• Title/Summary/Keyword: Message Protocol

Search Result 946, Processing Time 0.028 seconds

Performance Improvement of Message Transmission over TCN(Train Communication Network) (TCN을 통한 메시지 전송 능력 향상에 관한 연구)

  • Cho Myung-ho;Moon Chong-chun;Park Jaehyun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.10
    • /
    • pp.720-726
    • /
    • 2004
  • The data transmission over MVB(Multifunction Vehicle Bus) of TCN(Train Communication Network) is divided into the periodic transmission phase and the sporadic transmission phase. TCN standard recommends the event-polling method as the message transfer in the sporadic phase. However, since the event-polling method does not use pre-scheduling to the priority of the messages, it is inefficient for the real-time systems. To schedule message transmission, a master node should know the priority of message to be transmitted by a slave node prior to the sporadic phase, but the existing TCN standard does not support any protocol for this. This paper proposes the slave frame bit-stuffing algorithm, with which a master node gets the necessary information for scheduling and includes the simulation results of the event-polling method and the proposed algorithm.

A Study of the Message Protocols Technologies in M2M Platforms (사물통신에서 메시지 프로토콜 기술 연구)

  • Lee, Chang-Yeol;Hong, Han-Kuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.53-61
    • /
    • 2010
  • M2M Platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. It requires the standardized message protocols among the sensor applications. In this study, we developed the message protocols that support the data abstraction and interoperability among application systems with characteristics of sensor systems. The message protocols consist of the data representation formats and data exchange functions.

APPLICATION OF KOREAN TEXT-TO-SPEECH FOR X.400 MHS SYSTEM

  • Kim, Hee-Dong;Koo, Jun-Mo;Choi, Ho-Joon;Kim, Sang-Taek
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.885-892
    • /
    • 1994
  • This paper presents the Korean text-to-speech (TTS) algorithm with speed and intonation control capability, and describes the development of the Voice message delivery system employing this TTS algorithm. This system allows the Interpersonal Messaging (IPM) Service users of Message Handling System (MHS) to send his/her text messages to user via telephone line using synthetic voice. In the X.400 MHS recommendation, the protocols and service elements are not specified for the voice message delivery system. Thus, we defined access protocol and service elements for Voice Access Unit based on the application program interface for message transfers between X.400 Message Transfer Agent and Voice Access Unit. The system architecture and operations will be provided.

  • PDF

Design and Implementation of Realtime Things Control System Using MQTT and WebSocket in IoT Environment (IoT환경에서 MQTT와 WebSocket을 활용한 실시간 사물제어 시스템 설계 및 구현)

  • Seo, Jun-Oh;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.517-524
    • /
    • 2018
  • This Paper presents the real time things control method through Web browser that has no limited by time and place. To design and realize the system that not only makes it possible to communicate with other protocols but also reinforces the advantages of each protocol, the real time communication environment, based on the WebSocket technology of HTML5 whose international standardization has recently been completed, is realized. Also, the message communication environment in the low electricity and limited communication environment is realized using MQTT(Message Queue Telemetry Transport) protocol which is in the spotlight as the optimum protocol in the IoT environment. And by designing intuitive and simple hardware and realizing the responsive web interface which is not limited by the user's contact devices, the interactive system in which the user receives real time data from the hardware and reversely the user controls the things is designed and realized.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

A Design of MAC based SDAP(Secure Data Aggregation Protocol) for security and communication efficiency on VANET (VANET에서 보안과 통신효율을 고려한 MAC기반 SDAP(Secure Data Aggregation Protocol) 설계)

  • Lee, Byung-kwan;Ahn, Heui-hak;Jeong, Eun-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.650-652
    • /
    • 2013
  • As VANET(Vehicular Ad-hoc NETwork) improves road safety, efficiency, and comfort, and provides a value-added service such as commerce information or internet access. it is the most important technology in ITS(Intelligent Transportation System). But, In VANETs, better communication efficiency can be achieved by sacrificing security and vice versa. VANETs cannot get started without either of them. Therefore, to solve these problems simultaneously, this paper proposes MAC(Message Authentication Code) based SDAP(Secure Data Aggregation Protocol) which removes redundant data or abnormal data between vehicles and verifies the integrity of message. The MAC based SDAP not only improves the efficiency of data delivery but also enhances the security by detecting malicious attacks such as propagation jamming attack, forgery attack, and disguised attack.

  • PDF

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Adaptive Inter-Agent Communication Protocol for Large-Scale Mobile Agent Systems (대규모 이동 에이전트 시스템을 위한 적응적 에이전트간 통신 프로토콜)

  • Ahn Jin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.351-362
    • /
    • 2006
  • This paper proposes an adaptive inter-agent communication protocol to considerably reduce the amount of agent location information maintained by each service node and the message delivery time while avoiding the dependency of the home node of a mobile agent. To satisfy this goal, the protocol enables each mobile agent to autonomously leave its location information only on some few of its visiting nodes. Also, it may significantly reduce the agent cache updating frequency of each service node by keeping the identifier of the location manager of each agent in the smart agent location cache of the node. Simulation results show that the proposed protocol reduces about $76%{\sim}80%$ of message delivery overhead and about $76%{\sim}79%$ of the amount of agent location information each service node should maintain compared with the traditional one.

The problem resolution algorithm in ESP protocol (ESP 프로토콜에서의 문제점 보완 알고리즘)

  • Lee, Yeong-Ji;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.189-196
    • /
    • 2002
  • IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to Provide data encryption, authentication and integrity in real transmission Packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that tome. This vague has many risks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrpty IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee more safe transmission on the public network.