• Title/Summary/Keyword: Message Transmission Protocol

Search Result 228, Processing Time 0.02 seconds

Multi-Channel MAC Protocol Based on V2I/V2V Collaboration in VANET (VANET에서 V2I/V2V 협력 기반 멀티채널 MAC 프로토콜)

  • Heo, Sung-Man;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • VANET technologies provide real-time traffic information for mitigating traffic jam and preventing traffic accidents, as well as in-vehicle infotainment service through Telematics/Intelligent Transportation System (ITS). Due to the rapid increasement of various requirements, the vehicle communication with a limited resource and the fixed frame architecture of the conventional techniques is limited to provide an efficient communication service. Therefore, a new flexible operation depending on the surrounding situation information is required that needs an adaptive design of the network architecture and protocol for efficiently predicting, distributing and sharing the context-aware information. In this paper, Vehicle-to-Infrastructure (V2I) based on communication between vehicle and a Road Side Units (RSU) and Vehicle-to-Vehicle (V2V) based on communication between vehicles are effectively combined in a new MAC architecture and V2I and V2V vehicles collaborate in management. As a result, many vehicles and RSU can use more efficiently the resource and send data rapidly. The simulation results show that the proposed method can achieve high resource utilization in accordance. Also we can find out the optimal transmission relay time and 2nd relay vehicle selection probability value to spread out V2V/V2I collaborative schedule message rapidly.

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Congestion Detection and Avoidance for Reliable Data Transmission in Wireless Sensor Networks (무선 센서 네트워크에서 신뢰성 있는 데이터 전송을 위한 혼잡 탐지와 회피)

  • Park, Hong-Jin;Jang, Jae-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.343-350
    • /
    • 2010
  • Wireless Sensor Network is an event-driven system that a large number of micro sensor nodes are collected, giving and Wing information. Congestion can take place easily since a great number of sensor nodes are sensing data and transferring them to sink nodes when an event occurs, comparing to the existing wired network. Current internet transport protocol is TCP/UDP, however, this is not proper for wireless sensor network event-driven ESRT, STCP and CODA are being studied for reliable data transport in the wireless sensor network. Congestion are being detected local buffer and channel loading with these techniques. Broadcasting is mainly used and can avoid congestion when one happens. The way that combining local buffer and channel loading information and detecting congestion is being studied in this paper. When congestion occurs, buffering state is divided into three in order to lessen the broadcasting sending the message on congestion control to the node having frequent channel loading. Thus they have advantage of decreasing network's loading.

Modeling of the Distributed Broadcasting in IEEE 802.11p MAC Based Vehicular Networks (IEEE 802.11p MAC 기반 차량 네트워크에서의 분산된 브로드캐스팅 모델링)

  • Jeong, Daein
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.924-933
    • /
    • 2013
  • In this paper, we propose a modeling of the broadcasting in the IEEE 802.11p MAC protocol for the VANET(Vehicular Ad hoc Networks). Due to the fact that the beacon message which is needed for the safety services is shared via broadcasting, the analytical modeling of the broadcasting is crucial for the optimum design of the services. Two characteristics specific to the IEEE 802.11p are reflected in the modeling; the time limited CCH interval caused by the channel switching between the CCH and SCH, and no retransmission of the broadcasted messages. In the proposal, we assumed no restriction on the moment of generation of the beacon messages. We allow the messages to be generated and broadcasted within the whole CCH interval. Simulation results prove the accuracy of the proposed modeling. Noticeable improvements are also observed in terms of the performance indices such as the successful delivery ratio, transmission delay, and the variation of the delay.

Self-Adaptive Location Checking Mechanism in Mobile Ad-hoc Networks (모바일 애드혹 네트워크에서 자가 적응형 위치 검증 기법)

  • Youn, Joo-Sang;Kim, Young-Hyun;Pack, Sang-Heon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.3
    • /
    • pp.281-290
    • /
    • 2010
  • In geographic forwarding algorithms, traditional route maintenance requires mobile nodes periodically exchange beacon messages with their neighbors. In beacon message based forwarding scheme, a longer interval reduces the number of beacons needed, but may result in significant location errors. Conversely, a shorter interval guarantees more accurate location information, but induces control overheads.Therefore, the fixed or dynamic interval scheme based forwarding schemes cannot adapt well to different mobility environments. Also, existing schemes result in the uncertainty of neighbor node's position in the forwarding table of mobile node. Therefore, this paper presents a self-adaptive location checking mechanism based proactive geo-routing algorithm for beacon-based geographic routing. Simulation results show that the proposed routing algorithm not only significantly increases the relay transmission rate but also guarantees the high end-to-end packet delivery in low and high mobility environments.

ROHMIP : Route Optimization Employing HMIP Extension for Mobile Networks (ROHMIP : 이동망에서 확장된 HMIP를 적용한 경로 최적학)

  • Rho, Kyung-Taeg;Jung, Soo-Mok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.235-242
    • /
    • 2007
  • Network Mobility Basic Support protocol reduces location-update signaling by making network movements transparent to the mobile nodes (MNs) behind the mobile router (MR), but causes some problems such as sub-optimal routing and multiple encapsulations. This paper proposes an Route Optimization Employing HMIP Extension for Mobile Networks (ROHMIP) scheme for nested nubile networks support which introduces HMIP concept with relation information between MNNs behind a MR and the MR in order to localize handoff, to optimize routing and especially reduce handoff signal overhead. With ROHMIP, a mobile network node (MNN) behind a MR performs route optimization with a correspondent node (CN) as the MR sends a binding update message (BU) to mobility anchor point (MAP) via root-MR on behalf of all active MNNs when the mobile network moves. This paper describes the new mechanisms and provides simulation results which indicate that our proposal reduces transmission delay, handoff latency and signaling overhead.

  • PDF

Analysis of TDM-based Ad Hoc Network Transmission Technologies (다중시간분할 방식 기반의 에드혹 망 전송기술 분석)

  • Chung, Jong-Moon;Cho, Hyung-Weon;Jin, Ki-Yong;Cho, Min-Hee;Kim, Ji-Hyun;Jeong, Wun-Cheol;Joo, Seong-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8A
    • /
    • pp.618-624
    • /
    • 2009
  • In the evolution from wireless sensor networks(WSNs) to ubiquitous sensor networks(USNs), technologies that can support intensive data-traffic loads, large number of users, improved interoperability, and extreme longevity are required. Therefore, efficient communication time coordination control and low power consumption becomes one of the most important design goals for USN MAC protocols. So far several time division multiplexed (TDM) MAC protocols have been proposed. However, since the pros and cons of existing protocols are not easy to analyze, it becomes a challenging task to design improved TOM MAC protocols. Based on this objective, this paper provides a novel protocol analysis along with a message complexity derivation and comparison of the existing TDM MAC protocols.

A Study on Wearable Emergency Medical Alarm System (착용형 응급의료 경보시스템 구현에 관한 연구)

  • Kim, Dong-Wan;Beack, Seung-Hwa
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.55-61
    • /
    • 2006
  • In modern society, development of medical technology has extended the human life span. However, it has also caused some side-effects. Mostly old people who live alone are not available the medical service quickly when they are in emergency situations. Moreover heart related diseases as well are rapidly increasing with aging. This study proposes the emergency medical alarm system. This system measures the physiological signals such as ECG(electrocardiogram), temperature, and motion data, analyzes those data automatically, and sends the urgent message to the Emergency Medical Center and to their family. There are two main parts in the system. In the first part, physiological data acquisition part, the troublesome addition and deletion of body signals on existing proposed systems have been supplemented, which led to the modulized production by means of ECG sensor module, temperature sensor module, acceleration sensor module. The other part is mobile unit, which includes signal processing and transmission functions. And bluetooth allows two parts to communicate with each other. Data that are processed in the mobile unit are stored in the PC database through the WLAN using TCP/IP protocol.

  • PDF

Implementation of ECO Driving Assistance System based on IoT (IoT기반 ECO 운전보조 시스템 구현)

  • Song, Hyun-Hwa;Choi, Jin-ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.157-163
    • /
    • 2020
  • Recently, fine dust has been known to cause cardiovascular diseases here, raising interest in ways to reduce emissions by efficiently using fuel from cars that cause air pollution. Accordingly, a driving assistance system was developed to save fuel by eco-driving and improve the driver's bad driving habits. The system was developed using raspberry pi, arduino and Android. Using RPM, speed, fuel injection information obtained from OBD-II, and gyro-sensor values, Fuel-Cut is induced to create an optimal inertial driving environment. It also provides various information system such as weather, driving environment, and preventing drowsy driving through GUI and voice recognition functions. It is possible to check driving records and vehicle fault information using Android application and has low overhead for message transmission using MQTT protocol optimized for IoT environment.

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF