• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.027 seconds

A Multibit Tree Bitmap based Packet Classification (멀티 비트 트리 비트맵 기반 패킷 분류)

  • 최병철;이정태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.339-348
    • /
    • 2004
  • Packet classification is an important factor to support various services such as QoS guarantee and VPN for users in Internet. Packet classification is a searching process for best matching rule on rule tables by employing multi-field such as source address, protocol, and port number as well as destination address in If header. In this paper, we propose hardware based packet classification algorithm by employing tree bitmap of multi-bit trio. We divided prefixes of searching fields and rule into multi-bit stride, and perform a rule searching with multi-bit of fixed size. The proposed scheme can reduce the access times taking for rule search by employing indexing key in a fixed size of upper bits of rule prefixes. We also employ a marker prefixes in order to remove backtracking during searching a rule. In this paper, we generate two dimensional random rule set of source address and destination address using routing tables provided by IPMA Project, and compare its memory usages and performance.

A Design of an Energy-Efficient Application Protocol for the Sensor Networks (센서 네트워크에서 에너지 효율적인 응용 프로토콜의 설계)

  • Cha, Hyun-Chul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.23-30
    • /
    • 2014
  • Some application of the sensor networks such as crop management must control the temperature within a proper range. The energy-efficient applications and protocols for them are needed. In this paper, we propose an energy efficient application protocol which can meet these needs. We use the concept of safety zone to manage the appropriate range of properties within our algorithm. We name our proposed algorithm "MSZ". To assess the performance of the proposed algorithm the actual temperature data was collected using the sensor node. The algorithm was implemented through programming and compared with the other algorithms. Experimental results show that the MSZ algorithm has a much better performance than that of APTEEN in terms of energy efficiency as well as has the ability of determining the status of sensor nodes with the periodical transmitting. Our MSZ algorithm can be useful in applications developments for the management of crops, fermented food and etc.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

An Approach to Acquire SIP Location Information for End-to-End Mobility Support Based on mSCTP (mSCTP 기반 종단 간 이동성 지원을 위한 SIP 위치정보 획득방안)

  • Chang Moon-Jeong;Lee Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.461-470
    • /
    • 2006
  • Recently mobile Stream Control Transmission Protocol (mSCTP) has been proposed as a transport layer approach for supporting mobility. When a mobile terminal (MT) is not located in the home network. a terminal that wishes to communicate with the MT is not able to establish mSCTP association to the MT, since mSCTP does not include the location management mechanism. In order to solve this problem. an interworking approach using the Session Initiation Protocol (SIP) INVITE method has been proposed. However, this approach has shown subsequent delay in acquiring the current location information of the MT when initiating mSCTP association establishment. In this paper, we propose new SIP methods and an approach that minimizes the address acquisition delay (AAD) by utilizing those SIP methods. Mathematical analysis and simulation results show that the proposed approach is more efficient than the previous approach in terms of AAD in all kinds of SIP environments.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

QoS Support Mechanisms in Mobile MPLS VPN (이동 MPLS VPN에서의 QoS 지원 방안)

  • Lee Young-seok;Yang Hae-kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-73
    • /
    • 2006
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology, called PE(Provider Edge router) based MPLS VPN, is regarded as a good solution for intranets or ext3nets because of the low cost and the flexibility of the service provision. In this paper, we describe a mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We desisted VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol and support the QoS mechanism. The pilot implementation and performance measurement were carried out on a simulation using COVERS tool.

Implementation of a Buoy System Based on Multi-Hop Relay Networks for Ocean Observation (해양관측을 위한 다중 홉 릴레이 네트워크 기반의 부이 시스템 구현)

  • Lee, Woon-hyun;Kwon, Hyuk-Jin;Kim, Si-moon;Jeong, SeongHoon;Kim, Jeongchang
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.3
    • /
    • pp.182-189
    • /
    • 2016
  • In this paper, we propose a buoy system based on multi-hop relay networks for ocean observation. The proposed system consists of various sensor modules, a gateway, wireless communication modules, and a remote monitoring site. The sensor modules are integrated with various communication interfaces and connected to the gateway of the proposed buoy system with an unified protocol based on controller area network (CAN)-bus. In order to communicate with the remote monitoring site and extend the coverage, the proposed system uses long-term evolution (LTE) router and XBee mesh network modules. The field test results show that the proposed system can extend the coverage using the proposed multi-hop relay network.

Development of Wireless Data Transmission System for LPWA-based Industrial Sites (LPWA 기반 산업현장의 무선 데이터 전송 시스템 개발)

  • Kwon, Hyuk;Cho, Kyoung-Woo;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.1
    • /
    • pp.37-42
    • /
    • 2018
  • Recently, there have been many studies on the IoT environment in which the sensors attached to the equipment automatically transmit and process the site information in real time through the network to control the equipment. The core of such a system is a network for data transmission and reception, and a wired network with wide transmission distance is a priority. However, in the case of a wired network, there is a problem that the time and cost consumed to configure the communication is higher than that of the wireless. In this paper, we propose LPWA - based wireless data transmission system using LPWA and BLE communication to solve this problem. The proposed system collects data from equipment through BLE and transmits data to the server using LPWA. Experimental results show that the spreading factor of maximum length of LPWA is 8, and the minimum length is 9.

Improved Fast Link-Setup Protocol for high-capacity Wireless Sensor Networks (대용량 무선 센서 네트워크를 위한 개선된 고속링크설정 알고리즘)

  • Kim, Byun-gon;Chung, Kyung-taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2387-2394
    • /
    • 2016
  • It is important to select the most appropriate channel for efficient transmission of massive data in wireless sensor network. In the fixed channel method for wireless sensor node, shortage of frequency may be a major constraint to support a variety of environments. In this paper, the method that seeks common channels between two nodes without common control channels in the existing wireless cognitive radio network is introduced in order to use efficiently the channel of wireless sensor network. The problem of existing method shows the severe degradation of performance that is caused by interference of linkage between selected channels, so that the sequential algorithm is suggested to improve the performance. From the results of computer simulation, the suggested method shows that the link can be set 50% faster than the other methods as the number of links increases because the beacon packet waiting time caused by the interference decreases remarkably.

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.