• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.03 seconds

Middleware API Design for CoAP Usage (CoAP 사용을 위한 미들웨어 API 설계)

  • Kwon, Hak;Ra, Younggook;Jo, JaeDeok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2017
  • Developing the TCP/IP standard IBA which is higher organization of IETF decided to attach the TCP/IP protocol stack to small things, such as sensor. This means small object is also considered as on of the communication node, it has symbolic meaning that expand smart object has all five layer. Under this background, IoT/WoT configure the intelligent network between objects based on the internet to communication was introduced. Things has own IP address on IoT environment and are smart object that a lot of people communicate over the internet on Application Layer. In other words, IoT is that smart object are commercialized space. According to the interest of IoT, IETF establish CoAP for use as IoT protocol. CoAP is expected that standard protocols created by things is connected to the Internet protocol that can be used within a constrained environment. Accordingly, in this paper, we proposed Middleware API that can manage and collect the data of objects that connected CoAP network.

The Study on Secure Mail Platform and Mutual Authentication Using Mail Proxy (메일 프락시를 통한 사용자 상호인증 방법과 안전한 메일 플랫폼에 대한 연구)

  • Ahn, Hyo-Beom;Lee, Su-Yeon
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.201-208
    • /
    • 2016
  • The purpose of Email system is used to transmit important information between companies in today. But Email system has vulnerabilities such that changing email address of sender by attacker. So it is important to authenticate mail server and user using mail server. This paper proposed mail proxy located between mail servers that evaluate authority and authenticate sender and receiver. The proposed email platform has some functions to compose trusted domain and to authenticate mail servers in the domain. Also, if sender and recipient are valid users in mail system, each exchanges a key for confidentiality and the sender sends an e-mail encrypted with exchanged key to recipient. In this paper, we propose a key exchange scheme in proposed platform and verify this protocol using Casper which is the formal analysis tool. In the future research, we will study the overall platform of the domain configuration for the security of mail.

An Energy Efficient Routing Scheme for Cluster-based WSNs (클러스터 기반 WSN에서 에너지 효율적인 라우팅 기법)

  • Song, Chang-Young;Kim, Seong-Ihl;Won, Young-Jin;Chung, Yong-Jin
    • 전자공학회논문지 IE
    • /
    • v.47 no.3
    • /
    • pp.41-46
    • /
    • 2010
  • WSN, or Wireless Sensor Network, consists of a multitude of inexpensive micro-sensors. Because the batteries in sensor nodes can not be replaced once they are deployed, the life of a WSN is absolutely determined by the batteries. So, energy efficiency of a network is a critical factor for long-life operation. LEACH protocol which divides WSN into two groups is a typical routing protocol based on the clustering scheme for the efficient use of limited energy. It is composed of round units which are separated into set-up and steady state. In this paper we propose a power saving scheme to minimize set-up phase itself and to involve a data comparison algorithm. We evaluate the performance of the proposed scheme in comparison with original LEACH protocol. Simulation results validate our scheme has better performance in terms of the number of alive nodes as time evolves and average energy dissipated.

A Study on Automatic Surveillance System using VHF Data Link Protocol (해상이동통신에서 VHF 데이터링크 프로토콜을 이용한 자동감시시스템 연구)

  • 장동원
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.187-191
    • /
    • 2002
  • In this paper, We analysed the technical characteristics of a automatic identification system that will introduce in aviation and marine radio stations. IMO's Marine Safety Committee approved revision of chapter V of the Safety of Life at Sea(SOLAS) Convention in 73rd meeting. According to this, AIS will become a mandatory carriage requirement by 01 July 2002. AIS as a surveillance system continuously receives its own position from the GNSS and then repeatedly broadcasts it on a VHF data link for avoiding traffic conflicts and possible disasters. VHF data link is organized so that a specified number of time slots make up a repeatable frame. Each radio station can autonomously allocate and deallocate slots within the frame using selection algorithm which is called SOTDMA(Self-Organized Time Division Multiple Access). The results can be an aid in the continued of understanding technical characteristics for AIS as a broad surveillance system.

  • PDF

Design and Implementation of a Multi-level VOD Server System (복합 다단계 주문형 비디오 서버의 설계 및 구현)

  • Suh, Duk-Rok;Gang, Dae-Hyeok;Kim, Su-Jeong;Lee, Won-Seok;Lee, Jeong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.685-697
    • /
    • 1997
  • A Viedo-on-Demand(VOD) service is a multimedia service that is realized by the rapid advance of computer and data communication techmologies. Basically, a VOD system is composed of a server and a number fo clients.The server stores and manages a large amount of digital moving picture data. Each slient sends an on-line requwet to the server and receives data for real-time displying. Many researches are performed on a VOD server using hard disks for the permanent video fata storage. However, a hard disk is less reliable and requires more storage cost than a massive storage device. Due to these resasons, a multi-level VOD system is proposed for using teh jukeboxes of optical disks as the permanent video storage,device. In this paper, we prpose the necessary software modules and protocols between the server and its clients for the implementation of the multi-level VOD server.

  • PDF

A Study on the Electronic Voting Scheme Suitable for Large Scale Election (대규모 선거에 적합한 전자 선거 기법에 관한 연구)

  • Yun, Seong-Hyeon;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.543-551
    • /
    • 1997
  • Many areas of human activities are computerized with the wide spread use of computers and communication networks.Electrinic voting is an important social activity in democtatic society.The realization of electronic democracy is based on the sectrity of edectronic voting scheme.Therefore, it is necessary to use the cryto-graphic technique for secure electronic voting scheme.Therefore, it is necessary to use the cryto-graghic technique for secure election.In this stusy, an dedctronic voting scheme sutiable for large election is proposed.In order to make practi-cal volting scheme, we assume that the voting authorization center is trustful and the chaum's anonymous com-munication channel[6] prepared before the election day.The center authorizes the ballot of eligible voter by using the ID based digital signature scheme in the registeation stage.During the voting stage, undeniable chal-lenge/ response prorocol is performed between the center and the boters to ensure that the intemediate voting results should not affect the entire.The proprsed scheme fully conforms to the requirments of large scale election such as privacy of the voters, fairness, unresuability, unforgeability and eligbility.

  • PDF

A Next-generation Mobility Management Scheme for an IPv4/IPv6 Dual-stack Terminal (듀얼스택 단말을 지원하는 차세대 이동성 지원 기술 연구)

  • Lee, Kyoung-Hee;Lee, Sung-Kuen;Lee, Hyun-Woo;Han, Youn-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1182-1191
    • /
    • 2011
  • In this paper, we propose a network-based IP mobility management scheme, called Access Independent Mobile Service with IPv4/IPv6 Dual Stack (AIMS-DS), which can provide high-quality multimedia services to IPv4/IPv6 dual-stack mobile nodes (MNs) without any interruption over various wireless/wired access networks. The proposed scheme provides an MN with a fast and reliable mobility service among heterogeneous wireless access networks through the network-based control, the complete separation method of control and data plane, the cross-layer (layer2 and layer3) interworking method for handover control acceleration, etc, In addition, the proposed AIMS-DS can provide seamless mobility service to an MN under the environments of IPv4/IPv6 coexisting networks through the home address mobility support and transport network support. Through performance evaluation with computer simulations, we have shown the superiority of the proposed AIMS-DS in terms of handover latency, packet 1085 and packet delivery latency.

Present Status and Analysis for IEEE 11073 Personal Health Device Specializations (IEEE 11073 개인건강기기별 표준 현황 및 분석)

  • Park, Han-Na;Kim, Seung-Hwan;Yoo, Done-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6C
    • /
    • pp.469-475
    • /
    • 2012
  • Increasing interest of life expectancy and health has made the u-health industry activating and the several international standard developing organizations(SDO) are dealing with u-health services and technologies. Among them, IEEE 11073 PHD(Personal Health Devices) Work Group is developing standards of personal health device communication for interoperability. There are many studies for introducing SDOs and analyzing the IEEE 11073-20601 standard. However, due to the rare study of PHD standards analysis, there are a lot of difficulties to utilize the standards. In this paper, present status of national and international SDOs including IEEE 11073 standards for PHD will be introduced. Moreover, device specialization standards such as thermometer, weighing scale, glucose meter, blood pressure monitor, electrocardiograph (ECG) etc.. will be analyzed based on the IEEE 11073-20601.

A Study on Ubiquitous Road for Prevention of the Overweight Vehicles (과적차량 방지를 위한 유비쿼터스도로에 관한 연구)

  • Jo, Byung-Wan;Yoon, Kwang-Won;Park, Jung-Hoon;Kim, Heoun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.3
    • /
    • pp.225-232
    • /
    • 2008
  • Overload vehicles operate damage to road, bridge, and then increasing in maintenance and repair cost because structures are reduced durability. The existing regulation systems have many problems and need coping measure. Therefore, this paper organized Ubiquitous sensor network system for development of intelligent auto overload vehicle regulation system about high speed vehicles, also axial load WIM sensor was selected by indoor experiment through wireless protocol. And we examined possibility U-load auto overload vehicle regulation system through experiment of the transmission and reception distance. If this system will apply to road and bridge, might be effective for economy and convenience through establishment of U-IT system. And high speed vehicle that was amalgamate IT technology and existing overload regulation problems, also tested wireless sensor for USN organization. This experiment aim to organize system interface for user through perfection man-less, wireless system of Internal/External Network from high speed WIN sensor with USN organization. Accordingly, it is necessary experimentation through Test Bed for constitution External network and application of actually regulations using WCDMA/HSDPA.

Analysis of Performance and IKEv2 Authentication Exchange model in Mobile IPv6 Network (MIPv6망에서 IKEv2 인증 교환 모텔 및 성능 분석)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Kim, Dong-Kook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1085-1091
    • /
    • 2006
  • For an experiment in this paper, designed test bed to secure confidentiality of data and safe transmission that Mobile node exchanges in Mobile network. And, For IPsec use that support basically in MIPv6, modeling and experimented IKEv2 protocol that is used for reliable authentication key management and distribution between End Point. When Mobile node handoff in Mobile network, analyzed effect that authentication key re-exchange and limited bandwidth that happen often get in key exchange. And studied about Performance and latency about authentication setting and exchange process that use multi interface. To conclusion, when Mobile node transmits using IPSec, re-authentication of key confirmed that re-setting by limit of bandwidth that existent Mobile network has can be impossible. According to other result, proposed MN's multi interface is expected to minimise key exchange latency by hand-off when transmit IPSec.