Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¸ð¹ÙÀÏ È¯°æ¿¡¼ Àû¿ë °¡´ÉÇÑ SIP±â¹Ý ÀÎÅͳÝÀüÈ(VoIP) º¸¾È Åë½Å ÇÁ·ÎÅäÄÝ ¼º´É Æò°¡ |
¿µ¹®Á¦¸ñ(English Title) |
Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment |
ÀúÀÚ(Author) |
À±¼®¿õ
Á¤Çöö
Â÷¼³¸Å
Ãß°æÈ£
¹ÚÇÑ
¹éÀçÁ¾
¼ÛÁÖ¼®
À¯Çü¼±
SeokUng Yoon
HyunCheol Jung
Xuemei Che
GyeongHo Chu
Han Park
JaeJong Baek
JooSeok Song
HyeongSeon Yoo
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 18-C NO. 03 PP. 0143 ~ 0150 (2011. 06) |
Çѱ۳»¿ë (Korean Abstract) |
±¹³» ÀÎÅͳÝÀüÈ(VoIP) ¼ºñ½º´Â Àú·ÅÇÑ ¿ä±Ý, ´Ù¾çÇÑ ºÎ°¡¼ºñ½º Á¦°ø µîÀÇ ÀÌÁ¡À¸·Î ÀÎÇØ °ø°ø±â°ü, ±â¾÷ ¹× ÀÏ¹Ý °¡Á¤¿¡¼ µµÀÔÀÌ Áö¼ÓÀûÀ¸·Î Áõ°¡ÇÏ°í ÀÖ´Ù. ¶ÇÇÑ ½º¸¶Æ®Æù ÀÌ¿ë Áõ°¡·Î ¸ð¹ÙÀÏ È¯°æ¿¡¼ ÀÎÅÍ³Ý ÀÌ¿ë ¿ª½Ã Å©°Ô È®»êµÉ Àü¸ÁÀÌ´Ù. ±×·¯³ª VoIP ¼ºñ½º È®»ê¿¡ µû¶ó Ãë¾à¼ºÀ» ÀÌ¿ëÇÑ Ä§ÇØ»ç°í ¿ì·Á ¶ÇÇÑ Áõ°¡ÇÏ°í ÀÖ´Ù. ƯÈ÷ µµÃ»ÀÇ °æ¿ì¿¡´Â °³ÀÎ »ç¿ëÀÚ ÇÁ¶óÀ̹ö½Ã ħÇØ´Â ¹°·ÐÀÌ°í ±â¾÷ÀÇ Áß¿ä Á¤º¸°¡ À¯ÃâµÉ ¼ö ÀÖ¾î VoIP º¸¾È Åë½Å ±â¼úÀÇ Àû¿ëÀº ÇʼöÀûÀÌ´Ù. °ø°ø±â°ü ÀÎÅͳÝÀüÈ¿¡´Â 2010³âºÎÅÍ º¸¾ÈÅë½Å ±â¼úÀÌ Àû¿ëµÇ°í ÀÖÀ¸³ª, ÀÏ¹Ý »ç¿ëÀÚµé ´ë»óÀ¸·Î´Â ¾ÆÁ÷ Àû¿ëµÇÁö ¸øÇÏ°í ÀÖ´Ù. ´õ¿íÀÌ ¸ð¹ÙÀÏ È¯°æ¿¡¼ ÀÎÅͳÝÀüÈ´Â ½º¸¶Æ®ÆùÀÇ Á¦ÇÑµÈ ¼º´ÉÀ¸·Î ÀÎÇØ, ±âÁ¸ º¸¾È ÇÁ·ÎÅäÄÝÀ» Àû¿ë°¡´ÉÇÑÁö °ËÁõÀÌ ÇʼöÀûÀÌ´Ù. º» ³í¹®¿¡¼´Â ±âÁ¸¿¡ À¯¼±´Ü¸»¿¡ Àû¿ë °¡´ÉÇÑ º¸¾È ÇÁ·ÎÅäÄݵéÀ» ¸ð¹ÙÀÏ È¯°æ¿¡¼ Àû¿ë°¡´ÉÇÑÁö ¼º´É Æò°¡¸¦ ÅëÇØ ºñ±³ÇÏ¿´´Ù. ¼º´ÉÆò°¡ °á°ú Ç¥ÁØ¿¡¼ Á¦½ÃÇÏ°í ÀÖ´Â º¸¾È ÇÁ·ÎÅäÄݵéÀ» ¸ð¹ÙÀÏ È¯°æ¿¡¼ Àû¿ëÇÏ¿´À» ¶§, »ç¿ëÀÚ°¡ ºÒÆíÇÔÀ» ´À³¥ Á¤µµÀÇ ¹®Á¦Á¡Àº ¾ø´Â °ÍÀ¸·Î ³ªÅ¸³ª ¸ð¹ÙÀÏ È¯°æ¿¡¼ ±âÁ¸ º¸¾È ÇÁ·ÎÅäÄÝÀ» ±×´ë·Î »ç¿ëÇÒ ¼ö ÀÖÀ½À» È®ÀÎÇÏ¿´´Ù. |
¿µ¹®³»¿ë (English Abstract) |
The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network. |
Å°¿öµå(Keyword) |
VoIP
Mobile VoIP
VoIP Security Protocol
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|