• Title/Summary/Keyword: custom protocols

Search Result 8, Processing Time 0.02 seconds

Custom Cryptographic Protocol Implementation Method Based on OpenSSL (OpenSSL 기반 사용자 지정 암호 프로토콜 구현 방안)

  • Lam, JunHuy;Lee, Sang-Gon;Lee, Hoon-Jae;Andrianto, Vincentius Christian
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.459-466
    • /
    • 2017
  • One of the most widely-used open source project; OpenSSL is a cryptography library that is used to secure most web sites, servers and clients. One can secure the communication with the Secure Socket Layer (SSL) or its successor, Transport Layer Security (TLS) protocols by using the OpenSSL library. Since cryptography protocols will be updated and enhanced in order to keep the system protected, the library was written in such a way that simplifies the integration of new cryptographic methods, especially for the symmetric cryptography protocols. However, it gets a lot more complicated in adding an asymmetric cryptography protocol and no guide can be found for the integration of the asymmetric cryptography protocol. In this paper, we explained the architecture of the OpenSSL library and provide a simple tutorial to modify the OpenSSL library in order to accommodate custom protocols of both symmetric and asymmetric cryptography.

Fabrication of custom abutment using dental CAD/CAM system (임상가를 위한 특집 2 - CAD/CAM 시스템을 이용한 Custom abutment의 제작)

  • Kim, Hyeong-Seob
    • The Journal of the Korean dental association
    • /
    • v.50 no.3
    • /
    • pp.118-125
    • /
    • 2012
  • CAD/CAM systems (computer-aided design / computer-aided manufacturing) used for decades in restorative dentistry have its application to implant dentistry. This study aimed to overview CAD/CAM systems used implant dentistry, especially emphasizing custom implant abutments manufacturing. CAD/CAM custom abutments present the advantages of being specific to each patient and providing a better fit than the stock and cast custom abutments. This cutting edge technology of virtual-designed and computer-milled implant abutments will likely replace traditional implant restorative protocols and become the standard for implant dentistry in the foreseeable future.

Design, Analysis and Implementation of Energy-efficient Broadcast MAC Protocols for Wireless Sensor Networks

  • Kang, Young-Myoung;Lim, Sang-Soon;Yoo, Joon;Kim, Chong-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1113-1132
    • /
    • 2011
  • In wireless sensor networks (WSNs), most energy saving asynchronous MAC protocols are custom tailored for unicast communications only. However, broadcast protocols are very commonly used in WSNs for a variety of functionalities, such as gathering network topology information, event monitoring and query processing. In this paper, we propose a novel low-power asynchronous broadcast MAC protocol called Alarm Broadcast (A-CAST). A-CAST employs the strobe preamble that specifies the residual waiting time for the following data transmission. Each receiver goes back to sleep upon hearing the strobe preamble for the residual time duration, to conserve energy and to wake up just before data transmission starts. We compute the energy consumption of A-CAST via rigorous mathematical analysis. The analytic results show that A-CAST outperforms B-CAST, a simple broadcast extension of the well-known B-MAC. We also implement A-CAST on sensor motes and evaluated its performance through real experiments. Our experimental results show that A-CAST reduces the energy consumption by up to 222% compared to the previously proposed protocols.

Design of Digital Codec for EPC RFID Protocols Generation 2 Class 1 Codec (EPC RFID 프로토콜 제너레이션 2 클래스 1 태그 디지털 코덱 설계)

  • Lee Yong-Joo;Jo Jung-Hyeon;Kim Hyung-Kyu;Kim Sag-Hoon;Lee Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3A
    • /
    • pp.360-367
    • /
    • 2006
  • In this paper, we designed a digital codec of an RFID tag for EPC global generation 2 class 1. There are a large number of studies on RRD standard and anti-collision algorithm but few studies on the design of digital parts of the RFID tag itself. For this reason, we studied and designed the digital codec hardware for EPC global generation 2 class 1 tag. The purpose of this paper is not to improve former studies but to present the hardware architecture, an estimation of hardware size and power consumption of digital part of the RFID tag. Results are synthesized using Synopsys with a 0.35um standard cell library. The hardware size is estimated to be 111640 equivalent inverters and dynamic power is estimated to be 10.4uW. It can be improved through full-custom design, but we designed using a standard cell library because it is faster and more efficient in the verification and the estimation of the design.

A Shift in Information Dissemination Methods in a Cultural Ritual amid the COVID-19 Pandemic

  • Suhadah, Suhadah;Mulyana, Deddy;Yusup, Pawit M.;Sjafirah, Nuryah Asri
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.4
    • /
    • pp.50-62
    • /
    • 2021
  • This study aims to unravel the shift in the customary method of disseminating information about the ritual of Perang Topat (literally translated as "rice-cake war") as carried out by the custom community of Kemaliq Lingsar in the West Lombok Regency of Indonesia during the COVID-19 pandemic. Grounded in the ethnography of communication research methodology, this study examines the process of the cultural ritual during the 2020 period of the pandemic and compares it to the ones held in 2018 and 2019 (before the current pandemic). Drawing on findings from observations, in-depth interviews, and documentation, it was revealed that the traditional or custom-oriented community of Kemaliq Lingsar abandoned all three prominently used methods of disseminating the information of the Perang Topat ritual that had been used prior to the pandemic, and that they were replaced by a strategy with solely face-to-face (FTF) interpersonal communication carried out by visiting the homes of the target participants of the cultural event. This method was relevant to the current viral crisis because it enabled the committee to minimize the number of spectators which might potentially violate COVID-19 health protocols. This finding also reinforces the hypothetical statement that interpersonal communication via FTF is effective in disseminating information in a limited manner and empowering the emotional bond between the individuals who share relationships and similar interests. The findings of the present study can be a reference for any events where physical distancing must be strictly imposed and require a limit to the number of participants during the pandemic.

Converting Interfaces on Application-specific Network-on-chip

  • Han, Kyuseung;Lee, Jae-Jin;Lee, Woojoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.4
    • /
    • pp.505-513
    • /
    • 2017
  • As mobile systems are performing various functionality in the IoT (Internet of Things) era, network-on-chip (NoC) plays a pivotal role to support communication between the tens and in the future potentially hundreds of interacting modules in system-on-chips (SoCs). Owing to intensive research efforts more than a decade, NoCs are now widely adopted in various SoC designs. Especially, studies on application-specific NoCs (ASNoCs) that consider the heterogeneous nature of modern SoCs contribute a significant share to use of NoCs in actual SoCs, i.e., ASNoC connects non-uniform processing units, memory, and other intellectual properties (IPs) using flexible router positions and communication paths. Although it is not difficult to find the prior works on ASNoC synthesis and optimization, little research has addressed the issues how to convert different protocols and data widths to make a NoC compatible with various IPs. Thus, in this paper, we address important issues on ASNoC implementation to support and convert multiple interfaces. Based on the in-depth discussions, we finally introduce our FPGA-proven full-custom ASNoC.

Efficient Key Management Protocol for Secure RTMP Video Streaming toward Trusted Quantum Network

  • Pattaranantakul, Montida;Sanguannam, Kittichai;Sangwongngam, Paramin;Vorakulpipat, Chalee
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.696-706
    • /
    • 2015
  • This paper presents an achievable secure videoconferencing system based on quantum key encryption in which key management can be directly applied and embedded in a server/client videoconferencing model using, for example, OpenMeeting. A secure key management methodology is proposed to ensure both a trusted quantum network and a secure videoconferencing system. The proposed methodology presents architecture on how to share secret keys between key management servers and distant parties in a secure domain without transmitting any secrets over insecure channels. The advantages of the proposed secure key management methodology overcome the limitations of quantum point-to-point key sharing by simultaneously distributing keys to multiple users; thus, it makes quantum cryptography a more practical and secure solution. The time required for the encryption and decryption may cause a few seconds delay in video transmission, but this proposed method protects against adversary attacks.

Generating Motion- and Distortion-Free Local Field Map Using 3D Ultrashort TE MRI: Comparison with T2* Mapping

  • Jeong, Kyle;Thapa, Bijaya;Han, Bong-Soo;Kim, Daehong;Jeong, Eun-Kee
    • Investigative Magnetic Resonance Imaging
    • /
    • v.23 no.4
    • /
    • pp.328-340
    • /
    • 2019
  • Purpose: To generate phase images with free of motion-induced artifact and susceptibility-induced distortion using 3D radial ultrashort TE (UTE) MRI. Materials and Methods: The field map was theoretically derived by solving Laplace's equation with appropriate boundary conditions, and used to simulate the image distortion in conventional spin-warp MRI. Manufacturer's 3D radial imaging sequence was modified to acquire maximum number of radial spokes in a given time, by removing the spoiler gradient and sampling during both rampup and rampdown gradient. Spoke direction randomly jumps so that a readout gradient acts as a spoiling gradient for the previous spoke. The custom raw data was reconstructed using a homemade image reconstruction software, which is programmed using Python language. The method was applied to a phantom and in-vivo human brain and abdomen. The performance of UTE was compared with 3D GRE for phase mapping. Local phase mapping was compared with T2* mapping using UTE. Results: The phase map using UTE mimics true field-map, which was theoretically calculated, while that using 3D GRE revealed both motion-induced artifact and geometric distortion. Motion-free imaging is particularly crucial for application of phase mapping for abdomen MRI, which typically requires multiple breathold acquisitions. The air pockets, which are caught within the digestive pathway, induce spatially varying and large background field. T2* map, that was calculated using UTE data, suffers from non-uniform T2* value due to this background field, while does not appear in the local phase map of UTE data. Conclusion: Phase map generated using UTE mimicked the true field map even when non-zero susceptibility objects were present. Phase map generated by 3D GRE did not accurately mimic the true field map when non-zero susceptibility objects were present due to the significant field distortion as theoretically calculated. Nonetheless, UTE allows for phase maps to be free of susceptibility-induced distortion without the use of any post-processing protocols.