Abstract:
MANET 식별자를 이용하는 애드혹 통신 방법이 개시된다. 본 발명의 일 실시예에 따른 MANET 식별자를 이용하는 애드혹 통신 방법은 소스 단말로부터 소스 단말이 포함된 MANET(Mobil Ad-hoc Network)을 구분하는 MANET 식별자, 소스 단말의 주소 정보 및 목적 단말의 주소 정보를 포함하는 경로 설정 요청 메시지를 수신하는 단계; 수신된 MANET 식별자와 애드혹 단말에 설정된 MANET 식별자를 비교하는 단계; 및 비교결과, 동일한 경우에, 소스 단말로의 역 경로 정보를 저장하고, 경로 설정 요청 메시지를 브로드캐스팅(Broadcasting)하는 단계를 포함한다. 본 발명에 의하면 애드혹 통신의 경로 설정에서 네트워크의 대역폭의 효율적 사용할 수 있고, 그룹 통합에서 중복 주소 검사 작업을 줄일 수 있는 장점이 있다. MANET, 애드혹, 경로 설정, 중복 주소 검사, ZRP기반
Abstract:
Recognition of situation access system for control management providing an access control service intensifying an authentication reliability of an authentication system, a management method and a recording medium are provided to perform an access control based on situation recognition in a ubiquitous computing environment. A recognition of situation security manager(100) provides a user authentication management for the access to the information system server through the authentication guarantee level. The situation office role base access control model is used, so that the recognition of situation security manager provides the access control. The situation information merge manager(200) collects/manages the situation information required for the activation of the situation role of the recognition of situation security manager. A security policy manager(300) provides the configuration/management function of the security policy used for the situation information merge manager and the recognition of situation security manager.
Abstract:
A contextual information based security apparatus and a method thereof are provided to make the current context information based dynamic access control of a user possible by periodically grasping the contextual information. A security rule managing unit(210) produces a security rule required for the service access. A communication unit(250) receives an access request message to a specific service from a communication terminal. A contextual information managing unit(220) collects the contextual information for showing the situation of the communication terminal. An access controller(230) determines whether to allow the communication terminal to access the specific service through the security rule and contextual information.
Abstract:
An ad-hoc communication method, an ad-hoc terminal using MANET(Mobil Ad-hoc Network) ID and a computer readable recording medium on which a program for executing the method is recorded are provided to make terminals included in the same MANET group to have the same MANET identifier. A communication unit(610) receives a MANET identifier and a path setup request message from a source terminal. The MANET identifier classifies MANET included in the source terminal. The path setup request message includes address information of the source terminal and a destination terminal. A MANET identifier management unit(630) compares the received MANET identifier with the MANET identifier which is set in an ad-hoc terminal. A message management unit broadcasts the path setup request message.
Abstract:
A group key management method for mobile multicast regarding mobility of user is provided to minimize waste of resources due to a group key renewal by using a method for locking the group key. A group key management method for mobile multicast regarding mobility of user comprises the following steps: a step for sensing a hand-off of a multicast transmission node(S12); and a step for locking a group key for removing a update of the group key until all member nodes belonging to a receiving group of a multicast traffic completes a channel change through a transmission channel changed according to the hand-off(S18).
Abstract:
본 발명은 정보보호 기술분야 중 인증 분야로서, 이동환경에서의 듀얼 인증 방법에 관한 것으로, 특히 본 발명은 Mobile IPv6 기반의 이동환경에서 이동노드가 핑퐁상태에 있을 때 안전하고 빠르게 듀얼 인증을 수행할 수 있도록 하는 방법에 관한 것이다. 본 발명의 듀얼 인증 방법에서는 이동노드가 이전 액세스 라우터와 새로운 액세스 라우터의 중첩된 공간을 이동하는 핑퐁상태에 있을 때, 이전 액세스 라우터에 대한 인증은 AAA 서버에게 인증에 필요한 정보를 요청하지 않고 이전 액세스 라우터에서 사용되던 인증 정보를 재이용함으로써 이동노드에 대한 인증을 수행하여, AAA 환경의 이동노드의 인증을 빠르고 안전하게 수행할 수 있도록 할 뿐만 아니라, 핑퐁상태에서 인증의 실패를 막도록 하며 버퍼링 문제를 해결한다.
Abstract:
PURPOSE: A wireless sensor network and a clustering method thereof are provided to minimize energy consumed for transferring data collected by sensor nodes to a base station. CONSTITUTION: A sensor field(400) includes a plurality of sensor nodes. The sensor field is divided into a plurality of clusters. The plurality of sensor nodes operates and is composed of one of a cluster head and a cluster node and the plurality of clusters. A base station(420) connects the sensor field and an external network. The base station receives data collected through the sensor field from the cluster head.
Abstract:
PURPOSE: A routing method and system of sensing data in a large-scale sensor network are provided to set up a cluster in order to arrange the uniform number of sensor nodes in each cluster. CONSTITUTION: In order to uniformly set up the number of sensor nodes that constitute each cluster, a concentric cluster is set up. According to the number of the preset clusters and the entire number of sensor nodes included in a wireless sensor network, the number of the sensor nodes is uniformly set up. The sensor nodes constituting the each cluster are formed in one chain. A head node merging the data transmitted form the sensor nodes connected in the chain is selected. The merged data are transmitted to the final data collection node.
Abstract:
A wireless sensor network and a clustering method therefor are provided to minimize the energy required for transmitting data, which is collected by sensor nodes, to a base station. A sensor field(400) comprises a plurality of sensor nodes. The sensor nodes operate as one among a cluster head and a cluster node. A base station(420) connects a sensor field to an external network, and receives data which is collected from the sensor field, from the cluster head.
Abstract:
A dual authentication method in a mobile network is provided to prevent a fail of the authentication in a ping-pong state and perform authentication of a mobile node in AAA(Authentication, Authorization, and Accounting) environment by preventing performing dual authentication when the mobile node reaches the ping-pong state. A dual authentication method in a mobile network includes the steps of: performing authentication for a mobile node by re-using authentication information used in a previous access router without requesting necessary information for the authentication to an AAA server. The dual authentication method is performed by using an IBE(Identifier Based Encryption) scheme. The dual authentication method is performed under mobile IPv6 environment. When the mobile node is under a ping-pong state which the mobile node moves to an overlapped space of a previous access router and a new access router, the mobile node generates a registration message based on a router advertisement message received from new access router.