• Title/Summary/Keyword: application specific message

Search Result 32, Processing Time 0.022 seconds

Design of Regional Function Message of AIS for Hangul Text messaging (한글 텍스트 메시징을 위한 AIS 지역 기반 메시지 설계)

  • Yu, Dong-Hui
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.2
    • /
    • pp.77-81
    • /
    • 2013
  • The international standard AIS, which stands for the safety of ship navigation and vessel traffic management, provides 27 messages to exchange the navigational information of ship. Among 27 messages, message ID 6 and 8 are defined as the binary data format to exchange application specific information and are classified into IFM for international use and RFM for national or regional use. Since international standards are based on English, there have been some needs to exchange data in Hangul text for vessel traffic management to correct the static and dynamic ships' information. In this paper, I analyze international standards to provide a Hangul text messaging service based on RFM and propose a RFM message and a simple protocol to correct information of a ship.

Securing the MQTT Protocol using the LEA Algorithm (LEA 알고리즘을 이용한 MQTT 프로토콜 보안)

  • Laksmono Agus Mahardika Ari;Iqbal Muhammad;Pratama Derry;Howon Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.175-178
    • /
    • 2024
  • IoT is becoming more and more popular, along with the massive availability of cheap and easy-to-use IoT devices. One protocol that is often used in IoT devices is the Message Queuing Telemetry Transport (MQTT) protocol. By default, the MQTT protocol does not activate encrypted data security features. This MQTT default feature makes the transmitted and received message data vulnerable to attacks, such as eavesdropping. Therefore, this paper will design and implement encrypted data security using the lightweight cryptography algorithm. The focus of this paper will be on securing MQTT message data at the application layer. We propose a method for encrypting specific MQTT message fields while maintaining compatibility with the protocol's functionalities. The paper then analyzes the timing performance of the MQTT-LEA implementation on the Raspberry Pi 3+. Our findings demonstrate the feasibility of using LEA at the application layer to secure MQTT message communication on resource-constrained devices.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

RF Monitoring Service Profile for AIS using AIS Binary Message (AIS 이진 메시지를 활용한 RF 모니터링 서비스)

  • Hwang, Soyoung;Yu, Donghui
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.84-85
    • /
    • 2013
  • AIS가 선박의 충돌방지를 통한 안전 확보뿐 만 아니라 육상과 선박간의 데이터 통신에 의한 선박과 선원 정보 관리, 전자해도 업데이트 등이 가능함이 입증되면서 국제해사기구를 중심으로 논의되고 있는 e-Navigation의 중요한 데이터 통신망으로 주목 받고 있다. 정보를 주고받는 프로토콜의 표현 형식은 비트중심의 메시지 표현 형태를 따르며 목적에 따라 다양한 메시지의 종류가 정의되어 있다. 이들 메시지 중 이진 메시지의 경우에는 사용자가 원하는 서비스에 따라 이진 메시지의 형식과 내용을 정의하여 다양한 정보를 주고 받을 수 있다. 본 논문에서는 AIS의 이진 메시지를 활용한 응용 서비스 프로파일로 AIS RF 모니터링 서비스를 제안한다.

  • PDF

A Study on the Dependence of Mobile Instant Messenger (모바일 인스턴트 메신저 의존도에 관한 연구)

  • Kim, Jae-Jon;Lee, Yunhee;Nho, Hee-Ock;Park, Kyung-Ja
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

AIS-ASM Standardised Communication Message Development Based on Users' Communication Needs at Sea (사용자 요구 기반의 AIS-ASM 표준통신메시지 개발에 관한 연구)

  • Choi, Seung-Hee;Ahn, Young-Joong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.6
    • /
    • pp.639-645
    • /
    • 2017
  • Application Specific Messages (ASM) have been introduced by a number of international bodies, such as the International Maritime Organization (IMO), the International Telecommunication Union (ITU) and the International Association of Lighthouse Authorities (IALA), for the purpose of resolving AIS overloading issues caused by an increasing number of ships using AIS systems. ASM communication will transmit a large amount of safety-related information at sea, including meteorological information, accident reporting, and navigational warnings. Specifically, this message transaction system is expected to be actively used for communication among ships and for ship-to-shore (4S), where VHF communication through voice was standard. In order to design a user-oriented service through standardised AIS-ASM messaging in the future, the need for analysis of this seems to be quite critical. In order to reflect users' AIS-ASM communication needs, therefore, frequently-occurring marine communication messages were analysed through a questionnaire survey conducted on 57 marine officers and 50 VTS operators. Based on the survey results, a list of key standardised messages was suggested as a reference for future AIS message development.

AIS-ASM 서비스 분석을 통한 활용 방안 제시

  • Choe, Jung-Yong;Lee, Byeong-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.176-178
    • /
    • 2014
  • 해상 교통 관제 시스템을 구축하기 위한 센서 장치 중, 자동식별장치(AIS, Automatic Identification System)는 핵심적인 역할을 수행하는 센서 장치다. AIS가 제공하는 메시지 중 국제해사기구(IMO, International Maritime Organization) Circ.289 권고안의 6번 및 8번 메시지를 통한 ASM (Application Specific Message)은 선박위치송출이라는 AIS 고유 목적을 넘어 AIS 활용 범위를 확대시킨 좋은 예이다. 이에 본 논문에서는 AIS-ASM 서비스를 분석하여 해상 안전 분야에 적용할 수 있는 방안을 제시하고, 더 나아가 일부 AIS-ASM 서비스의 개선 방안을 소개하고자 한다.

  • PDF

Dsign of Virtual Manufacturing Device for MMS Operations in MAP Network (MAP네트웨크에서 MMS운영을 위한 가상 제조 기기의 설계)

  • Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.397-405
    • /
    • 1995
  • In order to operate the automatic devices of manufacturing process more efficiently and to solve the needs of the resource sharing,network technology is applied to the unit control devices located in common manufacturing zone and operated by connecting them.In this paper,functional standard of the network operation layer is set as MAP standard application layer of MMS(manufacturing message standard)for the cell or group,which is suggested by CIM (computer integrated manufacturing) standardization as common manufacturing zone.MMS is composed of abstract message which is not consider specific devices.Then,specific message standard must be defined to operate MMS.It is designed as VMD (virtual manufacturing device)objects which are abstract objects to perform group management based on the companion standard.Also they are operated in the group management model system.Group management operation takes multicast communication method which is the communication from single source to the multiple sinks, and the group management system and unit control devices are performed as VMD and real device mapping.

  • PDF

Network structure for Shared Virtual Environments (가상 공유 공간을 위한 네트워크 구조)

  • Choi, Hwal-Ian;Lee, Arthur
    • Journal of the Korea Computer Graphics Society
    • /
    • v.4 no.1
    • /
    • pp.89-100
    • /
    • 1998
  • A multi-user virtual reality system supports shared environments for concurrent accesses by multiple users. The performance of these systems depends heavily on the network environments. This paper experiments an effective network model for shared virtual environments. This model has a middle layer called groups placed between the server and its clients, and the tasks of server are distributed to these groups. Using groups solves some of the problems of existing systems such as lack of scalability, message overheads, and latency due to message passing among locally communicating entities in the virtual environment. Some experiments show lower overhead than existing distributed virtual environment systems in WAN as well as LAN environments. This model also supports a method that can be used to construct application specific network environments using message handler which allows user-defined message formats.

  • PDF

DEVS 형식론을 이용한 다중프로세서 운영체제의 모델링 및 성능평가

  • 홍준성
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.32-32
    • /
    • 1994
  • In this example, a message passing based multicomputer system with general interdonnedtion network is considered. After multicomputer systems are developed with morm-hole routing network, topologies of interconecting network are not major considertion for process management and resource sharing. Tehre is an independeent operating system kernel oneach node. It communicates with other kernels using message passingmechanism. Based on this architecture, the problem is how mech does performance degradation will occur in the case of processor sharing on multicomputer systems. Processor sharing between application programs is veryimprotant decision on system performance. In almost cases, application programs running on massively parallel computer systems are not so much user-interactive. Thus, the main performance index is system throughput. Each application program has various communication patterns. and the sharing of processors causes serious performance degradation in hte worst case such that one processor is shared by two processes and another processes are waiting the messages from those processes. As a result, considering this problem is improtant since it gives the reason whether the system allows processor sharingor not. Input data has many parameters in this simulation . It contains the number of threads per task , communication patterns between threads, data generation and also defects in random inupt data. Many parallel aplication programs has its specific communication patterns, and there are computation and communication phases. Therefore, this phase informatin cannot be obtained random input data. If we get trace data from some real applications. we can simulate the problem more realistic . On the other hand, simualtion results will be waseteful unless sufficient trace data with varisous communication patterns is gathered. In this project , random input data are used for simulation . Only controllable data are the number of threads of each task and mapping strategy. First, each task runs independently. After that , each task shres one and more processors with other tasks. As more processors are shared , there will be performance degradation . Form this degradation rate , we can know the overhead of processor sharing . Process scheduling policy can affects the results of simulation . For process scheduling, priority queue and FIFO queue are implemented to support round-robin scheduling and priority scheduling.

  • PDF