• Title/Summary/Keyword: Message communication infrastructure

Search Result 76, Processing Time 0.025 seconds

K-Trade : Data-driven Digital Trade Framework (K-Trade : 데이터 주도형 디지털 무역 프레임워크)

  • Kim, Chaemee;Loh, Woong-Kee
    • Journal of Information Technology Services
    • /
    • v.19 no.6
    • /
    • pp.177-189
    • /
    • 2020
  • The OECD has assessed Korea as the third highest in trade facilitation worldwide. The paperless trade of Korea is world class based on uTradeHub : national e-trade service's infrastructure for trade community. Over 800 trade-related document standards provide interoperability of message exchange and trade process automation among exporters, importers, banks, customs, airlines, shippers, forwarders and trade authorities. Most one-to-one unit processes are perfectly paperless & online; however, from the perspective of process flow, there is a lack of streamlining end-to-end trade processes spread over many different parties. This situation causes the trade community to endure repetitive-redundant load for handling trade documents. The trade community has a strong demand for seamless trade flow. For streamlining the trade process, processes with data should flow seamlessly to multilateral parties. Flowing data with an optimized process is the critical success factor to accomplish seamless trade. This study proposes four critical digital trade infrastructures as a platform service : (1) data-centric Intelligent Document Recognition(IDR), (2) data-driven Digital Document Flow (DDF), (3) platform based Digital Collaboration & Communication(DCC), and (4) new digital Trade Facilitation Index (dTFI) for precise assessment of K-Trade Digital Trade Framework. The results of new dTFI analyses showed that redundant reentry load was reduced significantly over the whole trade and logistics process. This study leads to the belief that if put into real-world application can provide huge economic gains by building a new global value chain of the K-trade eco network. A new digital trade framework will be invaluable in promoting national soft power for enhancing global competitiveness of the trade community. It could become the advanced reference model of next trade facilitation infrastructure for developing countries.

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

Implementation of an RFID Key Management System for DASH7

  • Vegendla, Aparna;Seo, Hwajeong;Lee, Donggeon;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.19-25
    • /
    • 2014
  • The wireless sensor networking standard DASH7 operates in low-power communication with a better transmission quality in active RFID networks. The DASH7 security standard supports public key cryptography. At present, the DASH7 standard uses the message authentication code in the network layer for authentication and integrity. However, its security standard is still in an incubation stage with respect to the implementation of a crypto exchange over a DASH7 network. Effective key management is an important factor for privacy and security. If organizations are not careful about where and how keys are stored, they leave the encrypted data vulnerable to theft. In this regard, we present a key management system designed for efficient key management through public key infrastructure authentication as well as a non-repudiation feature for the DASH7 standard. We analyze the performance of the proposed system on a basis of various performance criteria such as latency and throughput.

An Efficient Log Data Processing Architecture for Internet Cloud Environments

  • Kim, Julie;Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.33-41
    • /
    • 2016
  • Big data management is becoming an increasingly important issue in both industry and academia of information science community today. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used to improve system reliability. In this paper, we propose a novel big data management architecture specialized for log data. The proposed architecture provides a scalable log management system that consists of client and server side modules for efficient handling of log data. To support large and simultaneous log data from multiple clients, we adopt the Hadoop infrastructure in the server-side file system for storing and managing log data efficiently. We implement the proposed architecture to support various client environments and validate the efficiency through measurement studies. The results show that the proposed architecture performs better than the existing logging architecture by 42.8% on average. All components of the proposed architecture are implemented based on open source software and the developed prototypes are now publicly available.

The Recent Technology and Standardization Status and Future Vitalizations for Digital Signage (디지털 사이니지 기술 및 표준화 동향과 향후 활성화 방향)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.545-552
    • /
    • 2016
  • As a future key industry, digital signage is being noticed that provides various type of contents and message through a digital display. In particular, korean digital signage industry gets a favorable evaluation for the high level of digital display industry and wired and wireless networking infrastructure. This paper discusses on not only the current status of digital signage in terms of the overall development and standardization, but the very recent technologies such as the ultra-high definition video and human perception that can be applied for future digital signage. Then, this paper concludes by deriving the problems with the current digital signage industry and presenting solutions for future vitalizations of digital signage.

Design and Implementation of the Document HTML System for Preserving Content Integrity

  • Hyun Cheon Hwang;Ji Su Park;Jin Gon Shon
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.334-346
    • /
    • 2023
  • An electronic document based on PDF has been widely used in customer communication between an enterprise and a customer to deliver personalized content. However, electronic documents based on PDF in the form of paper layouts are not suitable for mobile environments because of low readability and lack of interactive interaction. Even though HTML is an essential language in a mobile environment, electronic document based on PDF is still used as it has a content integrity verification feature with a digital signature. It means that a user is sacrificing user experience in a mobile environment for content integrity and using paper-layout electronic documents. In this research, we design the Document HTML specification by setting the Document HTML conformance, adding the extended meta tags, and signing the message digest with a digital signature based on public key infrastructure (PKI). Furthermore, we implemented the Document HTML system, which has REST API services to generate and verify the Document HTML, and did experimental verification of the theory. As a result, we have confirmed that the Document HTML has both content integrity and user experience on mobile. Furthermore, the Document HTML is expected to be an alternative document format to deliver personalized content from an enterprise to a customer in a mobile environment instead of the paper layout electronic document such as PDF.

Implementation of Real-time Wireless Remote Control System Based on Public Key Infrastructure (PKI를 기반으로 한 실시간 무선 원격제어 시스템의 구현)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.71-79
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, hey possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance supports and emergency measures. In order to solve these deficiencies, Wireless Remote Control System(W-RCS) was designed and implemented. W-RCS is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of W-RCS leads to these security problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to W-RCS. The security functions based on public key infrastructure include mobile device user authentication and target system access control. The W-RCS allows real-time user authentication, increases the flexibility of resource administrators and mobile device non, and provides not only uninterrupted services, but also safe mobile office environments.

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF

Design and Implementation of IoT Terminal Equipment for Vessels using Thuraya Geo-stationary Orbit Satellite (Thuraya 정지궤도 위성을 이용한 선박용 IoT 단말 장치 설계 및 구현)

  • Jang, Won-Chang;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.67-72
    • /
    • 2020
  • Satellite communication is not used by many people like mobile communication, but it is a necessary technology for public service and communication services, such as providing the Internet in military, disaster, remote education and medical services, island areas, and infrastructure vulnerable areas. However, on ships and aircraft, mobile communications requiring base stations are either unavailable or restricted in their use. In this paper, we used a Raspberry Pi board as the terminal device to communicate network through satellite modem and PPP protocol, and implemented two-way data link using the text message of the modem to connect to the Thuraya geo-stationary orbit network. In addition, I/O devices were connected to the controller of the terminal equipment to design and implement an IoT device system for ships that can remotely access the system under control and control I/Os and transmit measured data through various sensors.

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.