• Title/Summary/Keyword: Data Exchange Protocol

Search Result 237, Processing Time 0.024 seconds

A DATA SYSTEM AND ENCRYPTION METHOD BASED ON KEY EXCHANGE CRYPTOGRAPHIC PROTOCOL USING ENHANCED SECURITY FUNCTION IN NETWORK LAYER (네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법)

  • Jaekyung-Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.425-426
    • /
    • 2024
  • 본 논문은 표준 TCP/IP 네트워크의 특징 및 암호 프로토콜의 특징을 결합하여 TCP Handshake 단계에서 암호 키 교환을 수행하고, 디바이스의 고유한 시그니처 정보를 사용하여, 암호 키 생성 데이터로 사용하여, 보안성을 강화하는 것을 특징 으로 하는 네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법에 관한 것으로 개발된 프로토콜을 키 교환 프로토콜로 대체할 경우보다 안전한 보안 프로토콜을 제공할 수 있다.

  • PDF

A Survey on the Standardization of Information Service Sector in KISTI (한국과학기술정보연구원의 정보유통부문 표준화 현황분석)

  • Lee, Yun-Seok;Seo, Tae-Sul
    • Journal of Information Management
    • /
    • v.32 no.2
    • /
    • pp.40-53
    • /
    • 2001
  • The purpose of this study is to explore the current situation and problems in standardizing knowledge information and information technology in the KISTI, and collect the basic data necessary for establishing the national information infrastructure. Through a survey and interviews with nine departments of the Information Services Sector of the KISTI, data were collected regarding the management and exchange of information and the operation of communication networks. According to the analysis of fifty KISTI databases and their operation, tasks to be first standardized include Classification of ST resources, Metadata, Date modeling, Data format, DBMS, ST terminology, and Retrieval protocol.

  • PDF

Extending a WebDAV Protocol to Efficiently Support the Management of User Properties (사용자 속성 관리의 효율적 지원을 위한 WebDAV 프로토콜의 확장)

  • Jung Hye-Young;Kim Dong-Ho;Ahn Geon-Tae;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.1057-1066
    • /
    • 2005
  • WebDAV(Web-based Distributed Authoring and Versioning), a protocol which supports web-based distributed authoring and versioning, provides a standard infrastructure for asynchronous collaboration on various contents through the Internet. A WebDAV property management is a function to set and manage the main information of the resources as properties, and a user property, one kind of the WebDAV properties, has the ability to be freely defined by users. This free definition of user property makes it very useful to develop web-based applications like a collaboration system based on WebDAV However, with an existing WebDAV property management scheme, there is a limit to develop various applications. This paper describes a DavUP(WebDAV User property design Protocol) protocol which extended the original WebDAV and its uti-lization which efficiently supports management of WebDAV user properties. DavUP needs the definition of the collection structure and type definition properties for an application. To do this, we added a new header md appropriated WebDAV method functions to the WebDAV protocol. To show the usefulness of DavUP protocols, we extended our DAVinci WebDAV server to support DavUP Protocols and experimentally implemented a general Open Workspace, which provides effective functions to share and exchange open data among general users, on the DAVinci.

Mobile Underground High-capacity 3D Spatial Information Tiling Transfer Protocol Development (모바일 지하 대용량 3D 공간정보 타일링 전송 프로토콜 개발)

  • Lee, Tae Hyung;Jo, Won Je;Kim, Hyun Woo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.491-496
    • /
    • 2021
  • In line with the modern era in which the safety of underground facilities and the use of underground information are increasingly emphasized, the state is pushing for more precise and accurate underground spatial information to be secured and utilized. Therefore, we need to pay more attention to subsurface geospatial data. In the future, the Ministry of Land, Infrastructure and Transport will actively utilize the 15 types of Integrated Underground Geospatial Information Map(6 types of underground facilities, 6 types of underground structures, 3 types of ground) that the Ministry of Land, Infrastructure and Transport is building as three-dimensional underground spatial information, and contribute greatly to improving national safety and convenience in underground construction. expected to do However, when a site manager requests an Integrated Underground Geospatial Information Map with a mobile device, if the large-capacity integrated underground space map is not quickly transmitted over the wireless section and is not serviced, it causes inconvenience to the site manager and delays work. In this paper, the goal of this paper is to enable field managers to quickly receive a tiled Integrated Underground Geospatial Information Map with minimal information exchange. Therefore, the tiling system is configured according to the dataset for high-speed Mobile Integrated Underground Geospatial Information Map transmission. In addition, a transmission system for the Mobile Integrated Underground Geospatial Information Map is established, and a TCP/IP (Transmission Control Protocol/Internet Protocol)-based spatial information tiling transmission protocol dedicated to the on-site Integrated Underground Geospatial Information Map is developed.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

Transmitting/Receiving of Standard Health Data Using Bluetooth HDP on the Android Platform (안드로이드에서 블루투스 HDP를 이용한 표준건강정보의 송수신)

  • Park, Young-Jin;Cho, Hui-Sup;Son, Jong-Wuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.464-470
    • /
    • 2013
  • These days, with increasing interest about the health care, research about standard for transmitting/receiving data of health device has been actively conducted. Standardization and testing / certification is underway through the IEEE 11073 PHD, Health Level Seven and the Continua Health Alliance, it'll continue to be more research and experiments in the future. In this paper, we introduce the IEEE 11073 PHD standards for exchange of remote health information and the Bluetooth Health Device Profile(HDP) for health device profile of the Bluetooth technology, also we conducted experiments about exchange health information between health device and smart device which are adapted the IEEE 11073 PHD and Bluetooth HDP. Transmitting/receiving of the IEEE 11073 PHD standard protocol using the Bluetooth HDP profile between health device and smart device can be known by this experiment, and it expect to implement variety of remote medical services through health device supporting these standards in future.

Adaptive Link Quality Estimation and Routing Scheme in Large-scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 적응적 링크 품질 측정 및 경로 설정 기법)

  • Lee, Jung-Wook;Chung, Kwang-Sue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.68-77
    • /
    • 2010
  • Wireless sensor networks are installed in various environments and collect sensing data through wireless links. The quality of a wireless link may be unstable due to environment causes and hardware performance in wireless sensor networks. Since the change of the link quality may cause data loss, sensor nodes need to adaptively estimate the change of the link quality. Also, the routing protocol should deal with this situation. In this paper, the adaptive link quality estimation and routing scheme in the large-scale wireless sensor networks are proposed. When the quality of a link is unstable, sensor nodes agilely estimate the quality of links, and the new route is selected. When quality of a link is stable, the link quality is occasionally estimated so that the energy consumption is reduced. Moreover, sensor nodes exchange less beacons in order to reduce an overhead in dense networks. In the case of sparse network, the sensor nodes exchange more beacons for finding a better route. We prove that the proposed scheme can improve the energy efficiency and reliability.

The automatic generation of MPTCP session keys using ECDH (MPTCP에서 ECDH를 이용한 세션 키 자동생성에 관한 연구)

  • Sun, Seol-hee;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1912-1918
    • /
    • 2016
  • MPTCP(Multipath Transmission Control Protocol) is able to compose many TCP paths when two hosts connect and the data is able to be transported through these paths simultaneously. When a new path is added, the authentication between both hosts is necessary to check the validity of host. So, MPTCP exchanges a key when initiating an connection and makes a token by using this key for authentication. However the original MPTCP is vulnerable to MITM(Man In The Middle) attacks because the key is transported in clear text. Therefore, we applied a ECDH(Elliptic Curve Diffie-Hellman) key exchange algorithm to original MPTCP and replaced the original key to the ECDH public key. And, by generating the secret key after the public key exchanges, only two hosts is able to make the token using the secret key to add new subflow. Also, we designed and implemented a method supporting encryption and decryption of data using a shared secret key to apply confidentiality to original MPTCP.

Realization of Unified Protocol of Multi-functional Controller for Transfer of Vehicle Information on the Roads (차량 검지정보 전송을 위한 다기능 제어기 통합 프로토콜 구현)

  • Ahn, Seung-Yong;Lim, Sung-Kyu;Lee, Seung-Yo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.12
    • /
    • pp.1857-1863
    • /
    • 2012
  • The VDS(Vehicle Detection System) collects and transfers information about traffic situations in real time, therefore it makes the traffic management effective. Recently, the VDSs have provided good stability and accuracy in regard to system reliability and functions but they also have showed problems such as raising costs and consuming times when a new system is installed and/or the environmental requirements for the system are set up. The reason of the problems is that up to now the collection of the data and information about the traffic situations has been achieved by the 1:1 information exchange between the traffic control surveillance center and the each traffic field, between equipments and centers, and among data processing equipments and also centers. The communication systems used in the VDS are generally composed of 1 : 1 connection of the lines because the communication protocols are different in the most of the cases mentioned above. Consequently, this makes the number of communication lines become larger and causes the cost for the whole traffic information systems to increase. In this paper, a development of a controller to unify the communication protocols for the VDS is peformed to solve the problems which were mentioned above. Specially, the controller developed in this paper was applied to a radar vehicle detector and tested to show its usefulness. In addition to that, the developed controller was also designed to include functions to transfer the information about weather conditions on the roads.

Mobility-Aware Ad Hoc Routing Protocols for Networking Mobile Robot Teams

  • Das, Saumitra M.;Hu, Y. Charlie;Lee, C.S. George;Lu, Yung-Hsiang
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.296-311
    • /
    • 2007
  • Mobile multi-robot teams are useful in many critical applications such as search and rescue. Explicit communication among robots in such mobile multi-robot teams is useful for the coordination of such teams as well as exchanging data. Since many applications for mobile robots involve scenarios in which communication infrastructure may be damaged or unavailable, mobile robot teams frequently need to communicate with each other via ad hoc networking. In such scenarios, low-overhead and energy-efficient routing protocols for delivering messages among robots are a key requirement. Two important primitives for communication are essential for enabling a wide variety of mobile robot applications. First, unicast communication (between two robots) needs to be provided to enable coordination and data exchange. Second, in many applications, group communication is required for flexible control, organization, and management of the mobile robots. Multicast provides a bandwidth-efficient communication method between a source and a group of robots. In this paper, we first propose and evaluate two unicast routing protocols tailored for use in ad hoc networks formed by mobile multi-robot teams: Mobile robot distance vector (MRDV) and mobile robot source routing (MRSR). Both protocols exploit the unique mobility characteristics of mobile robot networks to perform efficient routing. Our simulation study show that both MRDV and MRSR incur lower overhead while operating in mobile robot networks when compared to traditional mobile ad hoc network routing protocols such as DSR and AODV. We then propose and evaluate an efficient multicast protocol mobile robot mesh multicast (MRMM) for deployment in mobile robot networks. MRMM exploits the fact that mobile robots know what velocity they are instructed to move at and for what distance in building a long lifetime sparse mesh for group communication that is more efficient. Our results show that MRMM provides an efficient group communication mechanism that can potentially be used in many mobile robot application scenarios.