• 제목/요약/키워드: Internet Protocol

검색결과 2,424건 처리시간 0.045초

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

인터넷을 이용한 분산제어 구현을 위한 네트워킹 (Internet-based Distributed Control Networks.)

  • 송기원;최기상;최기흥
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2001년도 춘계학술대회 논문집
    • /
    • pp.582-585
    • /
    • 2001
  • Requirements for device networks differ greatly from those of data(business) networks. Consequently, any control network technology which uses a fieldbus protocol is, in general, different from IP network protocol TCP/IP. One needs to integrate fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. This paper suggests a basic concept that can be applied to distributed control over IP network or internet. Specifically, LonWorks technology that uses LonTalk protocol is reviewed as device network. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. It is also addressed that many hardwired PLCs can be replaced by LonWorks devices. Connecting these remote LonWorks networks to the Internet can provide a powerful, integrated, distributed control system.

  • PDF

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

무선인터넷에서의 종단간 보안을 제공하는 신용카드 기반의 지불 프로토콜 (A Credit Card based Payment Protocol Assuring End-to-End Security in Wireless Internet)

  • 임수철;강상승;이병래;김태윤
    • 한국정보과학회논문지:정보통신
    • /
    • 제29권6호
    • /
    • pp.645-653
    • /
    • 2002
  • WPP 지불 프로토콜은 WAP 프로토콜을 이용하여 무선인터넷에서 신용카드 지불을 수행한다. 그러나 WPP 지불 프로토콜은 WAP의 보안 프로토콜인 WTLS를 사용함으로써 종단간 보안을 제공하지 못하는 문제점을 가지고 있다. 본 논문에서는 공개키 암호 시스템과 Mobile Gateway를 사용하여 특정 무선인터넷 플랫폼과 독립적인, 종단간 보안이 제공되는 지불 프로토콜을 제안한다. 제안한 지불 프로토콜은 온라인 인증기관이 지불 프로토콜의 인증과정에 참석함으로써, 이동성이 많은 무선단말기가 다른 도메인에 존재하는 서비스 제공자에게도 서비스를 받을 수 있다.

MGCP와 IP-Multicast를 이용한 Internet Voice Conference에 관한 연구 (The Study on Internet Voice Conference using MGCP and IP-Multicast)

  • 이송호;최경삼;이종수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 합동 추계학술대회 논문집 정보 및 제어부문
    • /
    • pp.130-133
    • /
    • 2001
  • VoIP(voice over internet protocol) technology is based on IP protocol. The IP protocol can be involved in two types of communication: unicasting and multicasting. Unicasting is the communication between one sender and one receiver. It is one-to-one communication. Multicasting is one-to-many communication. So that, many receivers can get same data from one sender simultaneously. and, the different protocol are proposed for VoIP; H.323, SIP and MGCP. MGCP is perfect server-client protocol, so MGCP is very attractive VoIP protocol to ISP. This paper uses MGCP and offers modified MGCP for conference call. So that, Modified MGCP is compatible to MGCP, and supports conference call using IP-multicast.

  • PDF

사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계 (Design of Improved Authentication Protocol for Sensor Networks in IoT Environment)

  • 김득훈;곽진
    • 정보보호학회논문지
    • /
    • 제25권2호
    • /
    • pp.467-478
    • /
    • 2015
  • 사물인터넷에 대한 관심이 증가하면서 사물인터넷에 적합한 여러 보안 기술들이 연구되고 있다. 특히 디바이스 센서 네트워크 영역에서는 사물인터넷의 특성상 저사양 디바이스의 사용이 증가하고 다양화되었다. 그러나 현재의 인증 기술등의 보안 기술을 저전력 저사양 디바이스에 그대로 적용하기에 어려움이 있고, 이로 인해 보안 위협도 증가하였다. 따라서 사물인터넷의 센서 네트워크 통신상의 엔티티간 인증 프로토콜이 연구되고 있다. 2014년 Porambage 등은 타원곡선 암호 알고리즘에 기반한 센서 네트워크 인증 프로토콜을 제안하여 사물인터넷 환경의 안전성을 향상하고자 하였지만, 취약성이 존재하였다. 이에 따라 본 논문에서는 Porambage 등이 제안한 타원곡선 암호 알고리즘 기반 인증 프로토콜의 취약성을 분석하고, 사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜을 제안한다.

A Design of Multi-hop Network Protocol based on LoRaWAN Gateway

  • Kim, Minyoung;Jang, Jongwook
    • International journal of advanced smart convergence
    • /
    • 제8권2호
    • /
    • pp.109-115
    • /
    • 2019
  • Currently, LPWA(Low Power Wide Area) communication technology is widely used due to the development of IoT(Internet of Things) technology. Among the LPWA technologies, LoRaWAN(Long Range Wide Area Network) is widely used in many fields due to its wide coverage, stable communication speed, and low-cost modem module prices. In particular, LoRa(Long Range) can easily construct LoRaWAN with a dedicated gateway. So many organizations are building their own LoRaWAN-based networks. The LoRaWAN Gateway receives the LoRa packet transmitted from an End-device installed in the adjacent location, converts it into the Internet protocol, and sends the packet to the final destination server. Current LoRa Gateway uses a single-hop method, and each gateway must include a communication network capable of the Internet. If it is the mobile communication(i.e., WCDMA, LTE, etc.) network, it is required to pay the internet usage fee which is installed in each gateway. If the LoRa communication is frequent, the user has to spend a lot of money. We propose an idea on how to design a multi-hop protocol which enables packet routing between gateways by analyzing the LoRaWAN communication method implemented in its existing single-hop way in this paper. For this purpose, this paper provides an analysis of the standard specification of LoRaWAN and explains what was considered when such protocol was designed. In this paper, two gateways have been placed based on the functional role so as to make the multi-hop protocol realized: (i) hopping gateway which receives packets from the end-device and forwards them to another gateway; and (ii) main gateway which finally transmits packets forwarded from the hopping gateway to the server via internet. Moreover, taking into account that LoRaWAN is wireless mobile communication, a level-based routing method is also included. If the protocol proposed by this paper is applied to the LoRaWAN network, the monthly internet fee incurred for the gateway will be reduced and the reliability of data transmission will be increased.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

자원 예약 프로토콜에 기반한 인터넷 폰의 성능분석 (Performance Evaluation of the Internet Phone based on Resource Reservation Protocol)

  • 조재만
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 1998년도 The Korea Society for Simulation 98 춘계학술대회 논문집
    • /
    • pp.27-31
    • /
    • 1998
  • The growing usage of multimedia communication applications with specific bandwidth and real-time delivery requirements has created the needs for quality of service(QoS). In response to the growing demand for an integrated services, the Reservation Protocol(RSVP) has been designed to exchange resource reservation among routers in the internet. RSVP protocol provides the quality of service for real-time applications but the network efficiency is reduced because of the limited bandwidth. In order to use network resources efficiently. We compare the resource efficiency of traditional reservation methods with that of the proposed method and evaluate the performance of the internet phone.

  • PDF

H.323과 SIP간의 상호 연동 방법 관한 연구 (A Study of the Interworking Method between H.323 and SIP)

  • 김정석;김철규;김정호
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2004년도 춘계 종합학술대회 논문집
    • /
    • pp.342-347
    • /
    • 2004
  • 인터넷을 통해 음성 서비스를 가능하게 해주는 VoIP(Voice over Internet Protocol) 기술은 기존의 전화망에 비해 저렴한 가격에 장거리 전화를 이용할 수 있으며, 기존의 인터넷에서 사용 가능한 다양한 멀티미디어 서비스를 쉽게 수용할 수 있다. 이전의 VoIP 접속관리 방식은 H.323 프로토콜을 사용하였으나, 연결 설정의 복잡함으로 인해 최근에는 SIP-Working Group에서 제안한 SIP(Session Initiation Protocol) 프로토콜이 사용되고 있다. 따라서 H.323과 SIP의 서로 다른 프로토콜을 사용한 제품군 사이의 연동을 위한 방법론이 필요하게 되었다. 이에 본 연구에서는H.323과 SIP사이의 IWF(Inter-working Function)을 위한 개선된 상호 연동 방법을 제안하고, 제안된 방법을 통해 H.3뽀과 SP 프로토콜간의 상호 연동의 불필요한 패킷 지연의 호 설정과 메시지 변환의 개선된 특성을 해석한다.

  • PDF