• Title/Summary/Keyword: Data Exchange Protocol

Search Result 238, Processing Time 0.029 seconds

Automatic Measurement of Temperature in Real Time by Using an Internal and Data Processing System (인터넷을 이용한 원격 실시간 온도 계측 모니터 및 계측데이터 자동처리 시스템)

  • Kim, Hui-Sik;Kim, Yeong-Il;Seol, Dae-Yeon;Nam, Cheol;O, Heung-Il
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.99-102
    • /
    • 2003
  • In this paper, we have developed a system for monitoring and processing the real time sensor data in remote site through Internet. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is corrected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server program working on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be applly for many parts of industry and living.

  • PDF

An Efficient RFID Distance-Bounding Protocol to Prevent Relay Attacks (중계 공격을 예방하는 효율적인 RFID Distance-Bounding 프로토콜)

  • Boo, Chang-Hee;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.610-619
    • /
    • 2010
  • RFID (radio frequency identification) systems, recently being used in a wide range of areas, are vulnerable to relay attack from malicious attackers. For that reason, Brands, et al. proposed a certification protocol between a certifier and a verifier based on the concept of distance-bounding, and in addition Hancke et al. introduced the concept of RFID. However, the delivery of tag IDs, one of the main RFID features, is not still available, and there are two important demerits: anonymity in the delivery of tag IDs suggested by Kim et al. and inefficiency in finding a tag ID with regard to how to check errors which may occur in the process of data exchange between readers and tags. Therefore, this study proposes a protocol that meets the requirements of tag anonymity and location untraceability, has resistance to errors which may take place in the phase of tag data exchange, and is very efficient in finding tag IDs.

An Information Transmission for Intelligent Train Operation (인텔리전트 열차운전을 위한 정보 전송)

  • Ahn, Sang-Kwon;Choi, Gui-Man;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 1997.07a
    • /
    • pp.339-341
    • /
    • 1997
  • This study is presenting the method for an effective data transmission in MAGLEV which is now tested and intends to provide for an intelligent operation of signal system in future. To exchange a lot of information, it is ideal to adopt a digital system and a micro-based system is essential for these purposes. FSK modulation and HDLC protocol are adopted on this study and information line assembly which is used as the information exchange, as the speech communication, and as the detection of speed and position is constructed in one unit. Actually this study is produced academic achievements of the data transmission system of MAGLEV train and an advanced method of intelligent operation in future railway system.

  • PDF

Performance evaluation of telecommunication protocols using stochastic petri nets reward model (Stochastic Petri Nets Reward Model을 이용한 통신 프로토콜의 성능평가)

  • 로철우;장직현
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.4
    • /
    • pp.1-14
    • /
    • 1995
  • A new stochastic Petri nets model, called Stochastic Petri Nets Reward Model(SPNRM) is used for modeling and evaluating the performance of telecommunication protocols. We have developed a SPNRM of the TDX-10 Internal protocol, which has a packet data exchange facility between DCEs, Especially a timer and retransmission handling model is presented for error control of the data transmission phase. The stochastic Petri nets package(SPNP), a software package for SPNRM used in this paper, has been used to generate numerical results by analytical-numerical method rather than simulation. From the steady state solution of the net, it is possible to calculate automatically the performance measure of the protocol medeled with both end-to-end and link-by-link method, which are the mean response times and the throughputs.

  • PDF

Multicast Protocol Implementation and Resource Management for Multiparty Multimedia Communication (다자간 멀티미디어 통신을 위한 멀티캐스트 프로토콜 구현 및 자원 관리)

  • Song, Ki-Sang;Kim, Hong-Rae;Chun, Jun-Sik
    • IE interfaces
    • /
    • v.11 no.1
    • /
    • pp.155-163
    • /
    • 1998
  • In multiparty multimedia communication, each participant not only receives information from other participants but also generates real-time data streams to distribute to others and therefore the difference between source and destination is not clear in terms of data transmission. During a teleconference session, many sub-multicast trees may be generated to exchange information to specific members within the multicast group and if those sub-multicast trees use the same fixed multicast tree, the blocking probability will be high and it is hard to provide QoS for each sub-multicast group. Also, even though there exits some shortcuts between each sub-multicast group, fixed multicast tree does not allow to use those shortcuts. Thus to overcome these problems. We propose a network resource reservation protocol and show that its effectiveness in terms of blocking probability and network resources usage.

  • PDF

Gateway System Implementation for heterogeneous Protocol relationship Data exchange (이기종 Protocol의 Data교환을 위한 Gateway System 구현)

  • Jung, Hyun-Sik;Kang, Dae-Wook
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.391-394
    • /
    • 2007
  • 상위(HOST)시스템은 TCP/IP 환경이 적용 되어야 하며, 하위(P/C)시스템은 BSC프로토콜을 그대로 사용가능 해야 한다. G/W시스템은 이 두가지 NETWORK환경을 모두 지원 해야 한다. LAN카드는 TCP/IP프로토콜을 지원할 것이며 BSC카드는 모뎀을 통해서 BSC 프로토콜을 지원할 것이다. 시스템은 산업용 PC보다 성능이 뛰어난 Unix시스템을 사용할것이다. G/W시스템의 역할은 각기 형태가 다른 전문을 재편성 하는 기능을 추가한다. 상위(HOST)시스템으로 부터 받는 지시 데이터의 SIZE를 하위(P/C)시스템에서 적용 가능한 수준으로 재조정 되어야 한다. 반대로 하위(P/C)시스템에서 송신되는 전문 형태를 상위(HOST)시스템에 맞게 재조정 되어야 한다.

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

EZR: Expansive Search Zone Routing Protocol for Ship Ad Hoc Networks (선박 애드 혹 네트워크를 위한 확장탐색구역 경로배정 프로토콜)

  • Son, Joo-Young
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.8
    • /
    • pp.1269-1277
    • /
    • 2008
  • Ships at sea cannot exchange data among them easily so far. Basically voice-oriented communication systems are the main methods, some of them utilize the HF radio systems at lower bit rates, and for higher bit rates, the Inmarsat or VSAT are adopted. None of them are used widely because of lower qualities and higher costs. There exist many technical and economical limits to have the Internet service just like on land such as the WWW service. In order to achieve the improved transmission rates of the maritime communication networks at farther sea, MANET(Mobile Ad Hoc Network) is one of the most practical models. In this paper, a new routing protocol named EZR (Expansive Search Zone Routing Protocol) is proposed, which is based on SANET (Ship Ad Hoc Network) model that has some different features from MANET and VANET (Vehicular Ad Hoc Network). The search zone for the shortest path is firstly found by EZR. If no path is searched in the zone, the zone is expanded according to the rule of EZR. The zone-expanding and path-searching procedures are repeated until the path is found out. The performance of EZR is evaluated and compared with LAR protocol which is one of the most typical routing protocols based on geographical information. The simulated results show that EZR is much better than LAR at sea environments in terms of routing success rate, route optimality, and a single index of performance combined the previous two metrics.

Zigbee Adaptor for Two-way Data/Event/Service Interoperation in Internet of Things (사물인터넷의 양방향 데이터/이벤트/서비스 연동을 위한 지그비 어댑터)

  • Back, Moon-Ki;Yim, Hyung-Jun;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.107-114
    • /
    • 2014
  • Things in the IoT(Internet of Things) make various services by exchanging information over networks. The IoT includes many types of WSNs(Wireless Sensor Networks) that consists of spatially distributed wireless sensor nodes and operates with the various purposes with useful technologies such as identification, sensing and communication. Typically, Zigbee network composed of low-cost and lowpower devices is mainly used for wide-area monitoring and remote device control systems. The IoT composed of various WSNs cannot interoperate among networks because of heterogeneous communication protocol and different data representation of each network, but can facilitate interconnection and information exchange among networks via the DDS, which is communication middleware standard that aims to enable real-time, high performance and interoperable data exchanges. In this paper, we proposed design of Zigbee Adaptor for two-way interoperation and data exchange between Zigbee network and other networks in the IoT. Zigbee Adaptor communicates with Zigbee network according to the Zigbee protocol and communicates with external networks via DDS. DDS-based Zigbee Adaptor can facilitate interoperation between a Zigbee network and external networks by systematic cooperation among its components.

Side-Channel Attack against Secure Data Deduplication over Encrypted Data in Cloud Storage (암호화된 클라우드 데이터의 중복제거 기법에 대한 부채널 공격)

  • Shin, Hyungjune;Koo, Dongyoung;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.971-980
    • /
    • 2017
  • Data deduplication can be utilized to reduce storage space in cloud storage services by storing only a single copy of data rather than all duplicated copies. Users who are concerned the confidentiality of their outsourced data can use secure encryption algorithms, but it makes data deduplication ineffective. In order to reconcile data deduplication with encryption, Liu et al. proposed a new server-side cross-user deduplication scheme by exploiting password authenticated key exchange (PAKE) protocol in 2015. In this paper, we demonstrate that this scheme has side channel which causes insecurity against the confirmation-of-file (CoF), or duplicate identification attack.