Sinchai Kamolphiwong
Prince of Songkla University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sinchai Kamolphiwong.
advanced information networking and applications | 2012
Parin Sornlertlamvanich; Sinchai Kamolphiwong; Robert Elz; Panita Pongpaibool
Mobile IPv6 protocol allows a single Mobile Node (MN) to keep the same IPv6 address independently of its network of attachment. One of these extensions, Network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. This paper proposes a distributed mobility solution based on NEMO for mobile IP networks. This distributed mobility solution that is simple to overcome the drawbacks of the traditional NEMO protocol which is centralized mobility management.
international conference on electrical engineering/electronics, computer, telecommunications and information technology | 2009
Thongpon Teerakanok; Sinchai Kamolphiwong
In this day, the necessity of security and protection of computer information on network has become more and more important. In cryptography, asymmetric-key is the framework with high flexibility which can be applied to most of cryptographic systems using today. To reduce the encryption and decryption time which is the main drawback of asymmetric-key cryptography, we have proposed a new mechanism called “Parallel-key Cryptographic Algorithm (PCA)” which accelerates the cryptographic system in encryption and decryption process and strengthens the system against Brute force attack. We have shown that, in our practical experiment results, our proposed algorithm can perform faster in encrypting and decrypting message than other asymmetric-key cryptographic algorithm; RSA (Rivest, Shamir and Adleman). In our theoretical analysis, we have shown that PCA can provide the security against Brute force attack better than other algorithms. Furthermore, PCA can be applied to parallel computing and cryptographic mode such as Cipher Block Chaining (CBC) and Interleaved Cipher Block Chaining (ICBC) for higher efficiency.
international conference on mobile technology applications and systems | 2007
W. Munkongpitakkun; Sinchai Kamolphiwong; Suthon Sae-Wong
Web-based session mobility system is capability of moving HTTP session from one device to another device without interrupted and seamless web access, User may be continue using web applications at the same point on a new device without re-login or re-type any information. Web application working on HTTP is stateless protocol. A number of approaches to track web application sessions were presented, for example server-based, proxy-based and client-base. In our recently work we have proposed Web-based session mobility using SIP (Session Initiation Protocol). In this mechanism SIP URL is used instead of IP address of the destination device. This will allow more flexible of finding a target device to move on. By using SIP, we have shown some significant advantages over other schemes, e.g. more benefits, and yet, more simplicity. Moreover, most benefits hold by SIP can be achieved, e.g. present service, call forwarding, call parking. This makes our proposed mechanism more attractive. We have shown how to implement web-based session mobility in real world. In this paper, we have proposed some enhancements of web session mobility based on SIP.
international conference on computers in education | 2002
Thossaporn Kamolphiwong; Sinchai Kamolphiwong; C. Siriyuenyong
In this paper, we present a design framework of interactive distance leaning (IDL) in distributed system environment. In this design framework, interactive distance learning (IDL) system is based on Java technology: Jini technology and Java Media Framework (JMF). Using Java language, a developed system is a platform independent both in software, e.g. operating systems (OS), and hardware, e.g. computer and mobile devices. Any target systems that can run Java Virtual Machine (JVM) are able to run our IDL. In addition, it also gives us a low complexity of implementation. To work with any firewalls in a network, we have proposed an IDL gateway which allows us to not only solve the packet blocking problem but also to solve the multicast address problem. Moreover, the framework supports fully distributed services. For example service and database engines could be in separated physical location, e.g. video server and database server. This allows system scale up easily with small limited conditions. We have demonstrated our prototype software to show that it is working effectively.
Iete Technical Review | 2014
Songpon Teerakanok; Montida Pattaranantakul; Chalee Vorakulpipat; Sinchai Kamolphiwong; Siwaruk Siwamogsatham
ABSTRACT Traditional location tracking and positioning systems rely on the implicit assumption that users are willing to reveal their credentials or private location to an untrustworthy service provider; if a situation suddenly deteriorates, personal information can be intercepted and abused by adversary attacks. Addressing the need for location privacy is essential to preserve users’ credentials when they need to access location information from their service providers. Therefore, this review paper will address the phases of authentication and the querying process in location-based services (LBS). The first contribution is to rigorously investigate the mechanisms of location-based authentication and location-based personal identification in order to determine the level of trust for deciding whether traditional methods have provided a strong enough security structure to preserve privacy. The second contribution is to resolve the above privacy problems in the existing LBS systems. The idea of early intervention has brought a conceptual and practical framework into the field of preserving location-privacy-based anonymizer solutions. The framework has been designed based on a simple, centralized architecture, and integrated with two important techniques: location anonymity and encryption technology. In this paper, one-way hash function is applied as a means to create a fingerprint of a message that can be used for subscription or authentication services, and thus data integrity can be preserved. Location blurring (also known as the k-anonymity model) has also been proposed as an important factor in disguising user location when users need to interact with untrusted service providers. In the querying process, time-fuzzy logic is used to examine the degree of confidence whether the user is requesting the service under the right privileges. Finally, performance analysis regarding the derived framework of preserving location privacy is presented.
international conference on mobile technology applications and systems | 2008
Karn Tirasoontorn; Sinchai Kamolphiwong; Suthon Sae-Wong
SIP-based Internet Telephony is an increasingly popular communication system that is used by various users and organizations. Most of deployments are based on client/server model in traditional SIP system. Especially, conferencing function is used for voice/video conference include file transfer and share remote applications through internet network. The conferencing system has an association between SIP user agents (Participants) and central point of control (Focus). The functionalities of SIP conference are organized in a centralized manner and heavily rely on dedicated servers. And it has some drawbacks to make the conferencing system is not reliable and scalable when participants increase. Peer-to-Peer (P2P) is another model different from client/server model. Every peer plays an equally important role in the network. P2P network is self-organized architecture, does not require any server in the network and hence make a good solution to those problems mentioned in above. In this paper, we describe the architecture designed to construct Peer-to-Peer (P2P) network collaborating with existing traditional SIP for conferencing system. The details in this paper include the operations of how to create, join, leave and terminate the conference in P2P-SIP conference network. We have shown that our proposed scheme compared to other recently schemes is more attractive in terms of scalability (e.g. based on pure P2P), working with traditional SIP, as well as interactive communication approach for all SIP clients and extend function join our P2P-SIP conference.
annual computer security applications conference | 2008
Shilei Kuang; Robert Elz; Sinchai Kamolphiwong
Enhanced route optimization for mobile IPv6 applies cryptographically generated addresses (CGAs) to improve security and reduce handover delays. However the use of CGAs requires computationally expensive algorithms. This may be an issue for small mobile devices with low processing power. It is a problem for correspondent nodes that simultaneously communicate with a large number of mobile nodes, such as publicly accessible servers. This paper investigates enhanced route optimization for mobile IPv6, concentrating upon the costs particularly for the correspondent node. The costs of implementing enhanced route optimization for mobile IPv6 are not negligible. The correspondent node will have to protect itself against potential denial-of service attempts from attackers by limiting the amount of resources it spends on CGA verification.
international conference on information networking | 2014
N. Chuangchunsong; Sinchai Kamolphiwong; Thossaporn Kamolphiwong; Robert Elz; Panita Pongpaibool
Exhaustion of IPv4 address space is highly aware for most internet players, not only Internet Service Providers (ISPs), but also Telco and Content Providers. A number of IPv4/IPv6 migration/transition tools and mechanisms have been proposed, deployed/implemented world-wide. To make IPv4 networks be able to connect to IPv6 world, 4over6, DS-lite, and 4rd seems to be the most attractive solution according to their features and functions benefits. Beside such benefits, in this paper, we investigate their performance in terms of delay time, and reliability in both inter and intra-communications. Comparison results and analysis of these 3 solutions will be given. We conclude that these figures will provide the factors of scalability and quality-of-service (QoS).
international conference on mobile technology applications and systems | 2008
Robert Elz; Sinchai Kamolphiwong
In this paper we discuss several issues with the present usage model for Mobile-IP that tend to limit its deployability and suggest solutions to most of these practical deficiencies. In particular, we conclude that the Mobile IP protocols and implementations should operate with any number of Home Agents. That is, from none to many.
international conference on education technology and computer | 2010
Sangsuree Vasupongayya; Thossaporn Kamolphiwong; Sinchai Kamolphiwong; Suthon Sae-Wong
To handle several online examination settings, a web-based application test management software, namely interactive examination management system (iEMS), is proposed in this paper. The outstanding points of the proposed system are its good architecture designs, ease of uses, rich features, flexibilities and extensibilities. Seven standard types of questions are supported including multiple-choice, true/false, matching, ordering, fill-in the blank, short answer and essay questions. Except the essay questions, the iEMS can automatically grade the answers. Several design issues are discussed such as the graphic user interface, the special control character of the system and the flow of controls used in such systems. The student feedbacks on the iEMS are positive. That is, the simple graphic user interface is easy to learn; the interactive feature of the iEMS allows the students to get the results very fast; more tests can be given and automatically graded which results in a high attendant rate.