• Title/Summary/Keyword: Manager Protocol

Search Result 158, Processing Time 0.032 seconds

A Secure Auction Protocol without Any Dispute

  • Ha, Jung-Hoon;Kwak, Dong-Jin;Moon, Sang-Jae
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.518-522
    • /
    • 2003
  • We propose a new auction protocol scheme that uses the publicly verifiable secret sharing (PVSS) scheme. Unlike the existing scheme where a verifiable encryption scheme is employed when there is a dispute between a bidder and the auctioneer, the proposed scheme essentially removes the potential of a dispute. In addition, it has a robust registration phase and any entities participating in or observing the auction can verify the correctness of the auction process. The manager does not directly chooses the private key for the bidders, but only verifies the correctness between the private key and the public key, thereby improving the security, such as a bid submission of a malicious manager using the private key of a bidder.

  • PDF

A Mutual Authentication Protocol in Ubiquitous Network (유비쿼터스 네트워크에서의 상호인증 프로토콜)

  • 조영복;김동명;이상호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.316-318
    • /
    • 2004
  • 유비쿼터스 네트워크의 보안요구사항을 살펴보면 센서의 위치, 저 전력으로 인한 성능의 제약, 브로트 캐스팅에 의한 통신 등 들 수 있다. 그 중이 논문에서는 저 전력으로 인한 성능의 제약측면을 고려한 상호인증 (Mutual Authentication)프로토콜을 새롭게 제안한다. 상호인증 프로토콜은 RM(Register Manager)와 AM(Authentication Manager)로 구성되며 RM과 AM을 통해 각 센서 노드들의 한정된 전력문제를 해결하였고 가 각 센서노드에서의 메시지의 길이와 오퍼레이션 수를 최소화함으로 전력 낭비를 해결하였다. 또한 제안하는 프로토콜은 센서노드간의 상호인증을 통한 세션키 분배를 통해 안전한 통신이 가능하다.

  • PDF

Design of an $SpO_2$ Transmission Agent based on ISO/IEEE 11073 Standard Protocol (ISO/IEEE 11073 표준 프로토콜 기반의 산소포화도 전송 에이전트 설계)

  • Pak, Ju-Geon;Im, Sung-Hyun;Park, Kee-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.462-465
    • /
    • 2011
  • A pulse oximeter is a device which provides non-invasive estimate of percentage oxygen saturation of haemoglobin (SpO2). Due to the limitations of resources of personal health devices (PHDs) including pulse oximeters, they generally transmit the estimated data to a remote monitoring server through a close manager (e.g. mobile device or PC). Therefore, communication protocols between PHDs and a manager is an important research topic in terms of interoperability. In this paper, we present design results of an SpO2 transmission agent based on the ISO/IEEE 11073 (X73) protocol. The protocol is an international standard for PHDs. The agent is an embedded program which generates X73 messages from the estimated pulse rates and SpO2, and transmits the messages to a close manager. The agent consists of a Session, Message and Memory Handler. The Session Handler manages a communication session with the manager, and the Message Handler generates and analyzes the exchanged messages according to the X73 protocol. The Memory Handler extracts pulse rates and SpO2s which are stored in a memory of the pulse oximeter. The SpO2 transmission agent allows pulse oximeters to communicate with managers based on x73 standard. Consequently, the interoperability between the pulse oximeters and the managers is guaranteed.

  • PDF

The Design and Implementation of the Shuttle Protocol for Gathering Management Information Periodically (주기성을 갖는 네트워크 관리 정보 수집을 위한 셔틀 프로토콜의 설계 및 구현)

  • Gang, Hyeon-Jung;Lee, Sang-Il;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.6
    • /
    • pp.879-890
    • /
    • 1995
  • This paper proposes the shuttle protocol that can gather management information from managed systems in an efficient way. In this paper, we implement the protocol and evaluate the performance by simulation. The major feature of the shuttle protocol is a chained logical connection through managed systems, and management informations to be collected are circulated among specified managed systems in circular order on a logical ring connection. The data generated by an managed system are relayed to a neighbor managed system and the system sends its data which has additional management information to received data. Finally, a manager stationman get all of data generated by every managed system. we will show the analysis of management traffic patterns using conventional polling schemes and the shuttle protocol implementation viable to TCP/IP network and improving existing polling mechansims. Additionally, it is performed to evaluate the packet processing time and its distribution of a manager system and a gateway, and the queue length of packet and bit length of gateway against conventional polling schemes by simulation using OPNRT, a simulation-dedicated package.

  • PDF

Implementation of Q3 Adaptor ATM Connection and FR Interworking Management in ATM Switch (ATM 교환기의 Q3 Adaptor ATM 연결 및 FR 연동 관리 구현)

  • 나성욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.85-87
    • /
    • 2002
  • 본 논문은 SNMP(Simple Network Management Protocol)기반의 ATM 교환 장비를 CMIP(common management information protocol)기반의 관리망에 연동하기 위한 Q3 Adaptor 기능 중 ATM 연결 관리와 Frame Relay 연동 관리를 소개한다. 본 논문의 ATM연결 관리는 점대점(Point-to-Point Permanent Virtual Connection) PVC(P)로 한정하고, FR 연동 관리는 ATM/FR 연결의 One-to-One PVC로 한정하며 ATM 밀 ATM/FR 연결에 대하여 CMIP Manager, Q3 Adaptor 및 교환 장비의 DB간 불일치 현상을 극복하기 위한 현행화 기능도 소개한다.

  • PDF

Study of Router Advertisement application plan in IPv6 router (IPv6 라우터에서의 Router Advertisement 적용 방안에 관한 연구)

  • Shin, Young-Soo;Yang, Mi-Jeong;Gang, Yu-Hwa;Kim, Tae-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.469-471
    • /
    • 2005
  • Paper searches Neighbor Discovery Protocol's IPv6 address AutoConfiguration function that is IPv6's point technology. Also, I study plan to apply Router Advertisement function to Router. Router is formed whole system by Routing Process Card that do manager and Line Card that take charge of Packet Forwarding. Present plan that embody Router Advertisement function to Line Card.

  • PDF

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

Design of Multicast Group Key Management Protocol for Information Security in PIM_SM (PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계)

  • 홍종준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.87-94
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multcast user in PIM-SM multicast group communication. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager, Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel. after checking the user's validity through the secure channel, As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key, Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

The Construction of Electronic Commerce infra for Bank usin Internet (인터넷에서의 금융권 전자상거래 인프라 구축)

  • 신현호;조범준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.131-137
    • /
    • 1999
  • In order to operate Internet Banking, there is a important thing to precede, That is to carry out a scheme of one-stop to let clients transact anything they want to buy and establish the preservation of public security system between existing banking networks. (of course, that should be designed handily to the clients). In this paper, the protocol which is determined between banking network and Internet to maintain the preservation of public security. In other words, each XPM(X.25 Packet Manager) is a program to manage both system security and service at each other side; manage all packets which are connected by X.25 protocol. If other condition like law and institution is improved, it will be adopted to real operation with various service. Further more, we tan construct Electronic Commerce and adopt various digital money like electronic coin or check.

  • PDF