• Title/Summary/Keyword: M2M communication

Search Result 1,987, Processing Time 0.024 seconds

A Study about effective handling method of service in M2M Communications (M2M 통신에서 서비스의 효과적인 처리 방안에 대한 연구)

  • Lee, Sun-Sic;Song, Min-Seop;Nam, Jae-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.325-328
    • /
    • 2013
  • Recently, the national carrier of the next-generation growth engine of M2M (machine to Machine) is attracting attention. Therefore, its uses and utilization of the various disciplines is getting wider, and the increasing number of terminals to be used compared to the existing communication of the information that is sent in every object may have increased. Each data transfer from the bulk terminal to a mobile network, if the traffic situation reaches this limit does not facilitate the processing of M2M communication services, this situation can occur. This study measures the mobile networks will be used in M2M communications when it reaches the breaking point for the smooth processing of M2M services are presented. Things grows increasingly smaller the further development of M2M technology, the explosion in mobile communication network, the data traffic will reach the limitations of these methods will be used in determining the ranking of the M2M communication services should be treated as a priority, to beM2M services to mobile networks will help to facilitate.

  • PDF

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

Service Overlay Network Platform and Service Composition Method for M2M Service (M2M 서비스 컴포지션을 위한 서비스 오버레이 네트워크 플랫폼 구조)

  • Kim, Young-Jun;Jeon, Yong-Keun;Chong, Il-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.230-232
    • /
    • 2012
  • M2M 서비스는 센서 네트워크의 데이터 수집 및 제어를 넘어서는 새로운 타입의 서비스이다. M2M 서비스는 홈 네트워크 디바이스, 사용자의 스마트 디바이스, 개인 컴퓨터 등을 이용하여 스마트 환경의 감시, 관리, 그리고 제어 등을 제공하는 새로운 서비스 타입이다. 오늘날 M2M 서비스를 제공하기 위한 연구들이 진행되고 있는데, 이를 제공하기 위한 플랫폼 연구는 아직 많이 부족한 현실이다. 따라서 본 논문은 서비스 오버레이 네트워크를 이용하여 M2M 서비스를 제공하기 위한 플랫폼 구조를 제안한다. 또한 다양한 M2M 서비스들을 조합하여 새로운 서비스를 사용자에게 제공할 수 있는 서비스 컴포지션 방법 및 절차를 제안한다. 서비스 오버레이 네트워크 플랫폼을 이용한 M2M 서비스 플랫폼은 사용자에게 향상된 서비스 기능, 범용성, 호환성, 그리고 지능화 및 능동적 기능을 제공할 수 있다.

Minimizing Machine-to-Machine Data losses on the Offshore Moored Buoy with Software Approach (소프트웨어방식을 이용한 근해 정박 부이의 기계간의 데이터손실의 최소화)

  • Young, Tan She;Park, Soo-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1003-1010
    • /
    • 2013
  • In this paper, TCP/IP based Machine-to-Machine (M2M) communication uses CDMA/GSM network for data communication. This communication method is widely used by offshore moored buoy for data transmission back to the system server. Due to weather and signal coverage, the TCP/IP M2M communication often experiences transmission failure and causing data losses in the server. Data losses are undesired especially for meteorological and oceanographic analysis. This paper discusses a software approach to minimize M2M data losses by handling transmission failure and re-attempt which meant to transmit the data for recovery. This implementation was tested for its performance on a meteorological buoy placed offshore.

M2M Network Platform Using the MSRP (MSRP를 이용한 M2M 플랫폼 구조)

  • Kim, Jung-Ho;Been, Jae-Man;Kang, Seung-Chan;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.752-757
    • /
    • 2016
  • Machine to Machine (M2M) communications is communications between a business application and devices via a communication network without any direct human interaction. The aim of our research is to connect any M2M device with an M2M AS (Application server) through an IMS (IP Multimedia Subsystem) Network Core using a M2M Gateway, in order to develop an M2M Horizontal Services Platform over IMS. An IP Multimedia Subsystem (IMS) is an architectural framework defined by the wireless standards body of the 3rd Generation Partnership Project (3GPP) for delivering IP multimedia services to mobile users. This paper shows the design and implementation of a Horizontal M2M Network Services Platform over an IP Multimedia Subsystem (IMS) using the Message Session Relay Protocol (MSRP). We summarize the protocols and architectures that formed the basis for the creation of our architecture. We provide a detailed description of our architecture design, describing the call flow of the proposed architecture and the entities operating in each process. We also describe the design and implementation process detailing the different tools used, explaining the selection of each component and its importance; also how we designed and implemented the M2M gateway, M2M Application Server, Open IMS Core, business application and M2M devices.

Development of M2M Simulator for Mobile Network using Knapsack Algorithm (Knapsack 알고리즘을 이용한 모바일 네트워크용 M2M 시뮬레이터 개발)

  • Lee, Sun-Sik;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2661-2667
    • /
    • 2013
  • Recently, at Home and abroad, Internet of Things era things(Thing) is participating as a subject of communication in human communication paradigm of existing (lot/M2M) is in full swing. Automobile, refrigerator, bicycle, until shoes, and communication functions generation of information is installed and has created a fusion of new service IT infrastructure. Its use and application are broadening to various areas and the number of devices used for it is increasing to increase the number of information transmitted for each object. When the traffic reaches its limit while each set of data is transmitted from the devices divided into each group through the mobile network, M2M communications service might not be processed smoothly. This study used the Knapsack Problem algorithm to create a virtual simulator for a smooth M2M service when the mobile network used for the M2M communications reaches its limit. The virtual simulator applies smooth processing of services from the M2M communications that should be processed first to other subsequent services when data comes to each group of devices. As the M2M technology develops to make many objects more compact in size, it would help with smoother processing of M2M services for the mobile network with fast-increasing traffic.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

A Study on Interoperation among Heterogeneous Platform for Support M2M Convergence Service (사물지능통신(M2M) 융합서비스 지원을 위한 이기종 플랫폼 간 연동방안)

  • Lee, Sung-Hyup;Jeon, Gun-Pyo;Kwon, Sun-Young;Seo, Jong-Han;Jang, Won-Gyu;Hong, Seung-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.669-672
    • /
    • 2011
  • 최근 IT(Information Technology)와 타(他)산업 간의 융 복합이 촉진되면서 새로운 융합서비스로 사물지능 통신(M2M, Machine to Machine)이 차세대 지능형 인프라 기반의 핵심 서비스로 부각되고 있다. 사물지능 통신은 기존의 통신 인프라를 활용하여 사물정보의 수집, 가공, 처리를 통해 최종 서비스를 제공하는 기술 분야로 PHY, MAC, 라우팅에 대한 기술 이슈보다는 서비스 관점에서의 네트워크 아키텍처 정의와 기능, 서비스 플랫폼 간의 연동, M2M 단말과 네트워크 간의 인터페이스에 대한 연구가 진행 중이다. 본 논문에서는 사물지능통신 융합서비스를 사용자에게 보다 편리하게 제공하기 위한 기존 플랫폼 간의 연동을 위한 요구사항과 방안을 제안한다.

The Design and Implementation of VDL M2 Data Link Software (VDL M2 데이터 링크 소프트웨어 설계 및 구현)

  • Kim, Hyoun-Kyoung;Yang, Kwang-Jik;Kim, Tae-Sik;Bae, Joong-Won
    • Aerospace Engineering and Technology
    • /
    • v.7 no.2
    • /
    • pp.11-20
    • /
    • 2008
  • The current air-to-ground communication between aircraft pilots and ground controllers is done by voice communication and text-based data communication. International Civil Aviation Organization (ICAO) suggested the digital data communication techniques to improve accuracy and effectiveness of the current air-to-ground communication. As one of them, VDL M2, a VHF band digital data communication link, is expected to substitute the voice communication and text-based ACARS data communication. In this paper, the software design and implementation of the VDL M2 system developed by Korea Aerospace Research Institute.

  • PDF