• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.042 seconds

A Design of Security Protocol for Active Warehouse Condition Management System based on Ubiquitous Environment (유비쿼터스 환경에능동형 창고 상태관리를 위한 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Shin, Seung-Ho;Park, Sang-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.6
    • /
    • pp.91-108
    • /
    • 2006
  • RFID/USN is important infrastructure of the ubiquitous society. And so, It is various and practical research is attempted. These two base technology have physical characteristic and complement relationship. Like this relationship is applied Following example that is system research which manages warehouse stocks and conditions. First, We adhere RFID Tag at the Pallet of the warehouse and do identification goods. And then, It grasps the environment state information of stocks with sensor module which has Zigbee wireless communication function. From like this process RFID Tag information and jop-control command of sensor node also it is exposed to air. Therefore, We control sensor node in USN/RFID environment through the mobile device. And system design for the security Apply of the process is main purpose of this paper's. We propose the condition and function of the mobile device to the secondary. And We define the relation of the sensor node with RFID to be arranged to a warehouse. Finally, This paper is designed to find a trade-off of the following viewpoints. First, We offer suitable sensor-control information to a actual manager. Second, We offer RFID tag security approach to control the action of the sensor. Third, It increases the survivability of sensor node form.

Implementation of e-Meters System Middleware base on RFID/USN (RFID/USN기반 e-Meters 시스템의 미들웨어 구현)

  • Jun, Won-Goo;Lee, Myung-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.729-734
    • /
    • 2011
  • In this paper, e-Meters middleware and applications using standardized middleware in the EPCglobal is suggested. An standardized middleware of the EPCglobal is designed to manage as a form of SCM and other logistics. In order to support a variety of services using RFID-based, the system must be able to support each protocol. The main features of e-Meters middleware is consist of information status and delivery, distributed database processing, event data analysis, and handling. To operate real time e-Meters system information, The realized middleware is configured to process the results of data collection.

A Study of QoS based Resource Management using H-MRSVP in Next Generation Mobile Network (차세대 이동망에서 H-MRSVP를 이용한 QoS 기반의 자원관리 연구)

  • Ma, Kyung-Min;Won, Jeong-Jae;Kim, Young-Jin;Lee, Seung-Que;Kim, Dae-Ik;Cho, Choong-Ho;Lee, Hyoung-Woo
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.1299-1302
    • /
    • 2001
  • 인터넷의 폭발적인 증가와 다양한 무선 서비스에 대한 수요 증가에 따라 용량이 크고, 데이터 전송 속도가 빠르며, 멀티미디어를 지원 할 수 있는 무선 인터넷 서비스가 필요하게 되었다. 또한 증가하는 사용자수를 수용하기 위해서 마이크로/피코 셀(micro/pico cell)을 도입하게 되었고, 이로 인하여 빈번한 핸드오프가 발생하게 되었다[1,2]. 이를 해결하기 위해서 MRSVP(Mobile Resource reservation protocol)와 같은 무선 자원예약 프로토콜이 제안되어지고 있다(4). 제안된 MRSVP 에서는 자원예약 지역의 불명확성과 지나친 신호부하를 초래하게 되었고, 이를 해결하기 위해서 본 논문에서는 계층적 MRSVP(H-MRSVP)를 이용한 새로운 호 제어기법과 무선 자원 예약 기법에 대해 연구하였다.

  • PDF

Design and Implementation of the System Provide of the Loyalty Service for Electronic Commerce (전자상거래 로열티 서비스를 위한 시스템 제공자 설계 및 구현)

  • Hong, Jae-Young;Kim, Ki-Young;Lee, Young-Seok;Choi, Hoon;Kim, Young-Kuk;Hong, Seung-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.348-355
    • /
    • 2000
  • Loyalty is a bonus point that a customer earns in reward of purchasing goods of a shop or a manufacturer. The management of loyalty such as issuing, accounting, reimbursing is carried out by the loyalty system. Traditional loyalty systems were proprietary. As a result, the systems are not interoperable with each other. However, our loyalty system allows a group of merchants join together and use the same IC card to operate their own loyalty programs. Data and counters can be shared or totally isolated, using secret codes and keys. The loyalty pool system communicates with the loyalty service providers over the Internet and performs the management of loyalty in fully automated manner. This paper describes the functional architecture and internal behavior of the loyalty pool system along with the communication protocols.

  • PDF

A Study on Internet of Things based on Semantic for Library (도서관의 시맨틱 기반 사물인터넷(IoT) 적용에 관한 연구)

  • Jung, Min-Kyung;Kwon, Sun-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.2
    • /
    • pp.235-260
    • /
    • 2014
  • This study aims to apply the concept of Internet of things to library and interpret a library as ecological space where human, thing and data are communicating and organically networking through internet. First, we defined various things existing in physical spaces of the real world and internet spaces as elements of Internet of Things. Then we proposed to apply a semantic web platform to integrate different meta-data formats and communication protocols from things. Finally, we provide the model of Internet of Things based on Semantic web to utilize a variety of information from things for library management and user service.

A Study on DRM System using Puzzle Authentication Protocol (퍼즐 인증 프로토콜을 이용한 DRM 시스템에 관한 연구)

  • Jung, Young-Hoon;Lee, Kwang-Hyoung;Yeon, Min-So;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2007.05a
    • /
    • pp.199-202
    • /
    • 2007
  • In this paper, I suggest that as follow. First, it is the algorithm to transmit the encryption key which use ${\ast}$ N Puzzle method more safe than the existing One-path XOR method. Second, it does provide the high quality of security than the existing system because it does not save the generated puzzle to the setter side. Third, it does support the client decryption system which can decrypt the puzzle with OPT in decryption with client side. Fourth, it does adopt more of the safe tansmission method with the compound of ${\ast}$ N Puzzle method and OPT.

  • PDF

Development of Traffic Centralized Control System Based on Protocol Redirection for DB Protection (DB 보호를 위한 Protocol Redirection기반 트래픽 중앙통제시스템 개발)

  • Su, Yang-Jin;Lee, Jae-Pil;Park, Cheon-O;Lee, Deok-Gyu;Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1212-1220
    • /
    • 2010
  • The technologies of domestic user programs are not enough to convert address convert information, which was collected via port redirection server, to user traffic. Generally traffic redirection technology is a special purpose technology for I/O traffic via network device. L4 switch needs various additional costs and devices to achieve this special purpose. To solve this problem, there appears need for a central management of control and monitoring by centralizing traffic at one position regardless of network structure and it is necessary to realize redirection function of switch at network layer. Therefore this study offer development of traffic central control system through protocol redirection of client-side.

Monitoring system design&Implementation using wireless solution (무선 통신을 사용한 모니터링 시스템의 설계 및 구현)

  • Jeon Yoon-Ho;Woo Jong-Hyun;Kim Young-Ryun;Kim Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.39-42
    • /
    • 2002
  • RS-232C는 정보기기들을 연결하는 직렬통신 표준으로, 간단한 구조로 인해, 복잡한 요구 조건이 없는 상용 기기들의 제어 및 감시용으로 사용되고 있다. 최근 무선동신기술이 발전함에 따라, 저가격의 무선통신 기술을 활용하여 무선 RS-232C에 대한 요구가 늘어나고 있다. 무선 RS-232C로 기존 유선의 RS-232C를 대체함으로서, 기존 시스템의 변경없이 편리한 접속기능을 대체한 수 있을 것이다. 본 논문에서는 유선 RS-232C를 대체하는 무선 RS-232C 모듈을 채용하여, 전력제어에 사용하는 배전자동화 장치의 관리를 간편하게 하는 시스템의 구현에 대해서 다루고 있다. 배전 자동화시스템은 일종의 SCADA시스템의 일부로서, 통신 프로토콜로서 산업용 DNP3.0을 사용하고 있다. 무선 RS-232C 링크의 신뢰성을 확보하기 위하여, 무선 구간에 DNP3.0을 채택하였으며, 무선 통신방식으로는 무선 RF, 블루투스(Bluetooth), 무선랜(wireless LAN)등 3가지 방식을 채용하여, 설계, 구현내용을 기술하였다.

  • PDF

Countermeasure of Sniffing Attack: Survey (효율적인 Sniffing 공격 대응방안 연구)

  • Hong, Sunghyuck;Seo, Yujeong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2016
  • Sniffing attack is a passive attack which is reassembling packets to collect personal information, bank accounting number, and other important information. Sniffing attack happens in LAN and uses promiscuous mode which is opening filtering by pass all packets in LAN, attackers could catch any packets in LAN, so they can manipulate packets. They are Switch Jamming, Port mirroring, ARP Redirect, and ICMP Redirect attack. To defend these attacks, I proposed to use SSL packet encryption, reconfiguration of switching environment, DNS, and decoy method for defending all kinds of Sniffing attacks.

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.