Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hong, Sunghyuck
- Hybrid Routing Algorithm on Mesh Network Based on Traffic Records
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Division of Information and Communication, Baekseok University, KR
1 Division of Information and Communication, Baekseok University, KR
Source
Indian Journal of Science and Technology, Vol 8, No S7 (2015), Pagination: 327-331Abstract
This research proposes the determining shortest paths for hops, which are in the middle of the source and destination. The shortest path in this research means the fastest path between the source and destination. In Recent, dynamic routing algorithms are currently used and developed by researchers. This research algorithm suggests that the fastest paths between the source and the destination which is based on using the record of the network traffic history. Main subject on networking is a user, and the pattern of network usage is always corresponding to network history. Users are using the networking and the network traffic is always corresponding to how many users use the networking in specific time. Therefore, network traffic information can be predicted by the network condition which is referring to the history of network traffic record, and then the shortest path can be produced without using RIP too much. It will be helpful to improve the network traffic and contribute efficient packet transferring on network.Keywords
Component, Efficient Communication, Hybrid Traffic Control, Network Traffic, Static Routing, the Shortest Paths.- Analysis of Time Records on Digital forensics
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 Division of Information and Communication, Baekseok University, KR
1 Division of Information and Communication, Baekseok University, KR
Source
Indian Journal of Science and Technology, Vol 8, No S7 (2015), Pagination: 365-372Abstract
Time analysis is important for digital forensic area, and Windows 7/8 are common to be used. However, there is not much research on time analysis for Windows 7 and 8. Time analysis is a critical proof for accusing criminal. There are various time zones, and time records on Windows operating system are not clear to understand which means RTC time or local time. Therefore, time analysis on Windows operating system must be firmed and documented for investigating forensic crime. We contribute to analysis time records whenever files are generated or modified by users, so we expect that our research will be able to make ambiguous time records clear for investigating digital forensics.Keywords
Analysis of Time, Component, Digital Crime, Forensics, Time Recording.- Multi-factor User Authentication on Group Communication
Abstract Views :245 |
PDF Views:0
Authors
Affiliations
1 Division of Information and Communication, Baekseok University, KR
1 Division of Information and Communication, Baekseok University, KR
Source
Indian Journal of Science and Technology, Vol 8, No 15 (2015), Pagination:Abstract
Group communications are becoming popular by explosively increased Internet usage, and there are various group communications on Internet applications such as video conferences, on-line text chatting programs, online games and gambling. However, the conventional group key agreement protocols are only focused on how to minimize the computational overhead by concentrating on generating the common group key efficiently. As a result, the common group key is generated efficiently. However, a failure in user authentication permits unknown attackers to obtain valuable information during the group communication. This paper proposes a Media Access Control (MAC)-based authentication in the group key agreement in order to secure the user authentication process in group communications. Without a preliminary agreement, participants in a group communication cannot trust each other in the beginning of the group setup. Therefore, the group controller, who is randomly selected from the group members, needs a security deposit from all members in case an illegitimate user tries to join the group. The user MAC address proposed in this paper can act as a security deposit to provide a secure communication channel while preventing the MAC spoofing problem.Keywords
Authentication, Component, Group Key Agreement, Group Member Identity, MAC Address- Secure USB Authentication on Distributed Cloud Computing Environments
Abstract Views :212 |
PDF Views:0
Authors
Affiliations
1 Division of Information and Communication, BaekseokUniversity, Cheonan, Chungnam, 33065, KR
1 Division of Information and Communication, BaekseokUniversity, Cheonan, Chungnam, 33065, KR
Source
Indian Journal of Science and Technology, Vol 9, No 37 (2016), Pagination:Abstract
Objectives: Authentication is the first step of secure communication. Especially, cloud environment is a critical issue for user authentication because cloud storages have a lot of user credentials. Methods/Statistical Analysis: To solve this problem, security USB is released currently, especially in the public sector, use a mandatory system of security USB memory in the enterprise has been applied. However, information for user authentication or be stored in plain text in a specific area of the USB memory, vulnerabilities that can be authenticated bypassed by user interaction is found. Findings: Cloud storage services are getting popular and it must be secured. Otherwise, personal privacy could be compromised. Once username and password are compromised, valuable information will be in jeopardy. USB memory is small, cheap and the capacity ratio of price as a portable storage medium to provide a large capacity, it has secured already many users. Further, due to the small size, often lost or stolen accident, flows out the data in the USB memory, social problems such as major technology leakage of effluent and industrial personal information has occurred. Improvements/ Applications: To solve the vulnerability of such user’s authentication, by using the structure properties of the hash function and encryption algorithm and the storage medium presents a secure user’s authentication methods.Keywords
Access Control, USB, User Behavior, Secure Authentication.- Secure and Efficient Authentication Protocol on Cloud: Survey
Abstract Views :154 |
PDF Views:0
Authors
Affiliations
1 Division of Information and Communication, Baekseok University, Cheonan, Chungnam, 33065, KR
1 Division of Information and Communication, Baekseok University, Cheonan, Chungnam, 33065, KR