• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.034 seconds

A Implementation on Interface Module and Communication Protocol for Control Monitoring of the AtoN AIS (AtoN AIS 제어감시용 인터페이스 모듈과 통신프로토콜 구현)

  • Cha, Yeong-Mun;Jeong, Yeong-Cheol;Choi, Jo-Cheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.683-688
    • /
    • 2011
  • Current is change to concept that management traffic of ship os magnified gradually to near shore waters from harbor. Therefore, introducing the technology of AIS in the ground station, lighthouse, bouy, sea facilities etc.. that is support equipment for safety sailing of ship and safety security of harbor and ship administration. The operation and maintenance of AIS for aids to navigation are required to efficient method. With this actuality, sea advanced nation of EU, USA, Japan that has been apply for developing AtoN AIS equipment that is connected equipment of technology standard in IALA. Because of it is expected to depend equipment in income, that is required to domestic technology of the AtoN AIS. This paper is targeted to development that is suitable automation AtoN AIS equipment in environmental peculiarity for constructor AtoN operating administration center. It has been realization send protocol for information interchange.

A Owner's Privacy Preserving Protocol for u-Fitness-based Exercise Management in Cloud Computing (클라우드 컴퓨팅에서 u-Fitness 기반 운동 관리를 위한 소유자의 프라이버시를 보장하는 프로토콜)

  • Kim, Tae-yeon;Cho, Ki-hwan;Choi, Eun-Bok
    • Smart Media Journal
    • /
    • v.6 no.3
    • /
    • pp.21-28
    • /
    • 2017
  • There is growing interest in the use of cloud services these days because the amount of sensitive physical information related to u-fitness-based exercise management increase in explosive. However, it is possible to illegally access information stored in a cloud server, and to find out who owns the information, even, to illegally deduce an association among the information stored in its memory. The cloud server may also intentionally pass over the owner's legitimate operation requests such as modification and deletion of stored information, and may lose or damage information due to its malfunction. So, it is strongly required to solve the above problems because we can not trust the cloud server entirely. In this paper, we propose a protocol to preserve the privacy of the owner for u-Fitness-based exercise management in a cloud computing environment. And we show that our proposed architecture is applicable in real environment through security analysis and performance analysis.

Development of Device Management and Safety Diagnosis Manual for Electrical Stimulating Swallowing-Assist Equipments (전기적 자극방식 삼킴 보조 치료기의 장비관리/안전진단 매뉴얼 개발)

  • Heo, S.Y.;Choi, B.G.;Rhee, G.M.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.8 no.2
    • /
    • pp.79-88
    • /
    • 2014
  • In Republic of Korea, there are considerable vulnerability in electrical stimulating swallowing-assist equipments even though they are professional medical equipments and have high penetration rate with heavy frequency of use. Therefore, in this article, we developed Device Management and Safety Diagnosis Manual for Electrical Stimulating Swallowing-Assist Equipments system. For achieving this, we collected and analysed international standard data from international organizations like International Electrotechnical Commission(IEC). After literature reviews, we build maintenance worksheet and equipment procedure manual for electrical stimulating swallowing-assist equipments according to evidences we collected. These manual and protocol would be used as standard process and contribute to sustain accuracy, effectiveness of the devices, also decrease failure rate and assist to save medical documents.

  • PDF

Tree-based Group Key Agreement Protocol using Pairing (Pairing을 이용한 트리 기반 그룹키 합의 프로토콜)

  • 이상원;천정희;김용대
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.101-110
    • /
    • 2003
  • Secure and reliable group communication is an increasingly active research area prompted by the growing popularity of many types of group-oriented and collaborative applications. The central challenge is secure and efficient group key management. While centralized methods are often appropriate for key distribution in large multicast-style groups, many collaborative group settings require distributed key agreement techniques. Most of prior group key agreement protocols have been focused on reducing the computational costs. One exception is STR protocol that optimizes communicational cost. On the other hand, it requires O(n) number of modular exponentiations. In this paper, we propose a new group key agreement protocol that modifies STR protocol by utilizing pairing based cryptography. The resulting protocol reduces computational cost of STR protocol while preserving the communication cost.

Study on Message Exposure to Administrator in Secure Messaging Protocol MLS (보안 메시징 프로토콜 MLS에서 관리자에 메시지노출에 관한 연구)

  • Kwon, Songhui;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.255-266
    • /
    • 2022
  • Messenger applications applied end-to-end encryption on their own to prevent message exposure to servers. Standardization of a group messaging protocol called Message Layer Security (MLS) with end-to-end encryption is being discussed for secure and efficient message communication. This paper performs safety checks based on the operation process and security requirements of MLS. Confidentiality to a middleman server, which is an essential security requirement in messenger communication, can be easily violated by a server administrator. We define a server administrator who is curious about the group's communication content as a curious admin and present an attack in which the admin obtains a group key from MLS. Reminds messenger application users that the server can view your communication content at any time. We discuss ways to authenticate between users without going through the server to prevent curious admin attacks.

A Study on Similarity Analysis of SNMP MIB File (SNMP MIB 파일의 유사도 분석에 관한 연구)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.

An Administration Tool for CoSlide Collaborative System (CoSlide 협업시스템을 위한 관리 도구)

  • Lee, Hong-Chang;Shin, Won-Joon;Kim, Dong-Ho;Lee, Myung-Joon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.642-646
    • /
    • 2006
  • Jakarta-Slide는 Tomcat 웹서버의 WebDAV 프로토콜 지원 모듈로서 인터넷을 통하여 다양한 콘텐츠의 비동기적인 협업을 지원한다. CoSlide 협업시스템은 이러한 Jakarta-Slide를 사용하여 효과적으로 협업을 지원하는 시스템이다. CoSlide 협업시스템은 협업을 위한 가상공간을 제공하며 다양한 클라이언트를 통하여 가상공간에 자원을 등록하고 관리할 수 있다. CoSlide 협업시스템을 많은 사용자나 그룹이 사용하게 될 경우 가상공간과 자원에 대한 효과적인 관리가 필요하다. 하지만 현재의 CoSlide 협업시스템에서는 이러한 가상공간과 자원에 대한 전문적인 관리 기능을 지원하는 도구가 지원되고 있지 않기 때문에 관리 작업이 비효율적으로 이루어지고 있다. 본 논문에서는 CoSlide 협업시스템의 관리 도구 개발에 대하여 기술한다. CoSlide 관리 도구는 Tomcat Administrator Tool을 확장하여 구현되었으며, 효과적인 가상공간과 사용자 관리 기능을 제공한다. 시스템 관리자는 CoSlide 관리 도구를 통하여 협업에 참여하는 사용자를 추가하거나 삭제할 수 있으며 이러한 작업에 따라 개인 가상공간이 자동적으로 관리된다. 또한 그룹 가상공간의 정보를 제공하며 참여하고 있는 사용자들을 파악하고 등록된 가상공간에 대한 정보를 제공하여 효과적인 관리 기능을 제공한다.

  • PDF

Designed and Implementation of Layered Configuration Management for the Efficient Management of Intranet (효율적인 인트라넷 관리를 위한 계층적 구성 관리 시스템 설계 및 구현)

  • 라연경;김호철;서승호;문해은;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1228-1237
    • /
    • 2002
  • Network management is composed of five major functional areas, fault, configuration, account, performance and security management in the ITU standards. Configuration management identifies, exercises control over, collects data from network element node system and provides data to the management systems. The proposed architecture is designed based on the Distributed Processing Environment of CORBA(Common Object Request Broker Architecture) Spec v2.3. In this paper, configuration management system has been designed and implemented with layered managed object. It provides that integrated management of various data link layer technology. We suggest MIB(Management Information Base)/MIT(Management Information Tree) to support integrated management and distributed environment.

A Route Shortening Mechanism for DSR protocol in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 DSR 프로토콜을 위한 경로 축소 방법)

  • Ha, Eun-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.6
    • /
    • pp.475-482
    • /
    • 2007
  • Mobile nodes in ad-hoc wireless networks play roles of router as well as host. Movement of nodes causes network topology changes, which make existing routing information be modified. Therefore many routing protocols for ad-hoc networks were suggested in the literature. In this paper, we suggest an enhanced automatic route shortening method for dynamic source routing(DSR) protocol. DSR is a request/response based protocol which has low routing overhead owing to node movement. The current automatic route shortening is performed on the only nodes which belong to the source route of packets. On the contrary, our suggested method allows all neighbor nodes hearing the packet to participate in automatic route shortening. It makes all possible route shortenings be performed. So we maintain maximal shortened routes of ongoing data connections. Simulation results with ns2 show that our method pays small extra protocol overhead for ARS, but increases the ratio of successful packet transmissions and the number of ARSs performed in our mechanism is from 2 to 5 times higher than in original ARS mechanism and therefore it will improve the network-wide energy consumption in wireless ad-hoc networks.

Study of N-Port Electric Vehicle Charging Systems Using OPC-UA (OPC UA를 이용한 N-Port EV 충전 시스템 연구)

  • Lee, Seong Joon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.343-352
    • /
    • 2017
  • IEC62541, known as OPC-UA, is a standard communication protocol for Smart Grid (SG) and Smart Factory application platform. It was accepted as an IEC standard (IEC62541) in 2011 by IEC TC57, and is extending range of application as collaborating with other standrads. The government's policies to popularize EVs ("Workplace Charging Challenge"), the number of Electric vehicle which try to be charging in the factory is expected to increase. In this situation, indiscreet and uncontrolled EV charging can lead to some problems, such as excess of the peak demand capacity. Therefore, EVs, which is charging in SFs, must be monitoring and controlling to avoid and reduce peak demand. However, the standards for EVs charging differ from the standards for SFs. In other words, to increase the ease of use for drivers, and reduce risk for enterprise, we have needs of study to develop the protocols or to provide interoperability, for EVs charging in SFs. This paper deals with a EV charging management platform installing in a smart factory. And this platform can be easily integrated as part of SF management software. The main goal of this paper is to implement EV management system based on IEC61851 and IEC62541.