1-5hit |
Recently, with the explosive growth of communication technologies, group oriented services such as teleconferencing and multi-player games are increasing. Access to information is controlled through secret communication using a group key shared among members, so efficient updating of group keys is vital to maintaining secrecy of large and dynamic groups. In this paper, we employ (2,4)-tree as a key tree, which is a height balanced tree, to reduce the number of key updates caused by joins or leaves of members. Specifically, we use the CBT (Core Based Tree) to determine the network configuration of the group members to reflect that onto the structure of the key tree. This allows for more efficient updates of group keys when splitting or merging of subgroups occurs by network failure or recovery.
Sang-Ho LEE Tae-Soo YIM Young-Hwan KIM
A new CMOS analogue transconductor is proposed and simulated. This transconductor is based on the operation of MOS transistors in the linear region and has a good linearity. The simulation result shows that less than 1% distortion can be obtained for the differential input signal of 6.4 Vp-p with IB=80µA and supply voltage of 5V.
Tae-Yeon KIM NamUk KIM Sang-Ho LEE Jeong-Ju YOO Byong-Whi KIM
To overcome the demerits of two passive optical networks; the small link capacity of the TDM-PON, and the ineffective link utilization of the WDM-PON; we propose a novel access network architecture featuring a WDM-based feeder network and a TDM-based distribution network. In this paper, we examine the design issues of the key constituent of SWE-PON (Scalable WDM-based Ethernet hybrid-PON) to validate its economic and practical feasibility. For flawless network operation, the wavelength tuning rule is investigated so that it does not collide between wavelengths from the tunable lasers belonging to the WDM coupler. Also, the potential problem between the tunable laser and the reflective operational device is analyzed in detail. From the numerical analysis and simulation, we demonstrate the variation of the network performance in terms of the upstream traffic delay and throughput of the ONU in accordance with the sharing structure of distribution network and the number of tunable laser devices (TLDs) at the feeder network.
Yoon-Su JEONG Yong-Tae KIM Jae-Min SOHN Gil-Cheol PARK Sang-Ho LEE
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Woo-Goo PARK Je-Hun RHEE Sook-Jin LEE Sang-Ho LEE
In this paper, a new overload control strategy is proposed for a call control processor (CCP) in the base station controller (BSC) and processor utilization is measured. The proposed overload control strategy can regulate the call attempts by adopting measured processor utilization. A function, specifically a linear interpolation function based on Inverse Transform theory is used to convert controlled predictive average load rate in a call rejection rate. Then a call admission rate is obtained from the call rejection rate. Simulation shows that the proposed algorithm yields better performance than the conventional algorithm does under the heavy transient overload status in terms of call admission rate.