• Title/Summary/Keyword: Data Exchange Protocol

Search Result 237, Processing Time 0.029 seconds

A Study on the Protocol of SSB Wireless Data for Advancing of Fishery Communication (어업통신의 선진화를 위한 SSB 무선데이타 프로토콜에 대한 연구)

  • Kim, Jeong-Nyun;Jo, Hag-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.28 no.5
    • /
    • pp.443-448
    • /
    • 2004
  • The Ministry of Maritime Affairs & Fisheries have plaining the advancing fishery information integrated system for the fishing present condition, marine resource administration and applicability considering. The fishery info17nation communication system is build up to the raw data & process-network-content. The communication system must be small size, low cost and adapted SSB transceiver, that is using fishery shipping. In this paper We present digital data communication network to exchange information for fishery and safety between fishing ship and coast station in cheeper communication fee using SSB in HF band.

Diffie-Hellman Based Asymmetric Key Exchange Method Using Collision of Exponential Subgroups (지수연산 부분군의 충돌을 이용한 Diffie-Hellman 기반의 비대칭 키 교환 방법)

  • Song, Jun Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • In this paper, we show a modified Diffie-Hellman key exchange protocol that can exchange keys by exposing only minimal information using pre-computable session key pairs. The discrete logarithm problem, which provides the safety of existing Diffie-Hellman and Diffie-Hellman based techniques, is modified to prevent exposure of primitive root. We prove the algorithm's operation by applying the actual value to the proposed scheme and compare the execution time and safety with the existing algorithm, shown that the security of the algorithm is improved more than the product of the time complexity of the two base algorithms while maintaining the computation amount at the time of key exchange. Based on the proposed algorithm, it is expected to provide a key exchange environment with improved security.

A High Speed Code Dissemination Protocol for Software Update in Wireless Sensor Network (무선 센서 네트워크상의 소프트웨어 업데이트를 위한 고속 코드 전파 프로토콜)

  • Cha, Jeong-Woo;Kim, Il-Hyu;Kim, Chang-Hoon;Kwon, Young-Jik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.168-177
    • /
    • 2008
  • The code propagation is one of the most important technic for software update in wireless sensor networks. This paper presents a new scheme for code propagation using network coding. The proposed code propagation method roughly shows 20$\sim$25% performance improvement according to network environments in terms of the number of data exchange compared with the previously proposed pipelining scheme. As a result, we can efficiently perform the software update from the viewpoint of speed, energy, and network congestion when the proposed code propagation system is applied. In addition, the proposed system solves the overhearing problems of network coding such as the loss of original messages and decoding error using the predefined message. Therefore, our system allows a software update system to exchange reliable data in wireless sensor networks.

  • PDF

The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node (이동 Ad-hoc 노드용 사전 키 분배 기법 및 경량 키 분배 프로토콜을 위한 보안관리 서버 시스템 설계 및 구현)

  • Yang, Jong-Won;Seo, Chang-Ho;Lee, Tae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.1-8
    • /
    • 2007
  • The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.

  • PDF

A Study on Hierarchical Structure and Blockchain-based Node Authentication Mechanism in MANET (MANET에서 계층적 구조와 블록체인 기반 노드 인증 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • MANET has many security vulnerabilities because it consists of only mobile nodes using wireless. In particular, it is a very important factor determining network performance that excludes the participation of malicious nodes through accurate reliability measurements and authentication of nodes participating in the network. In this paper, we proposed a technique applied with blockchain technology in order to prevent forgery of authentication information for nodes participating in the network. And, an area-based hierarchical structure was applied to increase the efficiency of authentication for nodes and apply the optimal technique of block generation and exchange protocol. In addition, four data payloads were added to the block header in order to add authentication information for nodes in block. To improve the reliability by applying the blockchain technique to the hop-by-hop data transfer method between mobile nodes, blockchain exchange protocol through transaction creation, block packaging and verification processes were implemented. We performed the comparative experiment with the existing methods to evaluate the performance of the proposed method and confirmed the excellent performance by the experiment results.

Developing Data Exchange Standard between Roadside-device and Traffic Information Center in accordance with ISO 15784 (ISO 15784를 적용한 교통정보센터와 노변장치간 데이터 교환 표준 개발 _ AVI를 중심으로)

  • Lee, Sang-Hyun;Son, Seung-Neo;Kim, Nam-Sun;Cho, Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.29-41
    • /
    • 2013
  • This study set out to developing data exchange standard between roadside device and traffic information center fitted in a domestic environment by applying international standard ISO 15784. First, we defined message basic concept of 'Dialog' and essential elements should be defined to define the standard message for securing system compatibility by reference ISO 14817 and ISO 14827 Part 1. For defining standard message items exchanged between AVI and traffic information center, we formed Working Group under ITS Standards Technical Committee and analyzed data flow for ITS National Architecture, Standard messages of existing standards, and AVI operation messages actually operated on roadside now. So, we extracted 14 functionally needed messages and defined 28 standard messages adopting 'Dialog' concept. In case of the application protocol for data exchange standards, we defined basic requirements for securing interoperability and interchangeability considering domestic environment by analyzing reference standard of ISO 15784.

Research on Metadata Schema for Data Exchange between Smart Housing Fire Service and Smart City Integration Platform (스마트하우징 화재 서비스의 스마트시티 플랫폼 연계 데이터 교환용 메타데이터 스키마 연구)

  • Dae-Kug Lee;Dae-Gyu Lee;Hyun-Kook Kahng;Choong-Ho Cho
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2024
  • Recently, cutting-edge ICT technologies such as artificial intelligence, blockchain, edge computing, and the Internet of Things have been applied in various fields to create new services and a new digital era. Along with these technological developments, various policies are being implemented in Korea to transform the country from a "Smart City" to a "Platform City". We can create new services and values by linking with the Smart City Integrated Platform and Smart Housing Platform. This paper defines a linkage scenario between a Smart Housing Platform and the Smart 119 Emergency Dispatch Support Service, one of the Smart City Safety Nets. We propose a data transmission protocol and a metadata schema for data exchange between the Smart Housing Platform and the Smart City Integrated Platform to provide the Smart 119 Emergency Dispatch Support Service.

Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol

  • Shin, Seong-Han;Kazukuni Kobara;Hideki Imai
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.75-90
    • /
    • 2004
  • At Asiacrypt 2003, Shin et al., have proposed a new class for Authenticated Key Establishment (AKE) protocol named Leakage-Resilient AKE ${(LR-AKE)}^{[1]}$. The authenticity of LR-AKE is based on a user's password and his/her stored secrets in both client side and server side. In their LR-AKE protocol, no TRM(Tamper Resistant Modules) is required and leakage of the stored secrets from $.$my side does not reveal my critical information on the password. This property is useful when the following situation is considered :(1) Stored secrets may leak out ;(2) A user communicates with a lot of servers ;(3) A user remembers only one password. The other AKE protocols, such as SSL/TLS and SSH (based or PKI), Password-Authenticated Key Exchange (PAKE) and Threshold-PAKE (T-PAKE), do not satisfy that property under the above-mentioned situation since their stored secrets (or, verification data on password) in either the client or the servers contain enough information to succeed in retrieving the relatively short password with off-line exhaustive search. As of now, the LR-AKE protocol is the currently horn solution. In this paper, we prove its security of the LR-AKE protocol in the standard model. Our security analysis shows that the LR-AKE Protocol is provably secure under the assumptions that DDH (Decisional Diffie-Hellman) problem is hard and MACs are selectively unforgeable against partially chosen message attacks (which is a weaker notion than being existentially unforgeable against chosen message attacks).

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

A New Conference Information Data Model in SIP based Distributed Conference Architecture (SIP 기반 분산형 컨퍼런스 구조에서의 새로운 컨퍼런스 정보 데이터 모델)

  • Jang, Choon-Seo;Lee, Ky-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.85-91
    • /
    • 2009
  • The centralized conference architecture has a restriction in scalability due to the performance reduction as the number of conference participants increases. To solve this problem several distributed conference architectures have been studied recently. In these architectures new conference servers are added dynamically to the conference environment. In this paper, We have proposed a new conference information data model which can be used in these distributed conference architectures. In our newly proposed conference information data model. several components has been added for exchanging conference information between primary conference server and multiple secondary conference servers. We also proposed a procedure of conference information exchange between these conference servers. And the management of conference informations and SIP(Session Initiation Protocol) notifications to the total conference participants can be processed distributedly with these conference servers, therefore the load to the primary conference server can be decreased by using this method. The performance of our proposed model has been evaluated by experiments.