• Title/Summary/Keyword: protocol model

Search Result 1,374, Processing Time 0.025 seconds

CONSTANT-ROUND PRIVACY PRESERVING MULTISET UNION

  • Hong, Jeongdae;Kim, Jung Woo;Kim, Jihye;Park, Kunsoo;Cheon, Jung Hee
    • Bulletin of the Korean Mathematical Society
    • /
    • v.50 no.6
    • /
    • pp.1799-1816
    • /
    • 2013
  • Privacy preserving multiset union (PPMU) protocol allows a set of parties, each with a multiset, to collaboratively compute a multiset union secretly, meaning that any information other than union is not revealed. We propose efficient PPMU protocols, using multiplicative homomorphic cryptosystem. The novelty of our protocol is to directly encrypt a polynomial by representing it by an element of an extension field. The resulting protocols consist of constant rounds and improve communication cost. We also prove the security of our protocol against malicious adversaries, in the random oracle model.

Simulation of a CIM Workflow System Using Parallel Virtual Machine (PVM)

  • Chang-Ouk Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.5 no.2
    • /
    • pp.13-24
    • /
    • 1996
  • Workflow is an ordered sequence of interdependent component data activities each of which can be executed on an integrated information system by accessing a remote information system. In our previous research [4], we proposed a distributed CIM Workflow system which consists of a workflow execution model called DAF-Net and an agent-based information systems called AIMIS. Given a component data activity, there needs an interaction protocol among agents which allocates the component data activity to a relevant information systems exist. The objective of this research is to propose and test two protocols: ARR(Asynchronous Request and Response)protocol and NCL(Negotiation with Case based Learning) protocol. To test the effectiveness of the protocols, we applied the PVM(Parallel Virtual Machine) software to simulate the distributed CIM Workflow system. PVM provides a distributed computing environment in which users can run different software processes in different computers while allowing communication among the processes.

  • PDF

A Newly Telesecurity of VoIP using SIP protocol in VPN

  • Lee, Sung-Ki;Hwang, Doh-Yeun;Yi, Seung-Ryong;Yu, Seung-Sun;Kwak, Hoon-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1391-1394
    • /
    • 2005
  • The VoIP (Voice over IP) is being used world-widely and already put to practical use in many fields. However, it is needed to ensure the security of VoIP call in special situations. It is relatively difficult to eavesdrop commonly used PSTN network in that a 1:1 circuit connects it. However, it is difficult to ensure the security of a call on Internet because many users are connected to the Internet concurrently. This paper suggests a new model for Internet telephony to prevent eavesdrops, using VoIP (using SIP protocol) with the use the VPN protocol and establish the feasibility of its practical use comparing it with the conventional Internet telephony.

  • PDF

Design and Implementation of Super-peer P2P Overlay Network Protocol and System for mobile IPTV

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.295-300
    • /
    • 2010
  • Recent researches of network structure are moving to high-level networks because there are already many research results of low-level network. Especially, current network services has been changed to the multimedia service using multicast routing such as IPTV(Internet Protocol Television) service. And then previous multicast services were provider oriented. So previous multicast structures were organized server/client model. But future multicast services will make user oriented services. Therefore there will be many service providers in the future. At this point, we study P2P network for supporting multi provider. So we research load balancing and contents lookup protocols in P2P network. In this paper, we propose network protocol and system based on super peer P2P for load balancing and efficiently service search. And we considered mobile environment for mobile IPTV.

A Simple Cost Analysis of Host ID-LOC Separating protocol using SDN Features

  • Lee, Chan-Haeng;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.41-47
    • /
    • 2016
  • The IP address used in the Internet has the role of both identifier and locator to bind a host and the application, however, this binding restricts some functions such as mobility and multi-homing. As a result, we suggested a host ID-LOC separation protocol using DHT with SDN features. The proposed scheme is a network-based scheme, and uses IPv6 addresses. The underlying network is partitioned into Host Identity domain and IP domain for identifiers and locators. In this paper, we present a simple cost model for analyzing both the proposed scheme and one of the previous works, the MOFI. The result of cost analysis shows better performance of the proposed scheme.

Study on the Performance Analysis of Building Automation Network (빌딩 자동화 통신망의 성능해석에 관한연구)

  • 홍승호;송원석
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.52 no.6
    • /
    • pp.359-364
    • /
    • 2003
  • BACnet is a standard data communication protocol for building automation and control systems. MS/TP is most widely used LAN protocol for data communication among field devices in the BACnet-based building automation. In this study, the performance of MS/TP protocol is investigated using a simulation model. This study evaluates the delay characteristics of MS/TP being used to deliver a BACnet application service. Analysis of the simulation results was used to identify the network parameters that influence the performance of BACnet application service and to develop recommendatioins that should be considered when designing and operating BACnet systems.

Network System Survivability: A Framework of Transmission Control Protocol with Software Rejuvenation Methodology (네트워크 시스템 생존성 : 소프트웨어 재활기법을 이용한 TCP의 프레임워크)

  • Khin Mi Mi Aung;Park, Jong-Sou
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.121-125
    • /
    • 2003
  • In this paper, we propose a framework of Transmission Control Protocol with Software Rejuvenation methodology, which is applicable for network system survivability. This method is utilized to improve the survivability because it can limit the damage caused by successful attacks. The main objectives are to detect intrusions in real time, to characterize attacks, and to survive in face of attacks. To counter act the attacks' attempts or intrusions, we perform the Software Rejuvenation methods such as killing the intruders' processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can't make their progress. This is the way of survivability to maximize the deterrence against an attack in the target environment. We address a framework to model and analyze the critical intrusion tolerance problems ahead of intrusion detection on Transmission Control Protocol (TCP).

  • PDF

A Study On Management Protocol For Distributed Systems Management (분산시스템관리를 위한 관리 프로토콜에 관한연구)

  • 박승섭
    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.289-302
    • /
    • 1999
  • As the size and complexity of network increase Distributed System Management (DSM) will be significant issue within information network in order to increase the high reliability and to improve the flexibility of network management. The OSI management model has several problems. The key problems are that it does not fully address the problem of how to develop communication protocol in support of DSM and how to classify the management connection criteria. In this paper to solve first problem described above this paper propose the connectionless CMIP to accomplish for effectively managing the distributed management managing systems to handle the dynamic informations. To work out second problem we introduce the connection criteria in the hierarchy of management system and finally evaluate the efficiency of a suggested protocol during cooperative negotiation among the managing system.

  • PDF

A delay analysis of multi-access protocol under wireless network (무선환경하에서 Slotted ALOHA 방식의 다중채널 경쟁에 대한 지연시간분석)

  • Hur Sun;Kim Jeong-Kee;Nam Jin-Gyu
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.1
    • /
    • pp.129-133
    • /
    • 2005
  • Slotted ALOHA(S-ALOHA) is widely used in local wireless network. We analyze the performance of contention-based model in wireless LAN using S-ALOHA protocol. We analyze the performance of binary exponential backoff (BEB) algorithm under the slotted ALOHA protocol: whenever a node's message which tries to reserve a channel is involved in a collision for the ith time, it chooses one of the next $2^i$ frames with equal probability and attempts the reservation again. We derive the expected access delay and throughput which is defined as the expected number of messages that reserve a channel in a frame. A simulation study is performed to verify our method.

Improving TCP Performance with Bandwidth Estimation and Selective Negative Acknowledgment in Wireless Networks

  • Cheng, Rung-Shiang;Lin, Hui-Tang
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.236-246
    • /
    • 2007
  • This paper investigates the performance of the transmission control protocol (TCP) transport protocol over IEEE 802.11 infrastructure based wireless networks. A wireless link is generally characterized by high transmission errors, random interference and a varying latency. The erratic packet losses usually lead to a curbing of the flow of segments on the TCP connection and thus limit TCP's performance. This paper examines the impact of the lossy nature of IEEE 802.11 wireless networks on the TCP performance and proposes a scheme to improve the performance of TCP over wireless links. A negative acknowledgment scheme, selective negative acknowledgment (SNACK), is applied on TCP over wireless networks and a series of ns-2 simulations are performed to compare its performance against that of other TCP schemes. The simulation results confirm that SNACK and its proposed enhancement SNACK-S, which incorporates a bandwidth estimation model at the sender, outperform conventional TCP implementations in 802.11 wireless networks.