• Title/Summary/Keyword: protocol model

Search Result 1,379, Processing Time 0.031 seconds

Hybrid Home Network Prefix Model for Supporting Inter-Technology Handover in Proxy MIPv6 Domains (Proxy MIPv6 도메인에서 Inter-Technology Handover 제공을 위한 Hybrid Home Network Prefix 모델)

  • Hong, Yong-Geun;Kim, Young-Hyun;Pack, Sang-Heon;Youn, Joo-Sang
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.111-118
    • /
    • 2011
  • Recently, with the popularity of smartphones, an interest in multi-networking service through wireless multi-interface of a mobile node is increased. Also, wireless networking technology for using wireless multi-interface has been studied. As the related work, in the IETF Netext WG, the extension of PMIPv6 protocol for multi-interface support is being discussed. Existing PMIPv6 protocol includes the functions for simultaneous access over multi-interfaces of a mobile node and inter-technology handover between multi-interfaces of the mobile node. However, in case of the existing protocol, the problem occurs when inter-technology handover is performed after simultaneous access on the PMIPv6 domain, this problem is the discontinuous of simultaneous connections. Therefore, the PMIPv6 Protocol cannot support flow based multi-homing service. In this paper, as a way to solve the problem, Hybrid Home Network Prefix scheme is proposed.

On Implementing and Deploying Label Distribution Protocol in MultiProtocal Label Switching Systems (MPLS시스템에서 LDP 기능 구현 및 활용 방안)

  • 김미희;이종협;이유경
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.270-281
    • /
    • 2003
  • ETF made the RFCs of MPLS technologies for providing the QoS of ATM or Frame Relay and the flexibility&scalability of IP on the Internet services. IETF has been expanding MPLS technologies as a common control component for supporting the various switching technologies called GMPLS. Also, IETF has standardized the signaling protocols based on such technologies, such as LDP, CR-LDP and RSVP-TE. ETRI developed the MPLS system based on ATM switch in order to provide more reliable services, differentiated services and value-added services like the VPN and traffic engineering service on the Korea Public Sector network. We are planning on deploying model services and commercial services on that network. This paper explains the basic functions of LDP, design and development of LDP on our system, and compares with LDP development and operation on other MPLS systems made by Cisco, Juniper, Nortel and Riverstone. In conclusion, this paper deduces the future services and applications by LDP through these explanation and comparison.

A novel ID-based multi-domain handover protocol for mesh points in WMNs

  • Zhang, Xue;Li, Guangsong;Han, Wenbao;Ji, Huifang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2512-2529
    • /
    • 2015
  • Wireless mesh networks (WMNs) provide an efficient and flexible method to the field of wireless networking, but also bring many security issues. A mesh point may lose all of its available links during its movement. Thus, the mesh point needs to handover to a new mesh point in order to obtain access to the network again. For multi-domain WMNs, we proposed a new ID-based signcryption scheme and accordingly present a novel ID-based handover protocol for mesh points. The mutual authentication and key establishment of two mesh points which belong to different trust domains can be achieved by using a single one-round message exchange during the authentication phase. The authentication server is not involved in our handover authentication protocol so that mutual authentication can be completed directly by the mesh points. Meanwhile, the data transmitted between the two mesh points can be carried by the authentication messages. Moreover, there are no restrictions on the PKG system parameters in our proposed multi-domain ID-based signcryption scheme so our handover scheme can be easily applied to real WMNs circumstances. Security of the signcryption scheme is proved in the random oracle model. It shows that our protocol satisfies the basic security requirements and is resistant to existing attacks based on the security of the signcryption. The analysis of the performance demonstrates that the protocol is efficient and suitable for the multi-domain WMNs environment.

Building Light Weight CORBA Based Middleware for the CAN Bus Systems

  • Hong, Seongsoo
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.3 no.3
    • /
    • pp.181-189
    • /
    • 2001
  • The software components of embedded control systems get extremely complex as they are designed into distributed systems get extremely complex as they are designed into distributed systems consisting of a large number of inexpensive microcontrollers interconnected by low-bandwidth real-time networks such as the controller area network (CAN). While recently emerging middleware technologies such as CORBA and DCOM address the complexity of distributed programming, they cannot be directly applied to distributed control system design due to their excessive resource demand and inadequate communication models. In this paper, we propose a CORBA-based middleware design for CAN-based distributed embedded control systems. Our design goal is to minimize its resource need and make it support group communication without losing the IDL (interface definition language) level compliance to the OMG standards. To achieve this, we develop a transport protocol on the CAN and a group communication scheme based on the well-known publisher/subscriber model. The protocol effectively realizes subject-based addressing and supports anonymous publisher/subscriber communication. We also customize the method invocation and message passing protocol, referred to as the general inter-ORB protocol (GIOP), of CORBA so that CORBA method invocations are efficiently serviced on a low-bandwidth network such as the CAN. This customization includes packed data encoding and variable-length integer encoding for compact representation of IDL data types. We have implemented our CORBA-based middleware on the mArx real-time operating system we have developed at Seoul National University. Our experiments clearly demonstrate that it is feasible to use CORBA in developing distributed embedded control systems possessing severe resource limitations. Our design clearly demonstrates that it is feasible to use a CORBA-based middleware in developing distributed embedded systems on real-time networks possessing severe resource limitations.

  • PDF

A WDM/SCM Multiple Access Protocol Using Node Grouping for Passive Double Star Optical Networks (수동이중성형 광통신망에서 노드 그룹핑을 이용한 WDM/SCM 다중접속 프로토콜 설계)

  • Yu, Jin-Tae;Lee, Myeong-Mun;Kim, Yong-Beom;Park, Si-U;Park, Jin-U
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.9
    • /
    • pp.652-662
    • /
    • 2001
  • A WDM/SCM multiple access protocol suitable for optical double star networks is proposed. A node-grouping scheme is employed in the protocol, which is accomplished by connecting some nodes through passive star sub-hubs forming a group. The resulting multiple groups in a network are then connected through a central passive star hub resulting in a passive double star network. Each group is pre-assigned a WDM channel as its home channel, and SCM channels are used to identify the packet reception at each node. [n the proposed protocol, the average packet delay is remarkably reduced since the frame consists of the number of groups rather than the number of network nodes. Furthermore, additional reduction of the average packet delay is achieved by limiting the propagation paths of control packets to the roundtrip between source nodes and sub-hub using a double star network. It is shown in the performance evaluations using analytic and simulation model that the proposed protocol has the advantages of the higher channel utilization and excellent network throughput and average packet delay characteristic.

  • PDF

Development of Verification and Conformance Testing Tools for Communication Protocol (통신 프로토콜 검정기 및 적합성시험 도구 개발)

  • Seo Mi-Seon;Hwang Jong-Gyu;Lee Jae-Ho;Kim Sung-Un
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1119-1133
    • /
    • 2005
  • As a very important part in development of the protocol, verification and conformance test for protocol specification are complementary techniques that are used to increase the level of confidence in the system functions as prescribed by their specifications. In this paper, we verify the safety and liveness properties of rail signal control protocol type 1 specified in LTS with model checking method, and experimentally prove that it is possible to check for the deadlock, livelock and rechability of the states and actions on LTS. The implemented formal checker is able to verify whether properties expressed in modal logic are true in specifications using modal mu-calculus. We also propose a formal method on generation of conformance test cases using the concept of UIO sequences from verified protocol specification. The suggested tools are implemented by C++ language under Windows NT.

  • PDF

Multi Server Password Authenticated Key Exchange Using Attribute-Based Encryption (속성 기반 암호화 방식을 이용한 다중 서버 패스워드 인증 키 교환)

  • Park, Minkyung;Cho, Eunsang;Kwon, Ted Taekyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1597-1605
    • /
    • 2015
  • Password authenticated key exchange (PAKE) is a protocol that a client stores its password to a server, authenticates itself using its password and shares a session key with the server. In multi-server PAKE, a client splits its password and stores them to several servers separately. Unless all the servers are compromised, client's password will not be disclosed in the multi-server setting. In attribute-based encryption (ABE), a sender encrypts a message M using a set of attributes and then a receiver decrypts it using the same set of attributes. In this paper, we introduce multi-server PAKE protocol that utilizes a set of attributes of ABE as a client's password. In the protocol, the client and servers do not need to create additional public/private key pairs because the password is used as a set of public keys. Also, the client and the servers exchange only one round-trip message per server. The protocol is secure against dictionary attacks. We prove our system is secure in a proposed threat model. Finally we show feasibility through evaluating the execution time of the protocol.

Improvement of Service Location Discovery and Download Protocol in Wide Area Network (광역망에서의 서비스 위치 탐색 및 다운로드 프로토콜의 개선)

  • Huh, Duck-Haing;Kim, Han-Kyoung
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.55-62
    • /
    • 2011
  • To make service location protocol of IETF which is to be used in the wide area network to discover the location of desired service when computing resources are connected to the network, and to support simless connectivity between wired and wireless network in service viewpoint, to support the diversity trend of service agents in WIF, it needs to improve SLP, so as to add Liaison Agent and Forwarding Agent with FAAdvert message that is to communicate in between those entities. LA entity confirms the location of service located in wide area network, and FA transfers service information. The usage of existing messages such as SrvRqst, SrvRply, AttrRqst, AttrRply, DAAdvert, SrvReg, SrvAck, SrvDeReg is same as ever in wide area service network. The behaviors of improved protocol is modeled into petri-net and prove that it is free of deadlock and live-lock by execution of the model.

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Improved AODV Routing Protocol Considering the Link Quality of Wireless Transmission Environments (무선 전송환경의 링크품질을 고려한 개선된 AODV 라우팅프로토콜)

  • Lee, Tae-Hoon;Jeun, Sung-Woo;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1903-1911
    • /
    • 2016
  • As interest in MANET is increasing nowadays, research upon an efficient MANET routing protocol is actively under way. A LQA(Link Qualty Aware)-AODV routing protocol to deal with frequent changes of topology and wireless link variations under tactical operating conditions is proposed in this paper. The suggested LQA-AODV takes into account the channel capacity of each hop during the route request process of the traditional AODV protocol. In detail, LQA-AODV adds a channel capacity cost value to the RREQ message format that occurs during the routing process of the existing AODV Routing Protocol causing the accumulated channel capacity cost values of each sections to be compared before establishing a route. To verify the performance of LQA-AODV, NS2.35 was utilized and the Link-Quality Model was applied in order to reflect the tactical wireless environment. The simulation compares and analyzes LQA-AODV and the existing AODV, showing a large improvement over the traditional AODV in regards to the Packet Delivery Ratio, and End-to-End Delay.