• Title/Summary/Keyword: CAN message

Search Result 1,912, Processing Time 0.038 seconds

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Benyamina Ahmed;Benyamina Zakarya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.169-176
    • /
    • 2023
  • The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.

The Effects of Intention Inferences on Scarcity Effect: Moderating Effect of Scarcity Type, Scarcity Depth (소비자의 기업의도 추론이 희소성 효과에 미치는 영향: 수량한정 유형과 폭의 조절효과)

  • Park, Jong-Chul;Na, June-Hee
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.4
    • /
    • pp.195-215
    • /
    • 2008
  • The scarcity is pervasive aspect of human life and is a fundamental precondition of economic behavior of consumers. Also, the effect of scarcity message is a power social influence principle used by marketers to increase the subjective desirability of products. Because valuable objects are often scare, consumers tend to infer the scarce objects are valuable. Marketers often do base promotional appeals on the principle of scarcity to increase the subjective desirability their products among consumers. Specially, advertisers and retailers often promote their products using restrictions. These restriction act to constraint consumers' ability th take advantage of the promotion and can assume several forms. For example, some promotions are advertised as limited time offers, while others limit the quantity that can be bought at the deal price by employing the statements such as 'limit one per consumer,' 'limit 5 per customer,' 'limited products for special commemoration celebration,' Some retailers use statements extensively. A recent weekly flyer by a prominent retailer limited purchase quantities on 50% of the specials advertised on front page. When consumers saw these phrase, they often infer value from the product that has limited availability or is promoted as being scarce. But, the past researchers explored a direct relationship between the purchase quantity and time limit on deal purchase intention. They also don't explored that all restriction message are not created equal. Namely, we thought that different restrictions signal deal value in different ways or different mechanism. Consumers appear to perceive that time limits are used to attract consumers to the brand, while quantity limits are necessary to reduce stockpiling. This suggests other possible differences across restrictions. For example, quantity limits could imply product quality (i.e., this product at this price is so good that purchases must be limited). In contrast, purchase preconditions force the consumer to spend a certain amount to qualify for the deal, which suggests that inferences about the absolute quality of the promoted item would decline from purchase limits (highest quality) to time limits to purchase preconditions (lowest quality). This might be expected to be particularly true for unfamiliar brands. However, a critical but elusive issue in scarcity message research is the impacts of a inferred motives on the promoted scarcity message. The past researchers not explored possibility of inferred motives on the scarcity message context. Despite various type to the quantity limits message, they didn't separated scarcity message among the quantity limits. Therefore, we apply a stricter definition of scarcity message(i.e. quantity limits) and consider scarcity message type(general scarcity message vs. special scarcity message), scarcity depth(high vs. low). The purpose of this study is to examine the effect of the scarcity message on the consumer's purchase intension. Specifically, we investigate the effect of general versus special scarcity messages on the consumer's purchase intention using the level of the scarcity depth as moderators. In other words, we postulates that the scarcity message type and scarcity depth play an essential moderating role in the relationship between the inferred motives and purchase intention. In other worlds, different from the past studies, we examine the interplay between the perceived motives and scarcity type, and between the perceived motives and scarcity depth. Both of these constructs have been examined in isolation, but a key question is whether they interact to produce an effect in reaction to the scarcity message type or scarcity depth increase. The perceived motive Inference behind the scarcity message will have important impact on consumers' reactions to the degree of scarcity depth increase. In relation ti this general question, we investigate the following specific issues. First, does consumers' inferred motives weaken the positive relationship between the scarcity depth decrease and the consumers' purchase intention, and if so, how much does it attenuate this relationship? Second, we examine the interplay between the scarcity message type and the consumers' purchase intention in the context of the scarcity depth decrease. Third, we study whether scarcity message type and scarcity depth directly affect the consumers' purchase intention. For the answer of these questions, this research is composed of 2(intention inference: existence vs. nonexistence)${\times}2$(scarcity type: special vs. general)${\times}2$(scarcity depth: high vs. low) between subject designs. The results are summarized as follows. First, intention inference(inferred motive) is not significant on scarcity effect in case of special scarcity message. However, nonexistence of intention inference is more effective than existence of intention inference on purchase intention in case of general scarcity. Second, intention inference(inferred motive) is not significant on scarcity effect in case of low scarcity. However, nonexistence of intention inference is more effective than existence of intention inference on purchase intention in case of high scarcity. The results of this study will help managers to understand the relative importance among the type of the scarcity message and to make decisions in using their scarcity message. Finally, this article have several contribution. First, we have shown that restrictions server to activates a mental resource that is used to render a judgment regarding a promoted product. In the absence of other information, this resource appears to read to an inference of value. In the presence of other value related cue, however, either database(i.e., scarcity depth: high vs. low) or conceptual base(i.e.,, scarcity type special vs. general), the resource is used in conjunction with the other cues as a basis for judgment, leading to different effects across levels of these other value-related cues. Second, our results suggest that a restriction can affect consumer behavior through four possible routes: 1) the affective route, through making consumers feel irritated, 2) the cognitive making route, through making consumers infer motivation or attribution about promoted scarcity message, and 3) the economic route, through making the consumer lose an opportunity to stockpile at a low scarcity depth, or forcing him her to making additional purchases, lastly 4) informative route, through changing what consumer believe about the transaction. Third, as a note already, this results suggest that we should consider consumers' inferences of motives or attributions for the scarcity dept level and cognitive resources available in order to have a complete understanding the effects of quantity restriction message.

  • PDF

An Adaptive Message-Passing System for ATM-Based Wide-Area Clusters

  • Park, Sung-Yong
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.403-407
    • /
    • 1999
  • In this paper we present an architecture, implementation, and performance evaluation of an adaptive communication system (ACS) for wide-area ATM clusters. Our approach capitalizes on thread-based programming model to overlap computation and communication and develop a dynamic message-passing environment with separate data and control paths. This leads to a flexible and adaptive message-passing environment that can support multiple flow control, error control, and multicasting algorithms. We show the performance of ACS applications and compare them with p4, PVM, and MPI applications.

  • PDF

Design and Implementation of Web-based SNMP Fault Management System Using Double Message Broker (이중 메시지 브로커를 이용한 웹기반 SNMP 장애관리시스템 설계 및 구현)

  • 이위혁;백승진;송재원
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.89-92
    • /
    • 2002
  • It is important that fault management of devices which is composing network in the next-generation internet environment. It is best method of operating network safely and efficiently. In this paper, we have suggested double message broker architecture to transmit trap messages in web-based fault management system using Java technologies. The double message broker fault management system shows that manager can do its own job efficiently

  • PDF

Performance Enhancement of AODV Routing Protocol Based on Interrupt Message and Backup Path Strategy in MANET (MANET환경에서 Interrupt Message와 Backup path 기법에 기반한 AODV의 성능개선)

  • Lee, Yun-kyung;Kim, Ju-gyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1313-1329
    • /
    • 2015
  • In MANET, frequent route breaks lead to repeated route discovery process and this increases control packet overhead and packet drop. AODV-I improves performance of AODV by using the event driven approach which removes periodic Hello message. Unlike the Hello message, Interrupt message which is sent for each event can detect and predict the link failure because it allows node to know the status of the neighbor node. From this characteristics of Interrupt message, performance of AODV-I can be further improved by adding a processing procedures for each type of Interrupt message and it is also possible to improve AODV-I by adding the Backup path scheme because it originally has problems due to a single path of AODV. In this paper, we propose AODV-IB that combines improved Backup path scheme and Interrupt message approach of AODV-I in order to reduce transmission delay and the number of route discoveries. AODV-IB improves AODV-I by adding proper processing procedures for the link failure prediction and detection for each Interrupt message. We also implement improved Backup path strategy in AODV-IB by minimizing delay without additional Control packet. Simulation results, using the simulator QualNet 5.0, indicate that proposed AODV-IB performs better than AODV-I.

A Feasible Condition for EDF-based Scheduling of Periodic Messages on a Synchronized Switched Ethernet (동기식 스위칭 이더넷에서 주기적 메시지에 대한 마감시간우선 기반 메시지 스케쥴링을 위한 조건)

  • Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.4
    • /
    • pp.403-410
    • /
    • 2010
  • The switched Ethernet has many features for real-time communications such as providing traffic isolation, large bandwidth, and full-duplex links, and so on. The switched Ethernet, however, cannot guarantee the timely delivery of a real-time message because message delay increases when collisions occurs at the output ports and message loss can even occur due to the overflow at the output buffer. Recently, many research efforts have been done to use the switched Ethernet as an industrial control network. In the industrial control network, sensors periodically sense the physical environment and transmit the sensed data to an actuator, and the periodic messages from sensors to actuators have typically real-time requirements such that those messages must be transmitted within their deadlines. This paper first suggests a feasible condition for EDF (Earliest Deadline First)-based scheduling of periodic messages on a synchronized switched Ethernet and a message scheduling algorithm which satisfies the proposed feasible condition. Pedreiras, et al. [10] suggested a feasible condition for message scheduling on the Ethernet (shared media Ethernet), but there has been no research result on the scheduling condition on the switched Ethernet until now. We compared the real-time message scheduling capacity between the Ethernet and the switched Ethernet by simulation. The simulation result shows that the message scheduling capacity of the Ethernet has almost remained constant as the number of nodes on the network increases, but, in the case of the switched Ethernet, the message scheduling capacity has increased linearly according to the number of nodes on the network.

A Study on Conditional Access Message Multiplexing Method in T-DMB Conditional Access System (T-DMB 제한수신시스템에서 제한 수신 메시지 다중화 기법 연구)

  • Kim, Dong-Hyun;Seo, Hyung-Yoon;Bae, Byung-Jun;Kim, Jong-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.722-724
    • /
    • 2010
  • CAS(Conditional Access System) was developed for paid-for service in cable and fixed satellite broadcast system and technology and market maturity are high. However, these assessment is limited by CAS in fixed broadcasting system. In case of digital mobile broadcast such as T-DMB is difficult to apply CAS technology of fixed broadcasting system because of a use method and technology characteristic. Expecially, in case T-DMB using limited resources, a CAS message which must transmit in each service channel can cause problems. It is desirable that system transmits the CAS message which transmitted by each service channel through logical CAS message-only channel. In order to make a logical CAS message channel, we need a multiplexing techniques for CAS message using in each channel. In this paper, we design the CAS message multiplexing techniques for composition of CAS message-only channel.

  • PDF

Advanced Message Storing Method on mobilePOST SMSC (mobilePOST SMSC(Short Message Service Center)에서의 향상된 메시지 저장 기법)

  • Song, Byung-Kwen
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.2
    • /
    • pp.126-138
    • /
    • 2008
  • This paper proposes the preservation method that can effectively process short messages at mobilePOST SMSC(Short Message Service Center) platform on CDMA(Code Division Multiple Access). There are three techniques for the preservation method. First one is shared memory technique where several processes within the system share same memory to process transmission of short messages with maximum performance. Second one is to back-up messages in shared memory to the file system to prevent lost during system initialization or other unstable period. Third technique is that when transmission of short message was completed, finished message is moved from the shared memory to relational database for accounting purposes.

Spam Message Filtering with Bayesian Approach for Internet Communities (베이지안을 이용한 인터넷 커뮤니티 상의 유해 메시지 차단 기법)

  • Kim, Bum-Bae;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.733-740
    • /
    • 2006
  • Spam Message has been Causing widespread damages on the Internet. One source of the problems is rooted from an anonymously posted message in the bulletin board in Internet communities. This type of the Spam messages tries to advertise products, to harm other's reputation, to deliver religious messages and so on. In this paper we present the Spam message filtering using the Bayesian approach. In order to increase usefulness of the Spam filter in the bulletin board in Internet communities, we made the Spam filter which can divide the Spam message into six categories such as advertisement, pornography, abuse, religion and other. The test conducted against messages posted on the popular web sites.