• Title/Summary/Keyword: Data Exchange Protocol

Search Result 237, Processing Time 0.034 seconds

Development of Test Cases of STEP AP216 for the Exchange of Hullform Data (선형정보 교환을 위한 STEP AP216 Test Case 개발)

  • 이순섭;김용대;서정우;김수영
    • Korean Journal of Computational Design and Engineering
    • /
    • v.8 no.3
    • /
    • pp.141-149
    • /
    • 2003
  • The ship STEP is an international standard for the computer-interpretable representation of ship product information and for the exchange of ship product model data. The ship STEP consists of several APs(Application Protocol), such as AP215(ship arrangement), AP216(ship moulded form), AP218(ship structures), AP226(ship mechanical systems), and AP234(operating logs, records, message). The STEP AP216(ISO 10303) are an application protocol for the exchange of ship arrangement and ship moulded forms. The AP216 specifies the geometric shape and the hydrostatic properties of the ship moulded form. This paper introduces the state-of-the-art of ship STEP AP216 and develops the test case for the validation of data structure of AP216.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

An Efficient Password-based Authentication and Key Exchange Protocol for M-Commerce Users (M-Commerce 사용자를 위한 효율적인 패스워드 기반 인증 및 키교환 프로토콜)

  • Park Soo-Jin;Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.3
    • /
    • pp.125-132
    • /
    • 2005
  • Wireless access always has to include the authentication of communication partners and the encryption of communication data in order to use secure M-Commerce services. However, wireless systems have limitations compared with the wired systems, so we need an efficient authentication and key exchange protocol considering these limitations. In this paper, we propose an efficient authentication and key exchange protocol for M-Commerce users using elliptic curve crypto systems. The proposed protocol reduces the computational load of mobile users because the wireless service provider accomplishes some parts of computations instead of the mobile user, and it uses the password-based authentication in wireless links. Also, it guarantees the anonymity of the mobile user not to reveal directly the real identity of the user to the M-Commerce host, and preserves the confidentiality of communication data between the M-Commerce host and the user not to know the contents of communication between them to others including the wireless service provider.

Standard Discovery Protocol for Supporting Interoperability between DDS Middlewares (DDS 미들웨어의 상호운용성 제공을 위한 표준 디스커버리 프로토콜)

  • Ahn, Sung-Woo;Choi, Jong-Woo;Choi, Yoon-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.205-208
    • /
    • 2011
  • In recent years, the user interest has increased for DDS (Data Distribution Service) which is a data centric middleware based on publish-subscribe communication as the demands for real-time data exchange in distributed systems have been growing rapidly. To reflect these needs, many vendors and research groups provide their DDS middleware. However, there has been a problem with interoperability between DDS middlewares because of a lack of common communication rules such as the message exchange and the discovery manner. For this reason, OMG defines RTPS (Real-Time Publish-Subscribe) specification which is the standard network protocol used to exchange data between different implementations of DDS. In this paper, we analyze and design the SDP (Simple Discovery Protocol) of RTPS which enable DDS middleware to provide interoperable discovery mechanism.

  • PDF

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

Development of the Gateway in IEC61850 based Substation for Smart Grid (스마트 그리드용 IEC61850 기반 변전소에서의 게이트웨이 개발)

  • Yun, Seok-Yeul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.7
    • /
    • pp.1324-1330
    • /
    • 2011
  • This paper presents the development of gateway for smart grid for the interoperable communication between IEC 61850 station leveled devices and one of legacy Modbus, DNP3, and IEC60870-5-101/104/103 communication protocol devices of bay level in substation or for the exchange of information between IEC 61850 substation and SCADA control center. The data-mapping model is designed for the exchange of information and the gateway configuration tool is developed for generating meta-data based on XML Schema. this paper is mostly concerned with the design and realization of gateway system for the interoperable data communication between a legacy protocol device and IEC61850 based devices or systems.

A Robust Wearable u-Healthcare Platform in Wireless Sensor Network

  • Lee, Seung-Chul;Chung, Wan-Young
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.465-474
    • /
    • 2014
  • Wireless sensor network (WSN) is considered to be one of the most important research fields for ubiquitous healthcare (u-healthcare) applications. Healthcare systems combined with WSNs have only been introduced by several pioneering researchers. However, most researchers collect physiological data from medical nodes located at static locations and transmit them within a limited communication range between a base station and the medical nodes. In these healthcare systems, the network link can be easily broken owing to the movement of the object nodes. To overcome this issue, in this study, the fast link exchange minimum cost forwarding (FLE-MCF) routing protocol is proposed. This protocol allows real-time multi-hop communication in a healthcare system based on WSN. The protocol is designed for a multi-hop sensor network to rapidly restore the network link when it is broken. The performance of the proposed FLE-MCF protocol is compared with that of a modified minimum cost forwarding (MMCF) protocol. The FLE-MCF protocol shows a good packet delivery rate from/to a fast moving object in a WSN. The designed wearable platform utilizes an adaptive linear prediction filter to reduce the motion artifacts in the original electrocardiogram (ECG) signal. Two filter algorithms used for baseline drift removal are evaluated to check whether real-time execution is possible on our wearable platform. The experiment results shows that the ECG signal filtered by adaptive linear prediction filter recovers from the distorted ECG signal efficiently.

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.

Analysis of the IPsec Internet Key Exchange (IKE) Protocol (IPsec의 키 교환 방식에 대한 안전성 분석)

  • 주한규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.33-46
    • /
    • 2000
  • IPsec is a protocol suite to protect the data communication between computers on internet and many VPNs(Virtual Private Networks) use IPsec protocol. IKE protocol is used to exchange keys in IPsec. Formal analysis method is used increasingly in computer science to increase the reliability of a system. In this paper, the IKE protocol is analyzed formally. This paper shows that IKE with Authentication with Signature and Authentication with Pre-Shared Key is safe, but Authentication with Public Key Encryption and A Revised Method of Authentication with Public Key Encryption are safe only with the assumption that a participant has the correct public key of the correspondent. To make sure that a participant has the correct public key of the correspondent, the usage of certificate is recommended.

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.