• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.034 seconds

Design of a Mutual Exclusion Algorithm in Mobile Distributed Systems (이동 분산 시스템에서 상호배제 알고리즘의 설계)

  • Park, Sung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.50-58
    • /
    • 2006
  • The mutual exclusion (MX) paradigm can be used as a building block in many practical problems such as group communication, atomic commitment and replicated data management where the exclusive use of an object might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need a mutual exclusion protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. In this paper, we describe a solution to the mutual exclusion problem from mobile computing systems. This solution is based on the token-based mutual exclusion algorithm.

  • PDF

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

A Study on Security Enhancement for the Use and Improvement of Blockchain Technology (보안성 강화를 위한 블록체인기술의 활용과 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • In this study, in relation to blockchain protocol and network security, we study the configuration of blockchain and encryption key management methods on smart contracts so that we can have a strong level of response to MITM attacks and DoS/DDoS attacks. It is expected that the use of blockchain technology with enhanced security can be activated through respond to data security threats such as MITM through encryption communication protocols and enhanced authentication, node load balancing and distributed DDoS attack response, secure coding and vulnerability scanning, strengthen smart contract security with secure consensus algorithms, access control and authentication through enhanced user authentication and authorization, strengthen the security of cores and nodes, and monitoring system to update other blockchain protocols and enhance security.

Implementation of Service Model to Exchange of Biosignal Information based on HL7 Fast Health Interoperability Resources for the hypertensive management (고혈압 관리를 위한 헬스레벨 7 FHIR 기반 생체정보 교환 서비스 모델 구현)

  • Cho, Hune;Won, Ju Ok;Hong, Hae Sook;Kim, Hwa Sun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.21-30
    • /
    • 2014
  • Hypertension is one of the major causes of death in the world as it is related with cardiovascular or cerebrovascular disease, so it is needed to provide continuos management for blood pressure. This study selected Health Level 7 Fast Health Interoperability Resources (HL7 FHIR) as a bio-signal data exchange service model that can provide constant blood pressure management in the rapidly growing mobile health care environment. The HL7 FHIR framework developed communicates with the IEEE 11073-10407 Personal Health Device (PHD) protocol through the bluetooth Health Device Profile (HDP) between the manager (smart phone) and the agent (hemomanometer) and acquires information about blood pressure. According to the test results, it performed its tasks successfully including hypertension patients' blood pressure monitoring, management on measured records, generation of document, or transmission of measured information. Because in the actual, clinical environment, it is possible to transmit measured information through the TCP/IP protocol, it will be needed to conduct constant research on it and vitalize it in the field of mobile health care afterwards.

A Design and Implementation of Service Provider Initiated Multicast Middleware for Reliable Multimedia Data Communication (멀티미디어 데이터 통신의 신뢰성 보장을 위한 서비스 제공자 중심의 멀티캐스트 미들웨어 설계 및 구현)

  • Kim, Moon-Hwa;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.11-18
    • /
    • 2002
  • The IP multicasting service system based on IGMP(Internet Group Management Protocol) is the receiver initiated multicasting system that all receivers must join to and leave from the server of multicasting service. The IGMP is less effective and reliable to apply the education system that all computers of students ore synchronized a teacher's computer. A proposed middle-ware in this paper provides the reliable data transferring and the server initiated multicasting system that client as student's PC is controled by a multicasting server as teacher's PC, This middle-ware is consisted with two major component, The one is the group manager that handle the status informations of members in each group. Another is the reliable sender/receiver that has The transmission protocol based on NAK message and flow control. As the results of the test that 22khz digital voice data and 1024$\times$768 24bit color image data were tested for 30 PCs connected with 100baseT, the voice data was completely without error transferred and the image data was successfully transferred with 0.004% retransmit rate under 2 frames/sec load.

  • PDF

Design and Implementation of USN Protocol for Managing Rooms in a Large Building (대형 건축물 객실 관리를 위한 USN 프로토콜 설계 및 구현)

  • Jeong, Woo-Jeong;Yoo, Kwan-Hee;Kim, Jong-Heon;Kim, Tae-Ho;Choi, Sung-Chul;Jeong, Kyu-Seuk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.491-496
    • /
    • 2009
  • In this paper, we propose USN Protocol of Room Control with high efficiency and new routing techniques. I establish a network of cluster hierarchy structure under bases standard for IEEE 802.15.4 and another networks to manage each room use a control packet transmitted and The proposed protocol does not perform BroadCast over a network and transmits a packet to same layer to the destination and then passes the packet after doing searches. If a destination to be transmitted cannot be looked up, the protocol transmits AODV routing packet so that not only traffic load of a wireless network is decreased, but also efficient routing path can be obtained.

  • PDF

Network-Based Partially-Distributed Mobility Management Mechanism and Performance Evaluation (망기반 부분분산형 이동성 관리 메커니즘 및 성능분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.75-84
    • /
    • 2014
  • In order to solve the problems such as overload, single point of failure, non-optimized data path, and network scalability in conventional central mobility management protocols, distributed mobility management schemes have been continually studied in and around the IETF. In this paper, a network-based partially-distributed mobility management mechanism, pDMMv6, is suggested and the performance comparison with traditional protocols such as PMIPv6 and MIPv6 is made through simulation under the various user traffic environment. The simulation results include UDP packet delivery ratio, end-to-end packet delay, binding delay for registration signaling, CPU utilization in each node, and response delays in several server-client TCP applications such as web browsing, e-mail, telnet remote login, FTP file up/down-load, and database access.

The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node (이동 Ad-hoc 노드용 사전 키 분배 기법 및 경량 키 분배 프로토콜을 위한 보안관리 서버 시스템 설계 및 구현)

  • Yang, Jong-Won;Seo, Chang-Ho;Lee, Tae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.1-8
    • /
    • 2007
  • The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.

  • PDF

Improving the Performance of Network Management Protocol SNMP (네트워크 관리 프로토콜 SNMP의 성능 향상)

  • Na, Ho-Jin;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.99-107
    • /
    • 2010
  • SNMP(Simple Network Management Protocol) is most commonly used as a standard protocol for effective network management by supporting the increasing size of the network and the variety of network elements such as router, switch, server and so on. However, SNMP has performance drawbacks of network overhead, processing latency, and the inefficiency in data retrieval. In this paper, we propose two schemes to improve the performance of SNMP; 1) the first scheme to reduce the amount of redundant OID information within a SNMP-GetBulk response message, 2) the second scheme of newly proposed SNMP-GetUpdate message combined with the cache in MNS. Through the analysis with real experiments, we show that our first scheme reduces the network overhead and the second scheme improves the processing latency and the retrieval of SNMP MB tables. And, therefore the scalability of network management can be improved.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.