• Title/Summary/Keyword: protocol model

Search Result 1,374, Processing Time 0.028 seconds

Random Linear Network Coding to Improve Reliability in the Satellite Communication (위성 통신에서 신뢰성 향상을 위한 랜덤 선형 네트워크 코딩 기술)

  • Lee, Kyu-Hwan;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.700-706
    • /
    • 2013
  • In this paper, we propose a method for applying random linear network coding in satellite communication to improve reliability. In the proposed protocol, network-coded redundancy (NC-R) packets are transmitted in the PEP (Performance Enhancement Proxy). Therefore, if data packets is lost by wireless channel error, they can be recovered by NC-R packets. We also develop the TCP performance model of the proposed protocol and evaluate the performance of the proposed protocol. In the simulation results, It is shown that the proposed protocol can improve the TCP throughput as compared with that of the conventional TCP because the NC-R packets is sent by the sender-side PEP and the receiver-side PEP use these packets to recover the lost packets, resulting in reducing the packet loss in TCP.

The Analysis of the TETRA Authentication Protocol (TETRA 인증 프로토콜 분석)

  • Park Yong-Seok;Ahn Jae-Hwan;Jung Chang-Ho;Ahn Joung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA system provides the radio authentication service which permits only authorized radio to access network. Radio authentication is the process which checks the sameness of authentication-key(K) shared between radio and authentication center by challenge-response protocol. TETRA standard authentication protocol can prevent the clone radio to copy ISSI from accessing network, but can't prevent the clone radio to copy ISSI & authentication-key. This paper analyzes authentication-key generation/delivery/infection model in TETRA authentication system and analyzes the threat of clone radio caused by authentication-key exposure. Finally we propose the new authentication protocol which prevent the clone radio to copy ISSI & authentication-key from accessing network.

Security Analysis on NFC-based M-coupon Protocols and its Countermeasure (NFC에 기반한 모바일 쿠폰 프로토콜에 대한 안전성 분석 및 대응 방안)

  • Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1388-1397
    • /
    • 2015
  • Recently, an application business model was proposed to implement an M-coupon system using the NFC-based mobile devices. In this paper, the security requirements were surveyed for a secure M-coupon system and to analyze the threats on the existing NFC-based M-coupon protocols. After considering the implementation efficiency and security, this paper presents a novel M-coupon protocol based on the Diffie-Hellman key agreement scheme. This protocol can be an alternative to solve the security problems related to the PKI (Public Key Infrastructure) and secret key distribution. Furthermore, this M-coupon protocol is designed to provide user authentication and counteract the relay attack.

Implementation and Performance Evaluation of Software Distributed Shared Memory for SMP Clusters (SMP 클러스터를 위한 소프트웨어 분산 공유메모리의 구현 및 성능 측정)

  • 이동현;이상권;박소연;맹승렬
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.331-340
    • /
    • 2003
  • Low-cost commodity SMP(Symmetric Multiprocessor) is widely used as a node of cluster system. In this paper, we implement and evaluate the performance of SDSM system for SMP clusters. Our SDSM system provides HLRC(Home-based Lazy Release Consistency) memory consistency model. Our protocol utilize shared memory within same SMP node, so that page fetch and message passing through network can be reduced. It is implemented on 8 node of 2-way Pentium-III SMP interconnected with 100Mbps Fast Ethernet, and uses TCP/IP for transport/network layer protocol. The experiment with eight applications shows that our SMP protocol achieves maximum 33% speedup improvement and 13%-52% reduction of page fetch compared with uniprocessor protocol.

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

A Practical Privacy-Preserving Multi-Party Computation Protocol for Solving Linear Systems (선형계를 위한 실용적인 프라이버시 보존형 다자간 계산 프로토콜)

  • Yi Ok-Yeon;Hong Do-Won;Kang Ju-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2006
  • We consider a privacy-preserving cooperative computation protocol evaluating a beneficial function of all participants' secret inputs, such that each party finally holds a share of the function output. We propose a practical privacy-preserving cooperative computation protocol for solving the linear system of equations problem md the linear least-squares problem. Solutions to these problems are widely used in many areas such as banking, manufacturing, and telecommunications. Our multi-party protocol is an efficiently extended version of the previous two-party model.

Routing Protocol for Wireless Sensor Networks Based on Virtual Force Disturbing Mobile Sink Node

  • Yao, Yindi;Xie, Dangyuan;Wang, Chen;Li, Ying;Li, Yangli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1187-1208
    • /
    • 2022
  • One of the main goals of wireless sensor networks (WSNs) is to utilize the energy of sensor nodes effectively and maximize the network lifetime. Thus, this paper proposed a routing protocol for WSNs based on virtual force disturbing mobile Sink node (VFMSR). According to the number of sensor nodes in the cluster, the average energy and the centroid factor of the cluster, a new cluster head (CH) election fitness function was designed. At the same time, a hexagonal fixed-point moving trajectory model with the best radius was constructed, and the virtual force was introduced to interfere with it, so as to avoid the frequent propagation of sink node position information, and reduce the energy consumption of CH. Combined with the improved ant colony algorithm (ACA), the shortest transmission path to Sink node was constructed to reduce the energy consumption of long-distance data transmission of CHs. The simulation results showed that, compared with LEACH, EIP-LEACH, ANT-LEACH and MECA protocols, VFMSR protocol was superior to the existing routing protocols in terms of network energy consumption and network lifetime, and compared with LEACH protocol, the network lifetime was increased by more than three times.

Implementation of Communication Protocol between Control Centers using ICCP (ICCP를 사용한 전력센터간의 통신 프로토콜 구현)

  • Jang, Kyung-Soo;Chang, Byung-Wook;Hahn, Kyung-Duk;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3910-3922
    • /
    • 2000
  • Current power systems are distributed geographically and operated in the form of Energy Management System(EMS)/ Supervision Control and Data Acquisition(SCADA) with the aid of computers and communications. Recently a variety of utilities have had interests in using inforrration technology to bring the efficiency and low operational costs. There is also a trend to integrdte the production, transmission, distribution and management/control of power into one and unified distributed system. To this end, Electric Power Hesearch Institute(EPRI) announced a new standard communication protocol called Inter-Control Center Protocol(ICCP).ICCP specifies the use of Manufacturing Message Specification(MMS) for services required by rccr in application layer and supports the communications between heterogeneous control centers. This paper presents the characteristics of MMS,ICCP and their relationship. Futherrnore, we implement the basic functional blocks of ICCP using MMS services under TCI/IP environments. Finally, we model a simple power system and apply the rccp protocol to this system in a window-based scheme, and finally show the operation and validation of this protocol.

  • PDF

Nutritional education for management of osteodystrophy (NEMO) trial: Design and patient characteristics, Lebanon

  • Karavetian, Mirey;Abboud, Saade;Elzein, Hafez;Haydar, Sarah;de Vries, Nanne
    • Nutrition Research and Practice
    • /
    • v.8 no.1
    • /
    • pp.103-111
    • /
    • 2014
  • This study aims to determine the effect of a trained dedicated dietitian on clinical outcomes among Lebanese hemodialysis (HD) patients: and thus demonstrate a viable developing country model. This paper describes the study protocol and baseline data. The study was a multicenter randomized controlled trial with parallel-group design involving 12 HD units: assigned to cluster A (n = 6) or B (n = 6). A total of 570 patients met the inclusion criteria. Patients in cluster A were randomly assigned as per dialysis shift to the following: Dedicated Dietitian (DD) (n = 133) and Existing Practice (EP) (n = 138) protocols. Cluster B patients (n = 299) received Trained Hospital Dietitian (THD) protocol. Dietitians of the DD and THD groups were trained by the research team on Kidney Disease Outcomes Quality Initiative nutrition guidelines. DD protocol included: individualized nutrition education for 2 hours/month/HD patient for 6 months focusing on renal osteodystrophy and using the Trans-theoretical theory for behavioral change. EP protocol included nutrition education given to patients by hospital dietitians who were blinded to the study. The THD protocol included nutrition education to patients given by hospital dietitian as per the training received but within hospital responsibilities, with no set educational protocol or tools. Baseline data revealed that 40% of patients were hyperphosphatemics (> 5.5 mg/dl) with low dietary adherence and knowledge of dietary P restriction in addition to inadequate daily protein intake ($58.86%{\pm}33.87%$ of needs) yet adequate dietary P intake ($795.52{\pm}366.94$ mg/day). Quality of life (QOL) ranged from 48-75% of full health. Baseline differences between the 3 groups revealed significant differences in serum P, malnutrition status, adherence to diet and P chelators and in 2 factors of the QOL: physical and social functioning. The data show room for improvement in the nutritional status of the patients. The NEMO trial may be able to demonstrate a better nutritional management of HD patients.

Relapse-free Rate with Childhood Acute Lymphoblastic Leukemia Treated under the Thai National Protocol

  • Tharnprisan, Piangjit;Khiewyoo, Jiraporn;Sripraya, Piporn;Wiangnon, Surapon
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.2
    • /
    • pp.1127-1130
    • /
    • 2013
  • Background: The standard national protocol for treatment of acute lymphoblastic leukemia (ALL) in children was implemented in 2006. A systematic evaluation of the treatment outcome is needed. This study examined the relapse-free survival among childhood ALL cases treated with this protocol and related factors. Materials and Methods: A descriptive study was conducted in children aged between 0-15 years, newly diagnosed with ALL between March 2006 and March 2011 at Srinagarind Hospital, Department of Pediatrics, Faculty of Medicine, Khon Kaen University. The patients were treated on the basis of stratified risk as per the Thai national protocol. Data were compiled from the hospital records. The Kaplan-Meier method was used to describe relapse-free survival and the Cox proportional hazard model to investigate the associated factors. Results: Of the 103 children recruited, 86 (83.5%) achieved complete remission. The total follow-up time was 3132.5 person-months. Eighteen (20.9%) relapsed. The incidence density was 0.6 per 100 person-months (95%CI: 0.4, 0.9). The respective relapse-free rates at 1, 3 and 5 years were 93.0% (95%CI: 85.1, 96.8), 84.5% (95%CI: 74.0, 90.9) and 64.1% (95%CI: 45.6, 77.8). A factor associated with the relapse-free rate was age under 1 year (HR=6.0; 95%CI: 1.1, 33.8). Conclusions: The rate of being relapse-free in ALL children treated under the Thai national protocol at Srinagarind Hospital was better than with former protocols; however, it is still not as good as in developed countries. Further review of the treatment approach of ALL is needed.