• Title/Summary/Keyword: CAN 프로토콜

Search Result 2,509, Processing Time 0.028 seconds

Performance Improvement of STAC Protocol by Grouping the Number of Tags (태그 수 그룹화를 통한 STAC 프로토콜의 성능 개선)

  • Lim, Intaek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.807-812
    • /
    • 2015
  • In RFID system, when multiple tags respond simultaneously, a collision can occur. A method that solves this collision is referred as anti-collision algorithm. In 13.56MHz RFID system of Auto-ID center, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. The PS algorithm divides the tags within the identification range of reader into smaller groups by increasing the transmission power incrementally and identifies them. In this paper, we propose a STAC/PS algorithm that the PS algorithm is applied in the STAC protocol. Through simulations, it is demonstrated that the collision rate for the proposed algorithm is about 50% lower than STAC protocol. Therefore, the STAC/PS algorithm can achieve faster tag identification speed compared with STAC protocol due to the low collision rate.

Improving an RFID Mutual Authentication Protocol using One-time Random Number (개선한 일회성 난수를 이용한 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.90-97
    • /
    • 2009
  • In 2008, Kim-Jun proposed a RFID mutual authentication protocol using one-time random number that can withstand malicious attacks by the leakage of important information and resolve the criminal abuse problems. Through the security analysis, they claimed that the proposed protocol can withstand various security attacks including the replay attack. However, this paper demonstrates that Kim-Jun' s RFID authentication protocol still insecure to the replay attack. In addition, this paper also proposes a simply improved RFID mutual authentication protocol using one-time random number which not only provides same computational efficiency, but also withstands the replay attack.

Authentication Protocol based on Efficient OTP (효율적인 OTP 기반의 인증 프로토콜)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1301-1306
    • /
    • 2010
  • The protocol based on password have very important qualifications that not only satisfy against attacks cause of restricting that have, but also efficiency of reducing users' workload. It has a problem of speculative attacks for the user authentication protocol based on password with most case, because users use password that can remember easily. Song and Etc. have proposed new mechanism that improved the problem of S/KEY system. The protocol proposed by Song has a problem in registration process, and user information can be abused by the malevolent server. We propose a new authentication protocol based on efficient OPT, that improved above problems.

A improved authentication protocol for the forward security (개선된 포워드 보안을 위한 인증 프로토콜)

  • Shi, Wenbo;Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.17-27
    • /
    • 2007
  • This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.

  • PDF

The Design of Security Protocol for An Efficient Distribution and Renewal Method of Group Key (효율적인 그룹키 분배 및 갱신을 위한 보안 프로토콜의 설계)

  • O, Myeong-Uk;Kim, Seong-Yeol;Bae, Yong-Geun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.331-336
    • /
    • 2002
  • In this paper, we propose a new distribution and renewal scheme for a group key suitable for secure mobile communications based on identification protocol, in which all members of the group can reshare the new group common key except revoked members by using a key distribution center (a trusted center). The security of this scheme is based on the difficulty of the discrete logarithm problem. The proposed scheme can be appropriately managed in case that terminal's capability of storage and computing power is relatively small and more than one caller are revoked. It also renews a group key easily when the center changes this key intervally for security.

Efficient Seamless Handover Protocol in Network Mobility (NEMO) Environment (네트워크 이동성 환경에서 효율적인 Seamless 핸드오버 프로토콜)

  • Kim, Jong-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.173-178
    • /
    • 2011
  • In this paper, we propose an efficient seamless handover protocol in NEMO environment. Yokoda et al 4. proposed fast handover method with collaboration of access routers in local network and Teraoka et al. 1 showed fast handover method with collaboration of layers in mobile network. These methods can delay the time of overall binding update and increase packets loss when link of router is unstable because they transport packets through only one path or link of router. And they don't also mention redirection method of packets in their protocol in case of unstable link state of routers. The proposed protocol can execute fast binding update and reduce packets loss with collaboration of routers in mobile network.

The Development of Gateway System for Power Automation based on TETRA (TETRA 기반 전력자동화 게이트웨이 시스템 개발)

  • Song, Byung-Kwen;Kim, Geon-Ung
    • Journal of IKEEE
    • /
    • v.14 no.2
    • /
    • pp.41-50
    • /
    • 2010
  • TETRA is the standard of Digital Trunked Radio System suggested by the ETSI(European Telecommunications Standards Institut ). It is adopted as Electric Power IT Wireless Backbone Network in Korea. Police station and Fire Station are using TETRA network. Currently, Power Automation Protocols are DNP3.0 in Distribution Automation System, DLMS in Auto Metering Infrastructure, IEC61850 in Substation Automation. These protocols are transmissions using CDMA or WCDMA modem. If Power Automation protocol uses TETRA networks, it can be interoperable with the systems in police or fire stations. And it has outstanding ability to handle problems in a disaster situation. So, This paper propose a gateway system of Power Automation which can transmit the power automation protocol using TETRA.

Proposal and Design of a Novel SNA Protocol for the Power Control System (전력제어 시스템을 위한 SNA 프로토콜 제안 및 설계)

  • Park, Min-Ji;Lee, Dong-Min;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1122-1128
    • /
    • 2010
  • In this paper, we proposed and designed a novel SNA protocol which operates in the way of a server and a client in the power control system. The proposed SNA protocol includes the information about the mode switching, the saving position of context information, the user trigger, and so forth, which are needed in the power management devices. We consider the application of the SNA protocol to the home network, where message flows between the SNA server and the SNA client. To verify the operation of the SNA protocol, the state transition diagrams of the server in the home gateway and the client in the network device are shown. Hence, we can conclude the SNA can operate without malfuction.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

A Full Duplex MAC Protocol of Asymmetric Traffic Environment (비대칭 트래픽 환경에서의 전이중 MAC 프로토콜)

  • Ahn, Hyeongtae;Kim, Cheeha
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.381-386
    • /
    • 2016
  • Recently full-duplex communication in wireless networks is enabled by the advancement of self-interference cancellation technology. Full-duplex radio is a promising technology for next-generation wireless local area networks (WLAN) because it can simultaneously transmit and receive signals within the same frequency band. Since legacy medium access control (MAC) protocols are designed based on half-duplex communication, they are not suitable for full-duplex communication. In this paper, we discuss considerations of full-duplex communication and propose a novel full-duplex MAC protocol. We conducted a simulation to measure the throughput of our MAC protocol. Through the simulation results, we can verify that significant throughput gains of the proposed full-duplex MAC protocol, thus comparing the basic full-duplex MAC protocol.