• Title/Summary/Keyword: control network protocol

Search Result 1,451, Processing Time 0.032 seconds

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

Design Factors of Communication Channel for Real Time Service (실시간 서비스를 위한 채널의 설계 요소)

  • Choe, Young-Han;Kim, Jang-Kyung;Jang, Woong;Chin, Byong-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.401-408
    • /
    • 1998
  • Recently there comes out various applications on real time control, audio/video conference, medical image and so on. These applications request certain Quality of Service(QoS) to their underlying communication subsystem. In these cases those communication subsystems should provide real time communication service on their QoS request as well as good performance to maintain best effort traffic. In this paper firstly we briefly look over bandwidth, traffic parameters on point to point network secondly we analyze on real time channel and propose design factors in real time channel protocol for multimedia applications.

  • PDF

Performance Analysis of Contention based Directional MAC Protocol (지향성 안테나 기반 경쟁 MAC 프로토콜의 성능 분석)

  • Na, Woong-Soo;Cho, Sung-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7B
    • /
    • pp.827-833
    • /
    • 2011
  • Directional MAC protocols have drawn great attentions recently in super high speed wireless local/personal area networks due to their higher antenna gain, better spatial reuse, longer transmission range, and lower interference. Despite of these merits, directional MAC protocols suffer from deafness problem. The deafness problem occurs if a node does not answer an RTS frame addressed to it. To overcome this problem, directional MAC protocols have aimed at avoiding the deafness problem using multiple control frames or advance notice techniques or distinguishing deafness from collision. In this paper, we analyze the performance of these schemes in deafness environments with some scenarios. Through performance analysis, we compare the performance of these schemes through evaluating actual network throughput.

Performance Evaluation of Priority Scheme of DMSA Protocol for Multimedia Traffic (멀티미디어 트래픽에 대한 DMSA 프로토콜의 성능평가)

  • Ju, Gi-Ho;An, Seong-Ok
    • The Journal of Engineering Research
    • /
    • v.1 no.1
    • /
    • pp.41-48
    • /
    • 1997
  • In this paper, we wxtend DMSA system to support multimedia traffic more efficiently by incorporating a priority scheme. we divide network stations into two types: asynchronous and isosynchronous stations, and we give a priority to the isosynchronous stations over the asynchronous stations by imposing a time-out constraint on the asynchronous stations . we derive the maximum number of isosynchronous stations the proposed priority scheme can support simultaneously and the maximum bandwidth that can be utilized by asynchronous stations in the presence of isosynchronous traffic. We also provide simulation results for the mixed voice and data traffic, and compare them to the analytic results.

  • PDF

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).

IoT data analytics architecture for smart healthcare using RFID and WSN

  • Ogur, Nur Banu;Al-Hubaishi, Mohammed;Ceken, Celal
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.135-146
    • /
    • 2022
  • The importance of big data analytics has become apparent with the increasing volume of data on the Internet. The amount of data will increase even more with the widespread use of Internet of Things (IoT). One of the most important application areas of the IoT is healthcare. This study introduces new real-time data analytics architecture for an IoT-based smart healthcare system, which consists of a wireless sensor network and a radio-frequency identification technology in a vertical domain. The proposed platform also includes high-performance data analytics tools, such as Kafka, Spark, MongoDB, and NodeJS, in a horizontal domain. To investigate the performance of the system developed, a diagnosis of Wolff-Parkinson-White syndrome by logistic regression is discussed. The results show that the proposed IoT data analytics system can successfully process health data in real-time with an accuracy rate of 95% and it can handle large volumes of data. The developed system also communicates with a riverbed modeler using Transmission Control Protocol (TCP) to model any IoT-enabling technology. Therefore, the proposed architecture can be used as a time-saving experimental environment for any IoT-based system.

A 3D Audio-Visual Animated Agent for Expressive Conversational Question Answering

  • Martin, J.C.;Jacquemin, C.;Pointal, L.;Katz, B.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.53-56
    • /
    • 2008
  • This paper reports on the ACQA(Animated agent for Conversational Question Answering) project conducted at LIMSI. The aim is to design an expressive animated conversational agent(ACA) for conducting research along two main lines: 1/ perceptual experiments(eg perception of expressivity and 3D movements in both audio and visual channels): 2/ design of human-computer interfaces requiring head models at different resolutions and the integration of the talking head in virtual scenes. The target application of this expressive ACA is a real-time question and answer speech based system developed at LIMSI(RITEL). The architecture of the system is based on distributed modules exchanging messages through a network protocol. The main components of the system are: RITEL a question and answer system searching raw text, which is able to produce a text(the answer) and attitudinal information; this attitudinal information is then processed for delivering expressive tags; the text is converted into phoneme, viseme, and prosodic descriptions. Audio speech is generated by the LIMSI selection-concatenation text-to-speech engine. Visual speech is using MPEG4 keypoint-based animation, and is rendered in real-time by Virtual Choreographer (VirChor), a GPU-based 3D engine. Finally, visual and audio speech is played in a 3D audio and visual scene. The project also puts a lot of effort for realistic visual and audio 3D rendering. A new model of phoneme-dependant human radiation patterns is included in the speech synthesis system, so that the ACA can move in the virtual scene with realistic 3D visual and audio rendering.

  • PDF

A Study on Development of Message Integration Bus for Supervisory Control And Data Acquisition (변전설비 감시제어시스템 메시지통합버스 개발에 관한 연구)

  • Oh, Do-Eun;Jung, Nam-Joon;Ko, Jong-Min;Song, Jae-Ju;Yang, Il-Kwon
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.830-832
    • /
    • 2008
  • 변전설비 감시제어시스템은 그 목적상 실시간의 대규모 측정정보 취득을 목적으로 한다. 취득정보는 RTU(Remote Terminal Unit)를 통해서 감시제어시스템에 전달된 후 필요에 따라 해당 정보를 요청하는 애플리케이션들에게 다시 전송된다. 현재 감시제어시스템에 널리 사용되는 DNP(Distribute Network Protocol)는 취득포인트 정보와 취득값만 가지고 있으므로 포인트 리스트에 대한 정보가 없는 경우에는 취득한 데이터를 판독할 수 없다. 따라서 감시제어시스템을 구축하기 위해 우선 RTU에 감시 선로정보를 입력하고, 이 정보를 다시 감시제어시스템의 DB에 포인트 정보와 매핑을 수행해야만 한다. 또한, 새로운 애플리케이션에서 취득값을 얻기 위해서는 이들 포인트 정보와 매핑 정보를 가지고 있는 감시제어시스템의 DB에 직접 연결해야만 한다. 본 논문은 공통정보모델과 이를 기반으로 작성된 메시지 교환 표준 인터페이스를 이용하여 감시제어시스템 취득정보의 효과적인 교환이 가능한 메시지 통합버스에 대하여 기술한다.

Reducing Flooding Latency in Power Save Mode of IEEE 802.11-based Mobile Ad hoc Networks (IEEE 802.11 기반 이동 애드혹 망의 전력 절감 모드에서 플러딩 지연의 개선)

  • 윤현주;서명환;마중수
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.532-543
    • /
    • 2004
  • Mobile Ad hoc NETworks (MANET) consist of mobile nodes which are usually powered by battery Approaches for minimizing power consumption have been proposed for all network layers and devices. IEEE 802.11 DCF (Distributed Coordination Function), a well-known medium access control protocol for MANETS, also defines a power save mode operation. The nodes in power save mode periodically repeat the awake state and the doze state in synchronized fashion. When all nodes are in the awake state, the exchange the announcements for the subsequent message transmission with neighbors. The nodes that send or receive the announcements stay awake for data transmission, and others go into the dole state. The previous works for enhancing the power save mode operation have focused on shortening the duration of the awake state. We observed that the longer sleeping period results in seriously long delivery latency and the consequent unnecessary power consumption as well, because the packets can move forward only one hop for a fixed interval. In this paper, we propose an improved protocol for the power save mode of IEEE 802.11 DCF, which allows the flooding packets to be forwarded several hops in a transmission period. Our approach does not reduce the duration of compulsory awake period, but maximizes its utilization. Each node propagates the announcements for next flooding to nodes of several hops away, thus the packets can travel multiple hops during one interval. Simulation results of comparison between our scheme and the standard show a reduction in flooding delay maximum 80%, and the unicasting latency with accompanying flooding flows near 50%, with slight increase of energy consumption.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.