• Title/Summary/Keyword: protocol model

Search Result 1,374, Processing Time 0.034 seconds

A hybrid-vehicular communication systems using a gaussian model for sending a safe message (안전 메시지 전달을 위해 가우시안 모델을 적용한 하이브리드 차량 통신 시스템)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.161-166
    • /
    • 2012
  • When a car accident happened on a highway, the accident vehicle should broadcast a safe message to its neighbors in order to prevent a chain-reaction collision. Also, there is a problem that the estimation accuracy is low because of the memory limit from increasing the sampling count. In this paper, we proposes a HVC systems using a back-off algorithm applied to a gaussian model. And we proposes a MAC protocol preventing the communication delay by separating the neighbor count collection channel, data channel, and RSU communication channel. As a result, we show the frame reception success rate of our protocol improved about 10% than the previous protocol.

A Study on Developing and Applying Access Point Control System Using SRU Protocol (SRU 프로토콜을 이용한 접근점제어 시스템의 구축과 활용에 관한 연구)

  • Lee, Ji-Won;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.1 s.55
    • /
    • pp.229-248
    • /
    • 2005
  • This study proposes a national cooperative model of access point control, that enables local systems to utilize national access point control record, without creating their own authority records. In order to applying this model, a client/server system is developed using SRU (Search and Retrieve URL Service) protocol. The suggested access point control system will be a cost-effective and time-saving model for the local system, and will be more flexible and extensible with concept of access point control, XML record format and SRU protocol.

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1313-1327
    • /
    • 2013
  • How to make people keep both the confidentiality of the sensitive data and the privacy of their real identity in communication networks has been a hot topic in recent years. Researchers proposed privacy-preserving authenticated key exchange protocols (PPAKE) to answer this question. However, lots of PPAKE protocols need users to remember long secrets which are inconvenient for them. In this paper we propose a lightweight three-party privacy-preserving authentication key exchange (3PPAKE) protocol using smart card to address the problem. The advantages of the new 3PPAKE protocol are: 1. The only secrets that the users need to remember in the authentication are their short passwords; 2. Both of the users can negotiate a common key and keep their identity privacy, i.e., providing anonymity for both users in the communication; 3. It enjoys better performance in terms of computation cost and security. The security of the scheme is given in the random oracle model. To the best of our knowledge, the new protocol is the first provably secure authentication protocol which provides anonymity for both users in the three-party setting.

A Study on The Performance Analysis of IEEE 802,11 Wireless LAN (IEEE 802.11 무선 LAN의 성능분석에 관한 연구)

  • Hong, Seong-Cheol;Bae, Seong-Su;O, Yeong-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.7-16
    • /
    • 2000
  • In this paper, IEEE 802.11 MAC layer protocol is modeled by p-persistent CSMA method. And We introduce performance analysis model based on Basic CSMA/CA protocol, CTS/RTS protocol and hidden node effect reflected Basic CSMA/CA Protocol, Which is mathematically assayed by renewal theory. In this throughput, the result shown that Basic CSMA/CA protocol is profitable when the number of active node is smaller, or the length of packet is shorter, and CTS/RTS protocol is lucrative when the number of active node is larger, or the length of packet is longer. Also the result shown that hidden node less affected when the active node has small one, rather than when the active node has larger one.

  • PDF

Adaptive Range-Based Collision Avoidance MAC Protocol in Wireless Full-duplex Ad Hoc Networks

  • Song, Yu;Qi, Wangdong;Cheng, Wenchi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3000-3022
    • /
    • 2019
  • Full-duplex (FD) technologies enable wireless nodes to simultaneously transmit and receive signal using the same frequency-band. The FD modes could improve their physical layer throughputs. However, in the wireless ad hoc networks, the FD communications also produce new interference risks. On the one hand, the interference ranges (IRs) of the nodes are enlarged when they work in the FD mode. On the other hand, for each FD pair, the FD communication may cause the potential hidden terminal problems to appear around the both sides. In this paper, to avoid the interference risks, we first model the IR of each node when it works in the FD mode, and then analyze the conditions to be satisfied among the transmission ranges (TRs), carrier-sensing ranges (CSRs), and IRs of the FD pair. Furthermore, in the media access control (MAC) layer, we propose a specific method and protocol for collision avoidance. Based on the modified Omnet++ simulator, we conduct the simulations to validate and evaluate the proposed FD MAC protocol, showing that it can reduce the collisions effectively. When the hidden terminal problem is serious, compared with the existing typical FD MAC protocol, our protocol can increase the system throughput by 80%~90%.

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.

Development of Verification and Conformance Test Generation of Communication Protocol for Railway Signaling Systems

  • Lee, Jae-Ho;Hwang, Jong-Gyu;Seo, Mi-Seon;Kim, Sung-Un;Park, Gwi-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.358-362
    • /
    • 2004
  • Verification and testing are complementary techniques that are used to increase the level of confidence in the correct functioning of communication systems as prescribed by their specifications. This paper presents an experience of model checking for a formal railway signaling protocol specified in LTS (Labeled Transition System). This formal approach checks deadlock, livelock and reachability for the state and action to verify whether properties expressed in modal logic are true on specifications. We also propose a formal method for semi-automated test case generation for a railway signaling protocol described in I/O FSM (Input/Output Finite State Machine). This enables the generation of more complete and consistent test sequence for conformance testing. The above functions are implemented by C++ language and included within RSPVTE (Railway Signaling Protocol Verification and Testing Environment).

  • PDF

Instructional Alignment Observation Protocol (IAOP) for Implementing the CCSSM: Focus on the Practice Standard, "Model with Mathematics"

  • Hwang, Jihyun
    • Research in Mathematical Education
    • /
    • v.23 no.3
    • /
    • pp.149-164
    • /
    • 2020
  • This study aimed to establish an observation protocol for mathematical modeling as an alternative way to examine instructional alignment to the Common Core State Standards for Mathematics. The instructional alignment observation protocol (IAOP) for mathematical modeling was established through careful reviews on the fidelity of implementation (FOI) framework and prior studies on mathematical modeling. I shared the initial version of the IAOP including 15 items across the structural and instructional critical components as the FOI framework suggested. Thus, the IAOP covers what teachers should do and know for practices of mathematical modeling in classrooms and what teachers and students are expected to do. Based on the findings in this study, validity and reliability of the IAOP should be evaluated in follow-up studies.

Design of Service-adaptive Tactical Data Transmission Protocol for Satellite Communications (위성통신을 위한 서비스 적응적인 전술 데이터 전송 프로토콜 설계)

  • Kim, Sujeong;Lee, Sooho
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.72-79
    • /
    • 2016
  • In this paper, we propose a Service-adaptive Tactical Data Transmission Protocol (STTS) based on Satellite Communications with narrow bandwidth. STTS is designed to provide additional field for scalability and scheduler for reliability of transport stream protocol based on digital broadcasting standard, DVB-S and DVB-S2. It is also verified the effects of lost data packets with narrow bandwidth through the simulator by traffic model and re-transmission of critical data, and checked the design considerations based on STTS system.