• Title/Summary/Keyword: protocol specification

Search Result 274, Processing Time 0.026 seconds

Worst-case Delay Analysis of Time-Triggered 802.15.4 for Wireless Industrial Environments

  • Kim, Hyun-Hee;Lee, Kyung-Chang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.3
    • /
    • pp.205-212
    • /
    • 2017
  • This paper focuses on worst-case delay analysis of the time-triggered IEEE 802.15.4 protocol to satisfy the industrial quality-of-service (QoS) performance. The IEEE 802.15.4 protocol is considered to be unsuitable for industrial networks because its medium access control method is contention-based CSMA/CA, which exhibits unstable performance with an unbounded delay distribution under heavy traffic. To avoid these limitations, this paper presents a time-triggered version of the nonbeacon-enabled network of IEEE 802.15.4 that relies on a time division multiplexing access (TDMA) method implemented in the application layer without any modification of specification. The timing analysis of this time-triggered IEEE 802.15.4 was executed, and the worst-case transmission delay was calculated. Based on this analysis, the time-triggered IEEE 802.15.4 is a promising alternative for wireless industrial networking.

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

  • Lim, Meng-Hui;Goi, Bok-Min;Lee, Sang-Gon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.822-839
    • /
    • 2011
  • Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.

The Formal Specification and Analysis of RADIUS security protocol over SSL using SPEAR (SPEAR를 이용한 SSL상의 RADIUS 보안 프로토콜 명세 및 분석)

  • 김일곤;이지연;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.880-882
    • /
    • 2002
  • 최근 사용자 정보의 안전한 정보 전송 및 네트워크 시스템의 안전성을 보장하기 위한 방법으로 각종보안 인증 프로토콜에 대한 연구가 진행 중에 있다. 그 중에서 AAA 는 다중 네트워크와 플랫폼에서 인증(Authentication), 권한 부여(Authorization), 자원 체크(Accounting)의 기능들을 제공하는 모든 프로토콜을 말한다. 이 논문에서는 AAA 프로토콜의 대표적인 예인 RADIUS(Remote Authentication Dial-in User Service)를 보안 프로토콜 디자인 및 분석 도구인 SPEAR(Security Protocol Engineering & Analysis Resource)를 이용해 SSL 상에서 동작하는 RADIUS 보안 프로토콜의 문제점 및 성능을 디자인 단계에서부터 분석하여 보안 프로토콜의 안정성을 보다 향상시키고자 하였다

  • PDF

A study on the implementation of MMS in Mini-MAP (Mini-MAP에서의 MMS 구현에 관한 연구)

  • Kim, H.;Kang, M. S.;Park, M.;Lee, S. B.;Kong, H. T.;Choi, M. S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.745-748
    • /
    • 1990
  • MMS (Manufacturing Message Specification) is a communications standard of MAP (Manufacturing Automation Protocol), which is a Network Protocol for Industrial Automation. In the environment of Mini-MAP, MMS is situated in the application layer and on the LLC (Logical Link Control) layer. In this paper, MMS software is implemented on the basis of ISO DIS 9506. The implemented software was tested with Token Passing Bus Network Interface Unit, which was designed in our laboratory and performs the actions of layer 1 and 2.

  • PDF

The Network Performance Analysis of Distributed Control System using Software Tool (분산제어시스템 통신망의 소프트웨어 시뮬레이션을 통한 성능 분석)

  • Jo, H.S.;Oh, E.S.;Park, D.Y.;Song, S.I.
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2292-2294
    • /
    • 2002
  • This paper presents the network of Distributed Control System(DCS) considering specification of nuclear power plant. The network is composed of field network, control network and information network. The protocol of control network is ring type and it is compared to ethernet type. This paper proposes the structure of DCS, the protocol of each network and analyzes the network traffic along data capacity of field network, control network, information network and the network performance. Network II.5 is used as traffic simulation tool.

  • PDF

A Study on the Implementation of a Message Transfer Protocol with Document Classification (문서의 등급을 고려한 메시지전송 프로토콜 구현에 관한 연구)

  • 신승중;김현수
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.67-82
    • /
    • 2000
  • In this paper we have developed a message transfer protocol, CMP, which improves MSP's message processing capability. The proposed method has taken into account document classification to improve the efficiency of message processing. The difference between the conventional MSP and CMP has been addressed. The CMP's performance has been shown by various experiments including number, alphabet, Korean letter, Chinese letter, music sound and compression file transmission. And security capability of both protocols has been compared based on the specification of FIPS 140-2. The CMP's overall performance is shown to be superior to that of MSP on the processing speed in the performance perspective and on the function of cryptographic module interface and cryptographic key management in the security perspective respectively.

  • PDF

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.

The Specification and Verification of On-Line Secure E-passport Protocols Using AVISPA (AVISPA를 이용한 On-Line Secure E-passport Protocol의 명세 및 검증)

  • Kim, Hyun-Su;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.746-749
    • /
    • 2010
  • 현재 전자여권은 미국을 중심으로 도입이 시작, 전 세계 36개국에서 발행되고 있으며 우리나라도 2008년 시작으로 비자 면제국 가입을 위한 기본 조건으로 전자여권 전환 작업이 진행되고 있다. 전자여권의 도입과 함께 지문 정보 저장에 대한 프라이버시 문제 및 전자여권 내 정보 보호의 문제 등이 대두 되고 있다. 전자여권에서 사용 되고 있는 프로토콜 중의 하나인 OSEP의 취약점 및 문제점을 사전에 알아내 개인 정보 유출을 미연에 방지할 수 있도록 정형 명세 및 검증 도구인 AVISPA를 사용하여 접근해 보았다. 본 논문에서는 AVISPA를 이용한 명세 및 검증을 통해 OSEP(On-Line Secure E-passport Protocol)의 취약점을 효과적으로 발견할 수 있는 방법을 제안한다.

Design of BSI Engine for Interoperability (기업간 상호운영성을 위한 BSI 엔진의 설계)

  • 오동근;이정훈;홍정선;정재우;김광훈;최성환;황재각;이용준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.163-165
    • /
    • 2003
  • ebXML은 단일한 방법으로 기업간 비즈니스 프로세스의 자동화를 지원할 수 있는 표준이다. 본 논문은 ebXML의 CPA(Collaboration Protocol Agreement) 및 BPS(Business Process Specification)에 정의된 내용에 따라 프로세스 자동화를 관리하는 BSI(Business Process Interface) 엔진의 주요 설계 내용을 기술한다. 고려 사항으로는 BPSS 1.05, CPA 2.0을 지원하였다.

  • PDF

Design of Spatial Data Synchronization System in Mobile Environment

  • Lee Hyejin;Kim Jinsuk
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.245-248
    • /
    • 2004
  • In this paper, we propose a framework for synchronization of spatial data between mobile devices and a server by using SyncML(Synchronization Markup Language) that is standard specification for synchronization protocol. We used GML (Geographic Markup Language) to support interoperability of spatial data between various data sources. We also used metadata and catalog service to access and integrate distributed spatial data, considering relationships of spatial data and non-spatial data.

  • PDF