• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.036 seconds

Design and Implementation of a Location Privacy System supporting Privacy Self Controls (프라이버시 자기제어를 지원하는 위치정보 프라이버시 시스템의 설계 및 구현)

  • Lee, Eung-Jae;Ju, Yong-Wan;Nam, Kwang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.853-862
    • /
    • 2010
  • As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.

Network Time Protocol Extension for Wireless Sensor Networks (무선 센서 네트워크를 위한 인터넷 시각 동기 프로토콜 확장)

  • Hwang, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2563-2567
    • /
    • 2011
  • Advances in smart sensors, embedded systems, low-power design, ad-hoc networks and MEMS have allowed the development of low-cost small sensor nodes with computation and wireless communication capabilities that can form distributed wireless sensor networks. Time information and time synchronization are fundamental building blocks in wireless sensor networks since many sensor network applications need time information for object tracking, consistent state updates, duplicate detection and temporal order delivery. Various time synchronization protocols have been proposed for sensor networks because of the characteristics of sensor networks which have limited computing power and resources. However, none of these protocols have been designed with time representation scheme in mind. Global time format such as UTC TOD (Universal Time Coordinated, Time Of Day) is very useful in sensor network applications. In this paper we propose network time protocol extension for global time presentation in wireless sensor networks.

One-Snapshot Algorithm for Secure Transaction Management in Electronic Stock Trading Systems (전자 주식 매매 시스템에서의 보안 트랜잭션 관리를 위한 단일 스냅샷 알고리즘)

  • 김남규;문송천;손용락
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.209-224
    • /
    • 2003
  • Recent development of electronic commerce enables the use of Electronic Stock Trading Systems(ESTS) to be expanded. In ESTS, information with various sensitivity levels is shared by multiple users with mutually different clearance levels. Therefore, it is necessary to use Multilevel Secure Database Management Systems(MLS/DBMSs) in controlling concurrent execution among multiple transactions. In ESTS, not only analytical OLAP transactions, but also mission critical OLTP transactions are executed concurrently, which causes it difficult to adapt traditional secure transaction management schemes to ESTS environments. In this paper, we propose Secure One Snapshot(SOS) protocol that is devised for Secure Transaction Management in ESTS. By maintaining additional one snapshot as well as working database SOS blocks covert-channel efficiently, enables various real-time transaction management schemes to be adapted with ease, and reduces the length of waiting queue being managed to maintain freshness of data by utilizing the characteristics of less strict correctness criteria. In this paper, we introduce the process of SOS protocol with some examples, and then analyze correctness of devised protocol.

An Internet Multicast Routing Protocol with Region-based Tree Switching (지역망간의 트리전환을 이용하는 인터넷 멀티캐스트 라우팅 프로토콜)

  • Kim, Won-Tae;Park, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.234-243
    • /
    • 2000
  • We design a modified network architecture with condsidering current Internet network model and traffic characteristics, and propose EDCBT(Enhanced Dispersed Core-based Tree) multicast routing protocol, which enhances scalabity, reliability, end-to-end delay and resource utilization EDBCT adopts bidirectional dispersed shared trees and manages both of intradomain and interdomain multicast trees for a multicast group. Each regional multicast tree is estabilshed from its core router and they are interconnected by the operation between border routers on edges of each regional network. As a result, interdomain multicast tree can be easily established. We introduce a new concept named RBTS(Region-based Tree Switching), which dramatically enhances QoS and network utilization. Finally, protocol performance and the effect of core router location are evaluated with MIL3 OPNet network simulator, in terms of end-to-end delay, packet loss and throughput.

  • PDF

OSEK OS Based Gateway for Interconnecting WAVE and CAN (WAVE와 CAN 연동을 위한 OSEK OS기반 게이트웨이)

  • Kim, Ju-Young;Seo, Hyun-Soo;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.133-141
    • /
    • 2014
  • Recently, various services are provided by using WAVE protocol for communication among neighboring vehicles. And in order to operate stable system, the gateway for interconnecting in and out vehicle networks is required. In this paper, we propose gateway interconnecting WAVE and CAN protocol. The proposed gateway based on OSEK OS consists of a communication layer, a message translator layer and a message management layer. In the communication layer, WAVE communication part and CAN communication part are designed to communicate with WAVE and CAN. And in the message management layer, message management layer functions to store the received messages and check errors with the message. Based on these functions, experiment was conducted to analyze performance of the gateway with two scenarios such as transmitting periodically BSM as a message structure for safety services in vehicle-to-vehicle communications and responding to road side equipments requiring in-vehicle information. As a result of test, we verify our gateway performance by analyzing measured time in test scenarios.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Study on Intelligent Service Gateweay platform designed for IoT (IoT서비스플랫폼을 위한 지능형 Gateway 설계에 관한 연구)

  • Lee, So-Haeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.244-247
    • /
    • 2016
  • Internet of Things spotlighted by the recent growth of the country: the interest in (IoT Internet pf Things) is being maximized. According to the scale of the 2013 Machina Research 2022 yireundago IoT market it is predicting about $ 1.2 trillion. Also the number of IoT devices connected simultaneously to the 2020 worldwide reached about 2.1 billion, and is expected to require about 200 million communications link. Many of these devices in order to manage and operate them efficiently IEEE 802.15.4e, D2D, Beacon, supporting protocols such as Zigbee gateway and network Connectivity to the urgent need for a proactive response to M2M -based operating convert it to a standard protocol being. This paper supports a variety of devices with different protocols and propose the design of intelligent Gateway with integrated features to manage operations.

  • PDF

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information (상태정보에 따른 체내삽입형 장치를 부착한 유-헬스케어 환자의 프라이버시 보호 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.297-306
    • /
    • 2012
  • IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.

The Web Viewer System Development of Real-Time Patient Monitering using HL7(Healthy Level Seven) Protocol (HL7(Healthy Level Seven) 프로토콜을 이용한 실시간 환자 모니터링 웹 뷰어시스템 개발)

  • Kim, Gwang-Jun;Lim, Se-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.546-555
    • /
    • 2009
  • HL7 is well-known standard protocol for text data generated in hospital information systems. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In this paper, we have to design to obtain useful vital sign information, which is generated at data receiver modulor of HIS, that is offered by the central monitor. Vital sign informations of central monitor is composed of the row data of several bedsite patient monitors. We are willing to maintain vital sign information of real time and continuity that is generated from the bedsite patient monitor. It is able to apply to remote medical examination and treatment. we proposed integration method between vital sign database systems and hospital information systems. Through the proper exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.