• Title/Summary/Keyword: protocol architecture

Search Result 796, Processing Time 0.026 seconds

Design of Quantum Key Distribution System without Fixed Role of Cryptographic Applications (암호장치의 송·수신자 역할 설정이 없는 양자키분배 시스템 설계)

  • Ko, Haeng-Seok;Ji, Se-Wan;Jang, Jingak
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.771-780
    • /
    • 2020
  • QKD(Quantum Key Distribution) is one of the protocols that can make two distant parties safely share secure keys against the threat of quantum computer. Generally, cryptographic applications which are connected to the QKD device have fixed roles as a transmitter and a receiver due to the race condition and complexity of implementation. Because the conventional QKD system is mainly applied to the link encryptor, there are no problems even if the roles of the cryptographic devices are fixed. We propose a new scheme of QKD system and protocol that is easy to extend to the QKD network by eliminating quantum key dependency between cryptographic device and QKD node. The secure keys which are generated by the TRNG(True Random Number Generator) are provided to the cryptographic applications instead of quantum keys. We design an architecture to transmit safely the secure keys using the inbound and outbound quantum keys which are shared between two nodes. In this scheme, since the dependency of shared quantum keys between two QKD nodes is eliminated, all cryptographic applicatons can be a master or a slave depending on who initiates the cryptographic communications.

International Standardization and Implementation of Home Energy Saving System for Smart Grid (스마트 그리드를 위한 홈 에너지 절감 시스템의 IEC 국제표준화 및 구현)

  • Choi, Kwang-Soon;Lee, Sang-Won;Park, Young-Choong;Jung, Kwang-Mo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1222-1229
    • /
    • 2012
  • For the reduction of electric energy consumption and its efficient use at homes or buildings, a new work item proposal for new architecture and functional requirements of Energy Saving System (ESS) was proposed to IEC TC 100 and accepted as a new project, IEC PT 62654 in 2009. Recently, the final ballot for publication passed without negative votes and IEC TS 62654 was finally published in August 2012. For the verification of this standard, Prototype of ESS system composed of an ESS server, ESS clients, and portable ESS terminal were especially implemented in parallel with the standardization. Electric Power Control and Management (EPCM) protocol for the communication between ESS server and clients was also implemented, which supports self-configuration of ESS network, power consumption monitoring, remote power control, and additional functions for intelligent energy saving services.

Design and Implementation of Electronic Medical Record System Based on HL7-CDA for the Exchange of Clinical Information (임상 정보교환을 위한 HL7-CDA 기반의 전자의무기록 시스템의 설계 및 구현)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.379-385
    • /
    • 2008
  • For the sharing and exchange of information between medical clinics, the clinical document has to be built on a standardized protocol such as a HL7-CDA. But it is difficult to exchange information between medical clinics because clinical document such as electronic medical record that include text and image, have different structure of document and type of expression. In this paper, we propose the electronic medical record system based on HL7-CDA that can share and exchange clinical information between medical institute. For this purpose, we have to design the schema of the clinical document architecture after we select the essential items of medical record and define templates. The proposed system can minimize integrating process and save parsing time when clinical information exchange and refer, by converting electronic medical record to base64 encoding scheme and integrate it in a XML document.

Object Modeling of Intranet Application applying Design Patterns (설계패턴이 적용된 인트라넷 어플리케이션의 객체모델링)

  • Bae, Je-Min;Lee, Chang-Hoon;Lee, Kyung-Whan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.1961-1974
    • /
    • 1997
  • WWW has accepted widely to the who wants the hypermedia-based internet services. And WWW introduces intranet environment which consists of the networks supporting TCP/IP and HTTP protocol for processing the task of company inside that. Intranet application should support not only acquiring the informations, but also producing, modifying and deleting the ones. But since previous hypermedia development methods lack modeling behavior of system and reuse, we need a new method for intranet application. In this thesis, we have proposed the OOIDM(Object Oriented Intranet application Development Method)supporting modeling behavior of system and reuse. And we have proposed the design patterns available for the intranet domain in order to reuse the design information. And we introduces a case study about OOIDM applying design patterns. Adaptation of design patterns to intranet domain gives us much benefits. Design patterns make it easier to reuse the successful design, architecture and reducing the design decisions.

  • PDF

Event based Rule Processing in Ubiquitous Web Services Environments (유비쿼터스 웹서비스 환경에서 이벤트 기반의 룰 처리 기법)

  • Lee Kang-Chan;Lee Won-Suk;Jeon Jong-Hong;Lee Seung-Yun;Park Jong-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1101-1105
    • /
    • 2006
  • Ubiquitous computing network comprises a variety of distributed service devices. Today Web services technology enables the heterogeneous devices to provide their own services and interact with each other via well-defined Internet protocol. Nevertheless, service devices in ubiquitous environments require more event-driven, autonomous interaction beyond rather passive service-oriented architecture of the present time. This paper presents an ECA (Event-Condition-Action) rule description language in an attempt to support capability for autonomous interactions among service-oriented devices in ubiquitous computing network. Specifically, the proposed WS-ECA is an XML-based ECA rule description language for web service-enabled devices. The rules are embedded in distributed devices which invoke appropriate services in the network if the rules are triggered by some internal or external events. The presented ECA-based device coordination approach is expected to facilitate seamless inter-operation among the web service-enabled devices in the emerging ubiquitous computing environment.

Implementation of IEEE 802.11n MAC using Design Methodology (통합된 구현 방식을 이용한 IEEE 802.11n MAC의 설계)

  • Chung, Chul-Ho;Lee, Sun-Kee;Jung, Yun-Ho;Kim, Jae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.360-367
    • /
    • 2009
  • In this paper, we propose a design methodology of IEEE 802.11n MAC which aims to achieve the higher throughput of more than 100Mbps in downlink as measured at the MAC-SAP and present the implementation results of MAC using the proposed design methodology. With our proposed methodology, different from the conventional design flow which has the separate codes for the protocol validation, for the network simulation, and for the system implementation, the unified code can be used for the network simulation and the implementation of software and hardware. Our MAC architecture is partitioned into two parts, Upper-layer MAC and Lower-layer MAC, in order to achieve the high efficiency for the new features of IEEE 802.11n standard. They are implemented in software and hardware respectively. The implemented MAC is tested on ARM based FPGA board.

Multi-channel Video Analysis Based on Deep Learning for Video Surveillance (보안 감시를 위한 심층학습 기반 다채널 영상 분석)

  • Park, Jang-Sik;Wiranegara, Marshall;Son, Geum-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1263-1268
    • /
    • 2018
  • In this paper, a video analysis is proposed to implement video surveillance system with deep learning object detection and probabilistic data association filter for tracking multiple objects, and suggests its implementation using GPU. The proposed video analysis technique involves object detection and object tracking sequentially. The deep learning network architecture uses ResNet for object detection and applies probabilistic data association filter for multiple objects tracking. The proposed video analysis technique can be used to detect intruders illegally trespassing any restricted area or to count the number of people entering a specified area. As a results of simulations and experiments, 48 channels of videos can be analyzed at a speed of about 27 fps and real-time video analysis is possible through RTSP protocol.

The proposal of a cryptographic method for the communication message security of GCS to support safe UAV operations (안정적인 UAV 운영을 위한 GCS의 통신메시지의 암호화 제안)

  • Kim, Byoung-Kug;Hong, Sung-Hwa;Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1353-1358
    • /
    • 2021
  • IoT (Internet of Things) emerges from various technologies such as communications, micro processors and embedded system and so on. The IoT has also been used to UAV (Unmanned Aerial Vehicle) system. In manned aircraft, a pilot and co-pilot should control FCS (Flight Control System) with FBW(Fly By Wire) system for flight operation. In contrast, the flight operation in UAV system is remotely and fully managed by GCS (Ground Control System) almost in real time. To make it possible the communication channel should be necessary between the UAV and the GCS. There are many protocols between two systems. Amongst them, MAVLink (Macro Air Vehicle Link) protocol is representatively used due to its open architecture. MAVLink does not define any securities itself, which results in high vulnerability from external attacks. This paper proposes the method to enhance data security in GCS network by applying cryptographic methods to the MAVLink messages in order to support safe UAV operations.

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

Incentive Mechanism based on Game Theory in Kad Network (Kad 네트워크에서 게임 이론을 바탕으로 한 인센티브 메커니즘)

  • Wang, Xu;Ni, Yongqing;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.43-52
    • /
    • 2010
  • The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. Nowadays, the Kad network has attracted wide concern as a popular architecture for file sharing systems. Meanwhile, many problems have been coming out in these file sharing systems such as freeriding of users, uploading fake files, spreading viruses, and so on. In order to overcome these problems, we propose an incentive mechanism based on game theory, it establishes a more stable and efficient network environment for Kad users. Users who share valuable resources receive rewards by increasing their credits, while others who supply useless or harmful files are punished. This incentive mechanism in Kad network can be used to detect and prevent malicious behaviors of users and encourage honest interaction among users.