• Title/Summary/Keyword: Data protocol

Search Result 3,897, Processing Time 0.026 seconds

Personal Authentication Protocol of IPTV Game User using PIN Code (PIN 코드를 이용한 IPTV 게임 사용자의 개별 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2670-2678
    • /
    • 2011
  • Because of the development of IPTV, user is provided service of multimedia data regardless the location. But the number of users who try to get service of IPTV game illegally is also increasing. In this paper, user authentication protocol in IPTV housing using PIN code not to access easily for teenagers not to access to prohibited games. The proposed protocol combines authority data in IPTV household and creates a disposable password using PIN code to prevent teenagers from accessing illegally to the prohibited games and saves the data in certification server and set-top box to prevent forced accessing.

Performance Analysis of MAC Protocol with Packet Reservation and Status Sensing for Packet CDMA Networks (패킷 CDMA망에서 예약 및 채널 상태 감지 기법을 적용한 MAC 프로토콜의 성능 분석)

  • 임인택
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.126-130
    • /
    • 1999
  • In packet CDMA networks, it is important to design a MAC protocol that meets the QoS requirements , of the different traffic types and allocates the radio channels efficiently. In this paper, a RRS$^2$-CDMA MAC protocol is proposed for integrating voice and data services in the microcellular packet CDMA networks. In PRS$^2$-CDMA, a voice terminal can resolve a spreading code to transmit voice packets during a talkspurt while a data terminal has to contend for a code for each packet transmission. The numerical results show that the proposed protocol can improve the system capacity, while guaranteeing the QoS of voice and data services.

  • PDF

Research on Performance Improvement for Wireless CCN (무선 CCN을 위한 성능향상에 대한 연구)

  • Lee, Seung-Jin;Bae, Hong-Min;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.71-76
    • /
    • 2015
  • To resolve inefficient content delivery mechanism in conventional internet-based networks, Content-Centric Networks (CCN) has been proposed for wired and wireless networks. One of issues in wireless CCN-based networks is overhead to achieve reliability on content delivery because CCN uses end-to-end two-way handshake with Interest/content packets. In this paper, a novel protocol to reduce overhead and achieve reliability is proposed. The protocol allows Interest packet to request multiple data packets and multiple data packets to be sent in a row without a Interest packets. The protocol is evaluated through the simulations and the performance improvement is proved.

Design of Energy Efficient MAC Protocol for Delay Sensitive Application over Wireless Sensor Network (무선 센서 네트워크상에서 시간지연에 민감한 데이터 전송을 위한 에너지 효율적인 MAC 프로토콜 설계)

  • Oh, Hyung-Rai;Song, Hwang-Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1169-1177
    • /
    • 2009
  • This paper presents an energy efficient MAC protocol for delay-sensitive data transmission over wireless sensor network. In general, energy consumption and delay depend on Channel Monitoring Interval and data sensing period at each sensor node. Based on this fact, we propose a new preamble structure to effectively advertise Channel Monitoring Interval and avoid the overhearing problem. In order to pursue an effective tradeoff between energy consumption and delay, we also develop a Channel Monitoring Interval determining algorithm that searches for a sub-optimal solution with a low computational complexity. Finally, experimental results are provided to compare the proposed MAC protocol with existing sensor MAC protocols.

Design of a MAC protocol for Urgent Events in Wireless Sensor Networks (긴급 메시지의 우선 처리를 위한 무선센서네트워크 MAC 프로토콜 설계)

  • Lee, Ju-Hyeon;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.803-808
    • /
    • 2010
  • Wireless Sensor Networks are widely applied for organizing real-time monitoring systems. Unlike general kinds of sensor networks, it is important to preferential send emergency data to the control server when urgent events are occurred. But IEEE 802.15.4 MAC protocol which is generally deployed for wireless sensor network does not support algorithm for urgency data handling. Therefore, we proposed a MAC protocol which consider the priority for the urgency data handling.

A Simulation-Based Study of FAST TCP Compared to SCTP: Towards Multihoming Implementation Using FAST TCP

  • Arshad, Mohammad Junaid;Saleem, Mohammad
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.275-284
    • /
    • 2010
  • The current multihome-aware protocols (like stream control transmission protocol (SCTP) or parallel TCP for concurrent multipath data transfer (CMT) are not designed for high-capacity and large-latency networks; they often have performance problems transferring large data files over shared long-distance wide area networks. It has been shown that SCTP-CMT is more sensitive to receive buffer (rbuf) constraints, and this rbuf-blocking problem causes considerable throughput loss when multiple paths are used simultaneously. In this research paper, we demonstrate the weakness of SCTP-CMT rbuf constraints, and we then identify that rbuf-blocking problem in SCTP multihoming is mostly due to its loss-based nature for detecting network congestion. We present a simulation-based performance comparison of FAST TCP versus SCTP in high-speed networks for solving a number of throughput issues. This work proposes an end-to-end transport layer protocol (i.e., FAST TCP multihoming as a reliable, delaybased, multihome-aware, and selective ACK-based transport protocol), which can transfer data between a multihomed source and destination hosts through multiple paths simultaneously. Through extensive ns-2 simulations, we show that FAST TCP multihoming achieves the desired goals under a variety of network conditions. The experimental results and survey presented in this research also provide an insight on design decisions for the future high-speed multihomed transport layer protocols.

Communication Architecture of the IEC 61850-based Micro Grid System

  • Yoo, Byong-Kwan;Yang, Seung-Ho;Yang, Hyo-Sik;Kim, Won-Yong;Jeong, Yu-Seok;Han, Byung-Moon;Jang, Kwang-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.5
    • /
    • pp.605-612
    • /
    • 2011
  • As the power grids are integrated into one big umbrella called a "smart grid," communication protocol plays a key role in successful operations. The successful deployment of smart grid interoperability is a major hurdle that must be overcome. The micro grid, a small power system that distributes energy resource, is operated in diverse regions. Different vendors use different communication protocols in the operation of the micro grid. Recently, the IEC 61850 has been legislated to solve the interoperability problems in power utility automation. The present paper presents a micro grid system based on the IEC 61850 protocol. It consists of a micro grid monitoring system, a protocol converter that transforms serial data to IEC 61850 data, and distributed energy resource controllers for diverse DER nodes. A developed communication gateway can be deployed for DER controllers with serial links to exchange data with IEC 61850-based devices. The gateway can be extended to IEC 61850-based distribution automation systems, substation automation systems, or SCADA.

e-Passport Integrated Authentication Mechanisms with Improved Efficiency (효율성이 강화된 전자여권 통합 인증 메커니즘)

  • Lee, Dong-Bum;Go, Woong;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.53-63
    • /
    • 2009
  • e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.

  • PDF

An Efficient PSI-CA Protocol Under the Malicious Model

  • Jingjie Liu;Suzhen Cao;Caifen Wang;Chenxu Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.720-737
    • /
    • 2024
  • Private set intersection cardinality (PSI-CA) is a typical problem in the field of secure multi-party computation, which enables two parties calculate the cardinality of intersection securely without revealing any information about their sets. And it is suitable for private data protection scenarios where only the cardinality of the set intersection needs to be calculated. However, most of the currently available PSI-CA protocols only meet the security under the semi-honest model and can't resist the malicious behaviors of participants. To solve the problems above, by the application of the variant of Elgamal cryptography and Bloom filter, we propose an efficient PSI-CA protocol with high security. We also present two new operations on Bloom filter called IBF and BIBF, which could further enhance the safety of private data. Using zero-knowledge proof to ensure the safety under malicious adversary model. Moreover, in order to minimize the error in the results caused by the false positive problem, we use Garbled Bloom Filter and key-value pair packing creatively and present an improved PSI-CA protocol. Through experimental comparison with several existing representative protocols, our protocol runs with linear time complexity and more excellent characters, which is more suitable for practical application scenarios.

The Design and Implementation of the Shuttle Protocol for Gathering Management Information Periodically (주기성을 갖는 네트워크 관리 정보 수집을 위한 셔틀 프로토콜의 설계 및 구현)

  • Gang, Hyeon-Jung;Lee, Sang-Il;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.879-890
    • /
    • 1995
  • This paper proposes the shuttle protocol that can gather management information from managed systems in an efficient way. In this paper, we implement the protocol and evaluate the performance by simulation. The major feature of the shuttle protocol is a chained logical connection through managed systems, and management informations to be collected are circulated among specified managed systems in circular order on a logical ring connection. The data generated by an managed system are relayed to a neighbor managed system and the system sends its data which has additional management information to received data. Finally, a manager stationman get all of data generated by every managed system. we will show the analysis of management traffic patterns using conventional polling schemes and the shuttle protocol implementation viable to TCP/IP network and improving existing polling mechansims. Additionally, it is performed to evaluate the packet processing time and its distribution of a manager system and a gateway, and the queue length of packet and bit length of gateway against conventional polling schemes by simulation using OPNRT, a simulation-dedicated package.

  • PDF