• Title/Summary/Keyword: Message Protocol

Search Result 945, Processing Time 0.027 seconds

Distribution of Inter-Contact Time: An Analysis-Based on Social Relationships

  • Wei, Kaimin;Duan, Renyong;Shi, Guangzhou;Xu, Ke
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.504-513
    • /
    • 2013
  • Communication in delay tolerant networks (DTNs) relies on message transport by mobile nodes, and a correct understanding of the node mobility characteristics is therefore crucial to the design of an efficient DTN routing protocol. However, previous work has mainly focused on uncovering all behaviors of node movement, which is not conducive to accurately detecting the specific movement characteristics of a different node. In this paper, we seek to address this problem based on a consideration of social relationships. We first consider social ties from both static and dynamic perspectives. For a static perspective, in addition to certain accidental events, social relations are considered for a long time granularity and tend to be stable over time. For a dynamic perspective, social relations are analyzed in a relatively short time granularity and are likely to change over time. Based on these perspectives, we adopted different efficient approaches to dividing node pairs into two classes, i.e., familiar and unfamiliar pairs. A threshold approach is used for static social ties whereas a density-based aggregation method is used for dynamic social relationships. Extensive experimental results show that both familiar and unfamiliar node pairs have the same inter-contact time distribution, which closely follows a power-law decay up to a certain point, beyond which it begins to exponentially decay. The results also demonstrate that the inter-contact time distribution of familiar pairs decays faster than that of unfamiliar pairs, whether from a static or dynamic perspective. In addition, we also analyze the reason for the difference between the inter-contact time distributions of both unfamiliar and familiar pairs.

Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zero-knowledge Proof (영지식 증명을 이용한 가입기간이 정해진 서비스에서 이동 통신 기기간 인증 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.23-32
    • /
    • 2013
  • As the mobile communication technology is developed, the services for communication between the mobile devices are provided, and the amount of usage is increasing tremendously. For the device-to-device communication, the device should be verified if it is a service member. The existing verification schemes include interactions with the third party, while this may cause the problems that the bandwidth is dissipated and the devices which are out of the communication range of the base station cannot communicate with other devices. To solve such problems, we propose a new scheme for verification between mobile devices without interaction of third party. For the proposed scheme, we develop and employ a new zero-knowledge proof protocol, which verifies the device's membership and its expiration time. Furthermore, the scheme guarantees privacy of the mobile device since it checks the encrypted verification message without decrypting, and protects replaying attack since it uses challenge-response method.

A Study on Wearable Emergency Medical Alarm System (착용형 응급의료 경보시스템 구현에 관한 연구)

  • Kim, Dong-Wan;Beack, Seung-Hwa
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.55-61
    • /
    • 2006
  • In modern society, development of medical technology has extended the human life span. However, it has also caused some side-effects. Mostly old people who live alone are not available the medical service quickly when they are in emergency situations. Moreover heart related diseases as well are rapidly increasing with aging. This study proposes the emergency medical alarm system. This system measures the physiological signals such as ECG(electrocardiogram), temperature, and motion data, analyzes those data automatically, and sends the urgent message to the Emergency Medical Center and to their family. There are two main parts in the system. In the first part, physiological data acquisition part, the troublesome addition and deletion of body signals on existing proposed systems have been supplemented, which led to the modulized production by means of ECG sensor module, temperature sensor module, acceleration sensor module. The other part is mobile unit, which includes signal processing and transmission functions. And bluetooth allows two parts to communicate with each other. Data that are processed in the mobile unit are stored in the PC database through the WLAN using TCP/IP protocol.

  • PDF

Implementation of ECO Driving Assistance System based on IoT (IoT기반 ECO 운전보조 시스템 구현)

  • Song, Hyun-Hwa;Choi, Jin-ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.157-163
    • /
    • 2020
  • Recently, fine dust has been known to cause cardiovascular diseases here, raising interest in ways to reduce emissions by efficiently using fuel from cars that cause air pollution. Accordingly, a driving assistance system was developed to save fuel by eco-driving and improve the driver's bad driving habits. The system was developed using raspberry pi, arduino and Android. Using RPM, speed, fuel injection information obtained from OBD-II, and gyro-sensor values, Fuel-Cut is induced to create an optimal inertial driving environment. It also provides various information system such as weather, driving environment, and preventing drowsy driving through GUI and voice recognition functions. It is possible to check driving records and vehicle fault information using Android application and has low overhead for message transmission using MQTT protocol optimized for IoT environment.

Analysis of UGV Communication Effectiveness focused on Message Complexity (메시지 복잡도를 중심으로한 UGV 통신효과 분석)

  • Chang, YooSang;Shin, SunWoo;SEO, DaYoon;Lee, JaeYeong;Kim, ChongMan;Yoo, CheolWoo;BAE, SungMin
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.503-520
    • /
    • 2017
  • Purpose: In the near future, it is expected that UGV(unmanned ground vehicle) will be put into battle due to IT technology and unmanned technology development. In this study, we analyze the combat effectiveness considering communication effect where complex combat information and commands are transmitted. Methods: We use ABM(agent-based modeling) and wireless channel module which provides sophisticated communication effect through geographic information and UGV performance. And UGV combat simulation using wireless channel module is used to grasp the combat effectiveness according to the number of packets, which is a unit for storing all information and commands having high complexity. Results: The result of this study is to derive the optimal number of packets which does not decrease the combat effectiveness and the number of lost tanks. The number of packet increases, the survival ratio of our tanks are decreased. Conclusion: In this study, we reveal that the communication success or failure could affect the combat effectiveness. Also, it helps develope the standard communication protocol between UGVs and could be applied to analyze the cost effectiveness analysis in UGV combat environment.

A Study on Storing Node Addition and Instance Leveling Using DIS Message in RPL (RPL에서 DIS 메시지를 이용한 Storing 노드 추가 및 Instance 평준화 기법 연구)

  • Bae, Sung-Hyun;Yun, Jeong-Oh
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.590-598
    • /
    • 2018
  • Recently, interest in IoT(Internet of Things) technology, which provides Internet services to objects, is increasing. IoT offers a variety of services in home networks, healthcare, and disaster alerts. IoT with LLN(Low Power & Lossy Networks) feature frequently loses sensor node. RPL, the standard routing protocol of IoT, performs global repair when data loss occurs in a sensor node. However, frequent loss of sensor nodes due to lower sensor nodes causes network performance degradation due to frequent full path reset. In this paper, we propose an additional selection method of the storage mode sensor node to solve the network degradation problem due to the frequent path resetting problem even after selecting the storage mode sensor node, and propose a method of equalizing the total path resetting number of each instance.

Implementation of Aeronautical Surveillance Transceiver using AIS based on ADS-B Concepts (선박자동식별장치를 이용한 ADS-B 개념 기반의 항공감시용 송수신기의 구현)

  • Song, Jae-Hoon;Oh, Kyung-Ryoon;Kim, Jong-Chul;Lee, Jang-Yeon
    • Journal of Navigation and Port Research
    • /
    • v.33 no.10
    • /
    • pp.685-690
    • /
    • 2009
  • International Maritime Organization (IMO) recommends the installation of an Automatic Identification System (AIS) according to requirements by SOLAS to avoid maritime collision. AIS provides traffic information of other ships that may be used for maritime traffic control, SAR (Search and Rescue) and collision avoidance to apply safety management. In this paper, preliminary results to implement an aeronautical surveillance transceiver using AIS transceiver based on ADS-B concepts are described. Although altitude information is not required for AIS since the AIS is operated at MSL (Mean Sea Level), altitude information can be extracted by a GPS (Global Positioning System) chip-set in the AIS transceiver. ADS-B transceiver is implemented by defining a surveillance message format including the altitude information and modifying SOTDMA (Self-Organizing Time Division Multiple Access) protocol. Ground tests and flight tests are performed to validate the implementation results.

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF

Virtual Slot Multiple Access for Wireless Personal Area Network (WPAN을 위한 가상 슬롯 기반 다중 접근 방식)

  • Hwang Do-Youn;Kwon Eui-Hyeok;Lim Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9A
    • /
    • pp.837-843
    • /
    • 2006
  • IEEE802.15.3 and IEEE802.15.4 have defined the hybrid MAC protocols based on TDMA and CSMA where a multi-frame TDMA structure is employed so that multiple data frames can be transmitted within one timeslot to guarantee minimum delay bounds of isochroous traffic. However, TDMA has an intrinsic problem that cannot dynamically allocate optimal length of timeslot to each station. Therefore the idle timeslot can be produced by stations when each transmission queue is instantaneously empty during its timeslot, which would waste lots of timeslots especially in the multi-frame TDMA systems. In this paper, we propose a more flexible multiple-access scheme for the multi-frame TDMA system based on the concept of virtual slot which is accessible by every station with the highest priority for slot owner and lower priority for other stations. Finally, our simulation results from various environments show that proposed scheme can achieve magnitude improvement of total system throughput and average message delay by maximizing channel utilization.

Slective Buffering Macro Handover Which Applies The F-SNOOP in Hierarchical structure (계층 구조에서 F-SNOOP을 적용한 선택적 버퍼링 매크로 핸드오버)

  • Ahn Chi-Hyun;Kim Dong-Hyun;Kim Hyoung-Chul;Ryou Hwang-Bin;Lee Dae-Young;Jun Kye-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.413-420
    • /
    • 2006
  • HMIPv6 is designed to reduce the signaling load to external network and improve handover speed of MN by including Mobility Anchor Point(MAP) in local handover. However in this case of macro handover, it's just used pervious MIPv6 handover algorithm. So, it occurs packet loss and transmission delay problem. In this paper, we propose the mechanism applying the HMIPv6 for Fast Handover to choose suitable to the condition buffering handover. The condition for the selection is result distance measurement between MN and CN, between MN and NAR. Furthermore, using F-SNOOP protocol, it is possible to improve wireless network performance. Wireless network has high Bit Error Rate(BER) characteristic because of path loss, fading, noise and interference. TCP regards such errors as congestion and starts congestion control. This congestion control makes packet transmission rate low. However, F-SNOOP improves TCP performance based on SNOOP and Freeze TCP that use Zero Window Advertisement(ZWA) message when handoff occurs in wireless network.