• Title/Summary/Keyword: protocol specification

Search Result 274, Processing Time 0.026 seconds

A Study on the Development and Standard Specification of Unmanned Traffic Enforcement Equipment for Two-Wheeled Vehicles (이륜차 무인교통단속장비 개발 및 표준규격 연구)

  • Byung chul In;Seong jun Yoo;Eum Han;Kyeongjin Lee;Sungho Park
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.126-142
    • /
    • 2023
  • The purpose of this study is to develop unmanned traffic enforcement equipment and standard specifications for the prevention of traffic accidents and violations of the two-wheeled vehicle laws. To this end, we conducted a review of the problems and new technologies of the currently operating unmanned traffic enforcement equipment on two-wheeled vehicles. And through a survey, the feasibility of introducing unmanned traffic enforcement equipment for two-wheeled vehicles and the current status of technology were investigated. In addition, the two-wheeled vehicle enforcement function was implemented through field tests of the development equipment, and the addition of enforcement targets and the number recognition rate were improved through performance improvement. Based on the results of field experiments and performance evaluation, performance standards for unmanned two-wheeled vehicle traffic enforcement equipment were prepared, and in the communication protocol, two-wheeled vehicle-related matters were newly composed in the vehicle classification code and violation items to develop standards.

Design and Implementation of RTLS based on a Spatial DSMS (공간 DSMS 기반 RTLS의 설계 및 구현)

  • Kim, Joung-Joon;Kim, Pan-Gyu;Kim, Dong-Oh;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.4
    • /
    • pp.47-58
    • /
    • 2008
  • With the recent development of the ubiquitous computing technology, there are increasing interest and research in technologies such as sensors and RFID related to information recognition and location positioning in various ubiquitous fields. Especially, a standard specification was required for compatibility and interoperability in various RTLS(Real-Time Locating Systems) according to the development of RTLS to provide location and status information of moving objects using the RFID Tag. For these reasons, the ISO/IEC published the RTLS standard specification for compatibility and interoperability in RTLS. Therefore, in this paper, we designed and im plemented RTLS based on the spatial DSMS(Data Stream Management Stream) for efficiently managing and searching the incoming data stream of moving objects. The spatial DSMS is an extended system of STREAM(STanford stREam datA Manager) developed by Standford University to make various spatial operations possible. RTLS based on the spatial DSMS uses the SOAP(Simple Object Access Protocol) message between client and server for interoperability and translates client's SOAP message into CQL(Continuous Query Language) of the spatial DSMS. Finally, we proved the efficiency of RTLS based on the spatial DSMS by applying it for the staff location management service.

  • PDF

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Implementation and Operation of Network Interface Module based on Mini- MAP Environment (Mini-MAP 환경에서 네트워크 접속장치의 구현과 시험 운영)

  • Lee, Min-Nam;Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.2
    • /
    • pp.263-271
    • /
    • 1994
  • Automation of production in modern manufacturing is based on the integration of the various stage of production process by means of processing system. Information processing and network interface are of fundamental importance in programmable device in industrial automation, as they essential in order to active integration in production lines. In this paper, TBC(token bus controller) in the Mini-MAP board performs the function of the MAC sublayer, The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation MAP 3.0 All the softwares are implemented under the real time executive for real time application of the Mini-MAP and they are loaded into PROMs at the network board. We tested the LLC functions to make use of a protocol analyzer for the token bus protocol. Also the MMS conformance test was carried out by exchanging primitives between a model system(including NIU) and a MMS product that had already passed the conformance the conformance test based on measurement method of network analysis.

  • PDF

An User Authentication Mechanism in the OSGi Service Platform Environment (OSGi서비스 플랫폼 환경에서의 사용자 인증 메커니즘)

  • 전경석;문창주;박대하;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.191-204
    • /
    • 2003
  • In the home gateway environment, several characteristics for the user authentication mechanism should be reflected separately from the existing distributed service environment. First, the platform of a home gateway is a component based system that its services are installed dynamically. Second, the convenience that user can use several services by authentication of once should be offered. Finally, the system resources of a home gateway are restricted. However, a user authentication mechanism that reflected these characteristics is not shown at the user admin service specification of the OSGi service platform.(OSGi is the representative standardization organization of hone gateway.) Also, there is no existing authentication protocol that satisfies these qualities at the same time. In this paper, we propose a new user authentication mechanism considering those characteristics for the home gateway environment. We also design and implement an independent authentication service bundle based on the OSGi service platform so that it can perform user authentication operations for each bundle service. We supplement and extend the Kerberos Protocol that can apply.

An Apache-based WebDAV Server Supporting Reliable Reliable Resource Management (아파치 기반의 신뢰성 있는 자원관리를 지원하는 웹데브 서버)

  • Jung, Hye-Young;Ahn, Geon-Tae;Park, Yang-Soo;Lee, Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.545-554
    • /
    • 2004
  • WebDAV is a protocol to support collaboration among the workers in geographically distant locations through the Internet. WebDAV extends the web communication protocol HTTP/1.1 to provide a standard infrastructure for supporting asynchronous collaboration for various contents across the Internet. To provide the WebDAV functionality in legacy applications such as web-based collaborative systems or document management systems, those systems need to be implemented additionally to handle the WebDAV methods and headers information. In this paper, we developed an Apache-based WebDAV server, named DAVinci(WebDAV Is New Collaborative web-authoring Innovation)which supports the WebDAV specification. DAVinci was implemented as a form of service provider on a mod_dav Apache module. Mod_day, which is an Apache module, is an open source module to provide WebDAV capabilities in an Apache web server. We used a file system for storing resources and the PostgreSQL database for their properties. In addition, the system provides a consistency manager to guarantee that both resources and properties are maintained without inconsistency between resources and their properties.

Implementation of an Ethernet Adapter for the G-PON TC Layer (G-PON TC 계층을 위한 이더넷 정합기의 구현)

  • Chung, Hae;Ahn, Eu-Kwang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.429-436
    • /
    • 2011
  • The G-PON is an efficient solution to implement the FTTH and have GEM frame to accomodate various protocols like Ethernet frames, IP packets, and TDM signals. Above all, the Ethernet is one of the most widely used 2nd layer protocol in the campus, the subscriber access, and the carrier service. So G-PON system has to provide an Ethernet interface with top priority. In this paper, we implement a gigabit Ethernet adapter based on Ethernet over GEM in the ITU-T G.984.3 to accommodate Ethernet protocol in the G-PON TC chip. The adapter maps each Ethernet frame to a single or multiple GEM frames and has several functions including generation of the GEM header, encapsulation of frames and the SAR. In particular, the adapter have converter (LUT) MAC address to port-ID which is a key to identify logical connections though it is not defined in specification but important. We implement the adapter with a FPGA and verify the functions of segmentation and reassembling, MAC address learning, and throughput with the logic analyzer and the Ethernet analyzer.

Comparative Analysis of Protocol Test Sequence Generation Methods for Conformance Testing (적합성시험을 위한 프로토콜 시험항목 생성방법의 비교분석)

  • Kim, Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.4
    • /
    • pp.325-332
    • /
    • 2017
  • In this paper, a survey of test sequence generation methods for testing the conformance of a protocol implementation to its specification is presented. The best known methods proposed in the literature are called transition tour, distinguishing sequence, characterizing sequence, and unique input/output sequence. Also, several variants of the above methods are introduced. Applications of these methods to the finite state machine model are discussed. Then, comparative analysis of the methods is made in terms of test sequence length. Finally, conclusions are given as follows. The T-method produces the shortest test sequence, but it has the worst fault coverage. The W-method tends to produce excessively long test sequences even though its fault coverage is complete. The problem with the DS-method is that a distinguishing sequence may not exist. The UIO-method is more widely applicable, but it does not provide the same fault coverage as the DS-method.

Implementation and Verification of TCP Congestion Control Algorithm using SDL (SDL을 이용한 TCP 혼잡제어 알고리즘의 구현 및 검증)

  • 이재훈;조성현;이태오;임재홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.214-227
    • /
    • 2003
  • Developing an application, it is difficult to catch an exact requirement with the conventional text-based method. It has also problems in verification and analysis at each developing stage. Therefore, if an adjustment is required with an error and change of requirement, a bad effect happen in the whole system. In this case, it also affect adversely on the developing cost and period. Meanwhile, if an analysis or verification is performed, the possibility of an error frequency reduces. Thus, not only is it easier to correct the error but also add an new requirement. This thesis embody a TCP/IP congestion control algorithm with SDL which provides automatically graphic interface, verification and analysis to each developing stage. Using SDL gave a clear representation embodiment in each developing stage and easiness of adjustment due to changing requirements or correcting errors. In addition, the stages of protocol have been certified in a simulation by verification of MSC and the results showed a possibility of developing a better TCP/IP protocol.

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.