• Title/Summary/Keyword: Industrial Protocol

Search Result 688, Processing Time 0.028 seconds

Designing and Efficient Web Service Transaction Protocol Using 2PC and THP

  • Han, Seung-Kyun;Park, Jong-Hun;Choi, Ki-Seok
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.261-266
    • /
    • 2005
  • Web services provide an effective means to carry out coordinated transactions between multiple, independent business parties. While there are several specific protocols currently being discussed to address the coordination of web services-enabled business transactions, we consider the tentative hold protocol (THP) that allows the placement of tentative holds on business resources prior to actual transactions in order to provide increased flexibility in coordination. In this paper, we present a formal coordination framework for applying THP in conjunction with 2PC to the problem in which service providers independently manage resources and clients seek to acquire the resources from multiple providers as a single atomic transaction. The proposed framework facilitates the performance optimization of THP through effective parameterization with the notion of overhold size and hold duration. The simulation results show that the proposed adaptive approach yields a significant improvement over other non-adaptive policies.

  • PDF

A Proposal of the Authentication Protocol for Wireless Mobile Communication Systems Using Keyed Hash Function

  • Park, Young-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.1
    • /
    • pp.56-60
    • /
    • 2001
  • An authentication protocol for wireless mobile communication systems is proposed. The protocol employs the keyed hash function to provide mutual authentication and session key distribution. This makes the low computation power of mobile stations. To provide the security architecture with minimal assumption about the security of intermediate transport networks, this protocol has no assumptions about the security of the intermediate, fixed networks.

  • PDF

Improvement of PEGASIS using Sub-cluster Chaining (서브 클러스터 기법을 이용한 효과적인 USN 라우팅 프로토콜)

  • Jeoung, Su-Hyung;Yoo, Hae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1647-1652
    • /
    • 2008
  • The PEGASIS protocol is more effective about energy consumption more than LEACH in USN environment. However, PEGASIS is weakness enemy in change of sensor network net composition because It changes BS node frequently. Therefore, we propose new routing protocol that use Sub-Cluster Chaining to solve this problem in this paper. It can reduce overhead that happen in election of middle node doing so and reduce energy consumption. Also, It can supplement limitation that PEGASIS has. This is treatise shows that new protocol that propose than existent PEGASIS through simulation is superior.

Authentication Protocol for Inter-Vehicle Communication in Vehicular Ad Hoc Networks (VANET 상에서의 차량간 통신을 위한 인증 프로토콜)

  • Park, Young-Ho;Na, Jin-Han;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.81-85
    • /
    • 2009
  • In VANET, it is required one-way broadcast transmission because vehicles move at high speed and warning messages need to broadcast. our protocol employs digital signatures to authenticate nodes along the path. this prevents impersonation attacks and message modification attacks. our protocol also employs the node list to recognize intermediate nodes of the path. The node list, the time, and the nonce can prevent replay attacks.

Design and Implementation of USN Protocol for Managing Rooms in a Large Building (대형 건축물 객실 관리를 위한 USN 프로토콜 설계 및 구현)

  • Jeong, Woo-Jeong;Yoo, Kwan-Hee;Kim, Jong-Heon;Kim, Tae-Ho;Choi, Sung-Chul;Jeong, Kyu-Seuk
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.491-496
    • /
    • 2009
  • In this paper, we propose USN Protocol of Room Control with high efficiency and new routing techniques. I establish a network of cluster hierarchy structure under bases standard for IEEE 802.15.4 and another networks to manage each room use a control packet transmitted and The proposed protocol does not perform BroadCast over a network and transmits a packet to same layer to the destination and then passes the packet after doing searches. If a destination to be transmitted cannot be looked up, the protocol transmits AODV routing packet so that not only traffic load of a wireless network is decreased, but also efficient routing path can be obtained.

  • PDF

Advanced protocol against MITM attacks in Industrial Control System (산업제어시스템에서의 MITM 공격을 방어하기 위해 개선된 프로토콜)

  • Ko, Moo-seong;Oh, Sang-kyo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1455-1463
    • /
    • 2015
  • If the industrial control system is infected by malicious worm such as Stuxnet, national disaster could be caused inevitably. Therefore, most of the industrial control system defence is focused on intrusion detection in network to protect against these threats. Conventional method is effective to monitor network traffic and detect anomalous patterns, but normal traffic pattern attacks using MITM technique are difficult to be detected. This study analyzes the PROFINET/DCP protocol and weaknesses with the data collected in real industrial control system. And add the authentication data field to secure the protocol, find out the applicability. Improved protocol may prevent the national disaster and defend against MITM attacks.

Data Communications and their Applications in the Automated TFT LCD Manufacturing System (TFT LCD 자동생산시스템에서 Data 통신 및 응용)

  • Jo, Min-Ho
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.225-235
    • /
    • 1996
  • The SECS Ⅰ and Ⅱ Protocol has been widely used for the TFT LCD and semiconductor industry. This paper shows how the SECS protocol is implemented for data communications between the Host (CAM) and the TFT LCD equipments. In addition, this study introduces a way to apply the SECS protocol to the manufacturing systems control. It provides better throughput in terms of production and faster control of the automated TFT LCD manufacturing system by way of shortcut and distribution of control and data communications. The SECS protocol is successfully used for the control of the real TFT LCD manufacturing system.

  • PDF

Develpoment of Automatic Meter Reading Program for Electronic Power Meter (전자식 전력량계용 한전 프로토콜 및 운영 프로그램 개발)

  • Yu, In-H.;Jang, Mun-J.;Hyun, Duk-H.
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2219-2221
    • /
    • 2001
  • A communication protocol for automatic meter reading is designed for electronic power meter. Communicational functions and data structures are standardized and data reading software is developed according to the developed protocol. The communication protocol is designed with reference specifications, IEC 62056-31 and Distributed Network Protocol(DNP). For design, communicational functions and specifications of the industrial meters were analyzed for the purpose of developing a new one for KEPCO meters. The protocol is designed with 3 layer model, physical layers, data link layer and application layer. A documentation was completed with data gathering, data classification, authentication, error detection. An emulator system was made for testing the protocol. A meter reading software was developed using the protocol. Many different protocols and meter reading softwares are integrated into one with the developed protocol and software as KEPCO's standard.

  • PDF

Development of the Protocol Integration System with Multi-threading Method for the Ship Electronic Device (Multi-threading 기법을 적용한 선박 전자장치 프로토콜 통합 시스템의 구현)

  • Kim, Hag-Tae;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1313-1318
    • /
    • 2011
  • This paper proposes a protocol integration system with multi-threading method for the ship electronic devices to solve problems with the compatibility. The proposed protocol integration system receives the different signals from each of the ships' devices through the RS-232 serial communication port and then divides the input signal into the field data. The required field data for standard signal composition are extracted from among these signal and these are combined in accordance with standard signal format. Thereafter, the protocol integration system transmits the processed standard signal to the auto pilot system through a single port.

Authentication Protocol based on Efficient OTP (효율적인 OTP 기반의 인증 프로토콜)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1301-1306
    • /
    • 2010
  • The protocol based on password have very important qualifications that not only satisfy against attacks cause of restricting that have, but also efficiency of reducing users' workload. It has a problem of speculative attacks for the user authentication protocol based on password with most case, because users use password that can remember easily. Song and Etc. have proposed new mechanism that improved the problem of S/KEY system. The protocol proposed by Song has a problem in registration process, and user information can be abused by the malevolent server. We propose a new authentication protocol based on efficient OPT, that improved above problems.