee Yong-Joon","doi":"10.1109/ICACT.2005.246071","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246071","url":null,"abstract":"RFID technology has been expected to replace barcode or other identification schemes. But it is not used widely yet. RFID technology is easy to use and has merits of AIDC - Automatic Identification and Data Capture, but also serious problems of security. Main target of RFID is supply chain management, which may contain important information of customers and companies. Security threat, however, becomes the obstacle against spread of RFID technology. In this paper, security problems of RFID technology are explained first. The method for RFID security and necessary tag memory structure is explained","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
WDM-PON platform development WDM-PON平台开发
Jeong-Ju Yoo, Jae-Dong Park, Tae-Yeon Kim, H. Yun, Byoung-whi Kim
The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions
波分复用无源光网络(WDM-PON)是一种先进的光接入网,可以有效地将用户业务从中心局传输到端站。在本文中,我们对一个平台的开发进行了描述。本文主要介绍了光纤到户光模块的规格和光纤到户链路OAM功能
{"title":"WDM-PON platform development","authors":"Jeong-Ju Yoo, Jae-Dong Park, Tae-Yeon Kim, H. Yun, Byoung-whi Kim","doi":"10.1109/ICACT.2005.245968","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245968","url":null,"abstract":"The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130133456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile agents aided multicast routing in mobile ad hoc networks 移动代理辅助移动自组织网络中的组播路由
H. Shekhar, M.A.A. Kumar, K. Ramanatha
Multicast routing protocols proposed for mobile ad hoc networks have certain limitations. Most of these protocols try to discover the route on-demand by flooding route request messages, which results in increased end-to-end latency and also consumes considerable amount of network bandwidth. These limitations make protocols not suitable for real-time multimedia communication. In this paper, we have presented an efficient mobile agents aided multicast routing (MAMR) protocol which overcomes these limitations. The protocol is a hybrid protocol where intelligent mobile agents can been integrated with existing on-demand multicast routing protocols such as multicast ad hoc on-demand distance vector (MAODV) routing protocol, on-demand multicast routing protocol (ODMRP) routing protocol and others. Here, the mobile agents move around the network and collect the routing information. This routing information assists on-demand multicast routing protocols in discovering the route in a definite path instead of flooding the route request messages, thereby achieving better end-to-end latency and reduced control traffic in the network. We have used MAODV protocol as an underlying protocol with mobile agents. The proposed MAMR protocol and MAODV have been compared through extensive simulations with end-to-end latency, packet delivery ratio and control overhead as performance parameters
针对移动自组织网络提出的组播路由协议存在一定的局限性。这些协议中的大多数都试图通过淹没路由请求消息来按需发现路由,这会导致端到端延迟增加,并且还会消耗大量的网络带宽。这些限制使得协议不适合实时多媒体通信。在本文中,我们提出了一种高效的移动代理辅助组播路由(MAMR)协议,克服了这些限制。该协议是一种混合协议,智能移动代理可以与现有的按需多播路由协议集成,如多播自组织按需距离矢量(MAODV)路由协议、按需多播路由协议(ODMRP)路由协议等。在这里,移动代理在网络中移动并收集路由信息。这些路由信息有助于按需组播路由协议在确定的路径中发现路由,而不是淹没路由请求消息,从而实现更好的端到端延迟和减少网络中的控制流量。我们使用MAODV协议作为移动代理的底层协议。本文以端到端延迟、分组传送率和控制开销作为性能参数,对所提出的MAMR协议和MAODV进行了广泛的仿真比较
{"title":"Mobile agents aided multicast routing in mobile ad hoc networks","authors":"H. Shekhar, M.A.A. Kumar, K. Ramanatha","doi":"10.1109/ICACT.2005.246063","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246063","url":null,"abstract":"Multicast routing protocols proposed for mobile ad hoc networks have certain limitations. Most of these protocols try to discover the route on-demand by flooding route request messages, which results in increased end-to-end latency and also consumes considerable amount of network bandwidth. These limitations make protocols not suitable for real-time multimedia communication. In this paper, we have presented an efficient mobile agents aided multicast routing (MAMR) protocol which overcomes these limitations. The protocol is a hybrid protocol where intelligent mobile agents can been integrated with existing on-demand multicast routing protocols such as multicast ad hoc on-demand distance vector (MAODV) routing protocol, on-demand multicast routing protocol (ODMRP) routing protocol and others. Here, the mobile agents move around the network and collect the routing information. This routing information assists on-demand multicast routing protocols in discovering the route in a definite path instead of flooding the route request messages, thereby achieving better end-to-end latency and reduced control traffic in the network. We have used MAODV protocol as an underlying protocol with mobile agents. The proposed MAMR protocol and MAODV have been compared through extensive simulations with end-to-end latency, packet delivery ratio and control overhead as performance parameters","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"89 23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129780403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
IPv6 based CDMA/WLAN heterogeneous network interworking 基于IPv6的CDMA/WLAN异构网络互联
Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim
This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service
提出了一种基于IPv6的CDMA/WLAN异构网络互通机制。具有两个不同链路层接口的节点可以选择一个接口与另一个节点通信。当节点在网络中移动时,可能会切换到另一个接口,因为节点无法再使用第一个选择的接口。在接口切换过程中,必须保留业务会话,且切换的持续时间要短,不能被用户识别。为了实现无缝服务,必须多方面考虑选择合适的接口,并仔细确定切换的时间点
{"title":"IPv6 based CDMA/WLAN heterogeneous network interworking","authors":"Yong-Geun Hong, Jungsoo Park, Hyoungjun Kim","doi":"10.1109/ICACT.2005.245957","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245957","url":null,"abstract":"This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service session must be preserved and duration time of switching must be short not to be recognized by users. And the selection of proper interface must be taken into consideration with many aspects and the point of time of switching must be determined carefully for seamless service","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of RFID middleware framework for ubiquitous computing environment 泛在计算环境下RFID中间件框架的研究
Youngil Kim, Joo-Sang Park, Taesu Cheong
`Ubiquitous Computing' was appeared first time by Mark Weiser in 1988. Recently, as basic technologies for realization are offered and technical necessity is appeared, various researches are progressed about this. Various forms of technologies are needed to satisfy ubiquitous computing environment, such as home networking, telematics, industry automation and so on. Particularly, in the industry automation field that utilizes RFID technology, there have been many researches on the automation of supply chain management, control of goods in stock, physical distribution management, warehouse management, etc. We report about current research contents about RFID middleware framework which is necessary for RFID application development in ubiquitous environments. Then we analyze this and propose to RFID middleware framework's development direction that is used in ubiquitous computing environment hereafter
1988年,Mark Weiser首次提出了“普惠计算”一词。近年来,随着实现的基础技术的提供和技术必要性的出现,各种研究都在进行中。为了满足普适计算环境,需要各种形式的技术,如家庭网络、远程信息处理、工业自动化等。特别是在利用RFID技术的工业自动化领域,在供应链管理、库存控制、物流管理、仓库管理等方面的自动化研究较多。介绍了RFID中间件框架的研究现状,该框架是在泛在环境下RFID应用开发所必需的。在此基础上,提出了RFID中间件框架在泛在计算环境下的发展方向
{"title":"Study of RFID middleware framework for ubiquitous computing environment","authors":"Youngil Kim, Joo-Sang Park, Taesu Cheong","doi":"10.1109/ICACT.2005.246078","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246078","url":null,"abstract":"`Ubiquitous Computing' was appeared first time by Mark Weiser in 1988. Recently, as basic technologies for realization are offered and technical necessity is appeared, various researches are progressed about this. Various forms of technologies are needed to satisfy ubiquitous computing environment, such as home networking, telematics, industry automation and so on. Particularly, in the industry automation field that utilizes RFID technology, there have been many researches on the automation of supply chain management, control of goods in stock, physical distribution management, warehouse management, etc. We report about current research contents about RFID middleware framework which is necessary for RFID application development in ubiquitous environments. Then we analyze this and propose to RFID middleware framework's development direction that is used in ubiquitous computing environment hereafter","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131481111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Design of unified key management model using XKMS 基于XKMS的统一密钥管理模型的设计
Ju-Han Kim, Kiyoung Moon
In this paper, we design key management protocols and services with unified single interface, which extend the scheme and services of XKMS, for various kinds of security information such as, private key, secret key, biometric information, security tokens for Web service, and the like. The model we propose modifies and extends the protocols and services such as key registration, reissue, revocation, recovery, location service and validation for only public key pair to provide a way to manage other security information including public key pair. We also describe the processes and structures of the model comparing to legacy them of XKMS model
本文设计了具有统一接口的密钥管理协议和服务,扩展了XKMS的方案和服务,适用于各种安全信息,如私钥、密钥、生物特征信息、Web服务安全令牌等。该模型对仅针对公钥对的密钥注册、补发、撤销、恢复、位置服务和验证等协议和服务进行了修改和扩展,从而提供了一种管理包括公钥对在内的其他安全信息的方法。我们还描述了模型的过程和结构,并与XKMS模型的遗留过程和结构进行了比较
{"title":"Design of unified key management model using XKMS","authors":"Ju-Han Kim, Kiyoung Moon","doi":"10.1109/ICACT.2005.246010","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246010","url":null,"abstract":"In this paper, we design key management protocols and services with unified single interface, which extend the scheme and services of XKMS, for various kinds of security information such as, private key, secret key, biometric information, security tokens for Web service, and the like. The model we propose modifies and extends the protocols and services such as key registration, reissue, revocation, recovery, location service and validation for only public key pair to provide a way to manage other security information including public key pair. We also describe the processes and structures of the model comparing to legacy them of XKMS model","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128827611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of TCP SYN traffic: an empirical study TCP SYN流量分析:一个实证研究
Seungwon Shin, Kiyoung Kim, Jongsoo Jang
There are a lot of studies that have measured TCP traffic, but none of them provide the investigation results of TCP SYN packet. In this paper, we show and explain common behavior of TCP SYN packets in traces from a research center using various statistical analysis methods. We selected three parameters to find the behavior of TCP SYN traffic - number of received SYN packets in every 10 ms, SYN PPS (packet per second), and SYN/TCP (ratio between SYN packets and total TCP packets every in 10ms). Our analysis mechanisms are divided into two groups. We started our examination with general statistical tool to provide the knowledge of data distribution. In the second place, we applied change point detection algorithm to our traces to discover the change of state. We summarized our findings in two main categories, qualitative and quantitative. In qualitative findings, we exhibit the characteristics of arising TCP connection and the amount of SYN packet existing in real network and also expose which parameter can explain the characteristics of SYN traffic well. Quantitative findings provide lots of numerical examples to support qualitative findings
目前已有很多研究对TCP流量进行了测量,但都没有提供对TCP SYN报文的调查结果。在本文中,我们展示和解释了TCP SYN包的共同行为,从一个研究中心使用各种统计分析方法。我们选择了三个参数来查找TCP SYN流量的行为——每10毫秒内接收到的SYN包的数量、SYN PPS(每秒包数)和SYN/TCP(每10毫秒内SYN包数与总TCP包数的比率)。我们的分析机制分为两组。我们从通用的统计工具开始我们的研究,以提供数据分布的知识。其次,我们对轨迹应用变化点检测算法来发现状态的变化。我们将研究结果分为定性和定量两大类。在定性研究中,我们展示了实际网络中产生的TCP连接和存在的SYN包数量的特征,并揭示了哪些参数可以很好地解释SYN流量的特征。定量研究结果提供了大量的数值例子来支持定性研究结果
{"title":"Analysis of TCP SYN traffic: an empirical study","authors":"Seungwon Shin, Kiyoung Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245954","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245954","url":null,"abstract":"There are a lot of studies that have measured TCP traffic, but none of them provide the investigation results of TCP SYN packet. In this paper, we show and explain common behavior of TCP SYN packets in traces from a research center using various statistical analysis methods. We selected three parameters to find the behavior of TCP SYN traffic - number of received SYN packets in every 10 ms, SYN PPS (packet per second), and SYN/TCP (ratio between SYN packets and total TCP packets every in 10ms). Our analysis mechanisms are divided into two groups. We started our examination with general statistical tool to provide the knowledge of data distribution. In the second place, we applied change point detection algorithm to our traces to discover the change of state. We summarized our findings in two main categories, qualitative and quantitative. In qualitative findings, we exhibit the characteristics of arising TCP connection and the amount of SYN packet existing in real network and also expose which parameter can explain the characteristics of SYN traffic well. Quantitative findings provide lots of numerical examples to support qualitative findings","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1