• Title/Summary/Keyword: Protocol verification tool

Search Result 27, Processing Time 0.023 seconds

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

Dosimetric Verification for Primary Focal Hypermetabolism of Nasopharyngeal Carcinoma Patients Treated with Dynamic Intensity-modulated Radiation Therapy

  • Xin, Yong;Wang, Jia-Yang;Li, Liang;Tang, Tian-You;Liu, Gui-Hong;Wang, Jian-She;Xu, Yu-Mei;Chen, Yong;Zhang, Long-Zhen
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.3
    • /
    • pp.985-989
    • /
    • 2012
  • Objective: To make sure the feasibility with $^{18F}FDG$ PET/CT to guided dynamic intensity-modulated radiation therapy (IMRT) for nasopharyngeal carcinoma patients, by dosimetric verification before treatment. Methods: Chose 11 patients in III~IVA nasopharyngeal carcinoma treated with functional image-guided IMRT and absolute and relative dosimetric verification by Varian 23EX LA, ionization chamber, 2DICA of I'mRT Matrixx and IBA detachable phantom. Drawing outline and making treatment plan were by different imaging techniques (CT and $^{18F}FDG$ PET/CT). The dose distributions of the various regional were realized by SMART. Results: The absolute mean errors of interest area were $2.39%{\pm}0.66$ using 0.6cc ice chamber. Results using DTA method, the average relative dose measurements within our protocol (3%, 3 mm) were 87.64% at 300 MU/min in all filed. Conclusions: Dosimetric verification before IMRT is obligatory and necessary. Ionization chamber and 2DICA of I'mRT Matrixx was the effective dosimetric verification tool for primary focal hyper metabolism in functional image-guided dynamic IMRT for nasopharyngeal carcinoma. Our preliminary evidence indicates that functional image-guided dynamic IMRT is feasible.

Resilient Routing Protocol Scheme for 6LoWPAN (6LoWPAN에서 회복력 있는 라우팅 프로토콜 기법)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.141-149
    • /
    • 2013
  • IETF 6LoWPAN standard technique has been studied in IoT environment to support the IPv6 packet communication. 6LoWPAN protocol for transmission of packets mainly in the AODV routing protocol and a variety of extended techniques have been investigated. In particular, consisting of nodes with limited resources in a network error occurs when the 6LoWPAN reliable data transfer and fast routing method is needed. To this end, in this paper, we propose resilient routing protocol and extension of IETF LOAD algorithm, for optimal recovery path, More specifically, the optimal recovery path setup algorithm, signal flow, and detailed protocols for the verification of the reliability of packet transmission mathematical model is presented. The proposed protocol techniques to analyze the performance of the NS-3 performance through the simulation results that is end-to-end delay, throughput, packet delivery fraction and control packet overhead demonstrated excellence in comparison with existing LOAD.

Model Verification of a Safe Security Authentication Protocol Applicable to RFID System (RFID 시스템에 적용시 안전한 보안인증 프로토콜의 모델검증)

  • Bae, WooSik;Jung, SukYong;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.11 no.4
    • /
    • pp.221-227
    • /
    • 2013
  • RFID is an automatic identification technology that can control a range of information via IC chips and radio communication. Also known as electronic tags, smart tags or electronic labels, RFID technology enables embedding the overall process from production to sales in an ultra-small IC chip and tracking down such information using radio frequencies. Currently, RFID-based application and development is in progress in such fields as health care, national defense, logistics and security. RFID structure consists of a reader that reads tag information, a tag that provides information and the database that manages data. Yet, the wireless section between the reader and the tag is vulnerable to security issues. To sort out the vulnerability, studies on security protocols have been conducted actively. However, due to difficulties in implementation, most suggestions are concerned with theorem proving, which is prone to vulnerability found by other investigators later on, ending up in many troubles with applicability in practice. To experimentally test the security of the protocol proposed here, the formal verification tool, CasperFDR was used. To sum up, the proposed protocol was found to be secure against diverse attacks. That is, the proposed protocol meets the safety standard against new types of attacks and ensures security when applied to real tags in the future.

The effect of animation software interface on design thinking process - Protocol analysis of Alice and KidsPlay - (애니메이션 소프트웨어 인터페이스가 디자인 사고 과정에 미치는 영향 - Alice와 KidsPlay 프로그램 프로토콜 분석을 중심으로 -)

  • Jin, Yan;Lee, Hyun Kyung;Lee, Sang Won
    • Design Convergence Study
    • /
    • v.15 no.1
    • /
    • pp.37-48
    • /
    • 2016
  • Nowadays, CAD has became an essential tool for designers due to its easy edition and manipulation as well as the capability of communication between designers. Differences between design tool interfaces can cause gaps when visualize designer's ideas. This study is about the differences between various levels of metaphor interface language which is based on the theory of the Hutchins that high-level language interface can reduce the steps of process to visualize the idea of the designers than low-level language interface. This research is based on the assumption that high-level language interface will less interrupt the flow of the design thinking and make more various visual outcomes than the low-level language interface. We verified the hypothesis by analyzing differences of design thinking flow between user groups who used two different animation software. Hopefully, the verification of the hypothesis in this study can be able to guide the use pattern of the CAD tools.

A Study on Development for Verification and Conformance Test Tool of Rail Signal Control Protocol (철도 신호 제어프로토콜의 검정 및 적합성시험 도구 개발에 관한 연구)

  • Seo, Mi-Seon;Hwang, Jin-Ho;Kim, Sung-Un;Hwang, Jong-Gyu;Lee, Jea-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1367-1370
    • /
    • 2004
  • 본 논문에서는 LTS(Labeled Transition System)로 명세화된 철도 신호 제어 프로토콜의 동작의 정확성을 형식기법을 통해 검정하고 적합성 시험을 위한 시험계열을 자동으로 생성해 주는 도구로서 프로토콜 검정기와 적합성 시험 계열 생성기를 개발하였다. 본 도구는 과거에 사용되었던 비정형적 방법의 많은 오류와 모호함을 제거하고 프로토콜 개발시간 및 비용을 절약해 줌으로써 철도 신호 제어시스템의 안전성 및 신뢰성을 보장해 줄뿐만 아니라, 다른 시스템에도 응용되어 검정 및 시험을 효율적으로 수행하게 해주는 도구이다.

  • PDF

A study on implementation of software development environment for SDL (통신 프로토콜 명세 언어 SDL을 위한 소프트웨어 개발 환경 구현)

  • Choe, Yeong-Han;Kim, Seong-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1522-1533
    • /
    • 1996
  • This paper presents a programming environment for the edition and verification of specification language SDL. It is implemented in the Concerto software factory, which has been as a support for the development of real size software. Concerto is a software factory designed for application development in the fields of computer communication protocols or real time system. It offers various kinds of tools to produce software, organize this production and automate it. Concerto allows a smooth integration of various formalism such as the C and $C^{++}$, languages, structured documentation, HOOD methodology (Hierarchical Object Orient Design). In this paper, as an important tools in the process of communication protocol software development, we describe fist describe the principles of this environment, then we illustrate its application by means of a simple example, the Inres protocol. Moreover, we study how hypertext mechanism of Concert to create logical links between a protocol and its asscoiated service.

  • PDF

Preliminary Study on Developing Protocol for Music Therapy Assessment for Cognitive and Emotional-Behavioral Domain using Rhythm (MACED-Rhythm) (인지 및 정서행동 영역에서의 음악치료 사정을 위한 리듬 프로토콜(MACED-Rhythm) 개발 예비 연구)

  • Duerksen, George;Chong, Hyun Ju
    • Journal of Music and Human Behavior
    • /
    • v.10 no.1
    • /
    • pp.67-83
    • /
    • 2013
  • Assessment in music therapy is a vital part for both the therapist and client in the process of therapy. Based on what is assessed, objectives are identified to formulate specific action procedures and strategies. The existing assessment tools involve lists of skills and behaviors in developmental domains without the music assessment protocol. In this study, the authors attempted to develop an assessment protocol using rhythm production for assessing skills in cognitive and emotional-behavior domain, namely Music Therapy Assessment for Cognitive and Emotional Behaviors (MACEB). The test items of the MACEB-Rhythm were developed using rhythmic patterns varying in terms of item difficulty, which are based on the various degree of clarity in the grouping/gestalt, saliency in part-whole relationship, and complexity in repetition vs. variability. Also the developed tool purported to examine one's level of emotional behavior trait by analyzing performance of musical parameters such as tempo, pacing, and loudness in the reproduced output. In order to verify the logical sequencing of test items, firstly 61 subjects participated in verifying the item difficulty for the selected 15 pilot items. The test items were revised and re-sequenced based on the gathered scores of item difficulty. In the second procedure, seven experts in the fields of music education, music therapy and music psychology whose research interest lie in music cognition revised the developed rhythm protocol items focusing on learning sequence, cognitive process and feasibility for skills assessment. The study attempted to provide foundations for using rhythm as an assessment protocol prior to its verification of assessment validity and reliability.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.