• Title/Summary/Keyword: 동적 ID

Search Result 82, Processing Time 0.02 seconds

An Efficient Network Management technique in CAN-based Control Systems Using Combined Dynamic ID Allocation and Sampling Period Decision Algorithm (동적 ID 할당과 샘플링 주기 결정 기법을 결합한 CAN 기반 제어시스템의 효율적인 네트워크 관리기법)

  • Ki, Young-Hun;Ahn, Boung-Ju;Jeong, Gu-Min;Ahn, Hyun-Sik;Kim, Do-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.125-127
    • /
    • 2007
  • 현재 차량 내 네트워크에서 주로 쓰이는 CAN 프로토콜은 네트워크 내에 다수의 노드가 연결되어 동작하는 경우 우선순위가 낮은 메시지의 전송지연이 심각하게 발생할 수 있다. 이를 해결하기 위해 다양한 제어 방법들이 제안되어 시험되고 있는데, 본 논문에서는 동적 ID 차당 기법을 연로전지 하이브리드 자동차 네트워크 시스템에 적용하여 각 장치들간의 메시지 전송 지연문제를 해결 하며, 또한 이로 인해 발생하는 차량 내 네트워크 시스템의 수행 주기 변화의 문제점을 샘플링 주기 결정 기법을 이용하여 효율적으로 해결하였다.

  • PDF

A Design of XG-PON Architecture based on Next Generation Network Model for Supporting Dynamic Quality of Service (동적 QoS 지원을 위한 NGN 모델 기반 XG-PON 구조 설계)

  • Lee, Young-Suk;Lee, Dong-Su;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.59-67
    • /
    • 2012
  • In this paper, we designed an inter-operation architecture of 10G G-PON(Gigabit passive optical network) network and NGN(Next generation network) architecture. And, we proposed mechanism of dynamic GEM(G-PON encapsulation mode) Port-ID allocation. This is able to solve a problem of 10G G-PON inter-operation. The mechanism of dynamic GEM Port-ID allocation has OMCI(ONT management control and interface) mapping table for IP address and port number. That architecture is able to support per flow QoS(Quality of service) as well as QoS of NGN requirement. So that can improve the resource efficiency of QoS than the existing G-PON architecture.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

Development of an Image Segmentation Algorithm using Dynamic Programming for Object ID Marks in Automation Process (동적계획법을 이용한 자동화 공정에서의 제품 ID 마크 자동분할 알고리듬 개발)

  • 유동훈;안인모;김민성;강동중
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.726-733
    • /
    • 2004
  • This paper presents a method to segment object ID(identification) marks on poor quality images under uncontrolled lighting conditions of automated inspection process. The method is based on dynamic programming using multiple templates and normalized gray-level correlation (NGC) method. If the lighting condition is not good and hence, we can not control the image quality, target image to be inspected presents poor quality ID marks and it is not easy to identify and recognize the ID characters. Conventional several methods to segment the interesting ID mark regions fail on the bad quality images. In this paper, we propose a multiple template method, which uses combinational relation of multiple templates from model templates to match several characters of the inspection images. To increase the computation speed to segment the ID mark regions, we introduce the dynamic programming based algorithm. Experimental results using images from real factory automation(FA) environment are presented.

ID-based Authenticated Dynamic Group Key Agreement for TV-Content Service in Low-Power Mobile Enviroment (저 전력 모바일 환경에서 방송 콘텐츠 서비스를 위한 ID-기반의 인증된 동적 그룹 키 교환 프로토콜)

  • Choi, Kyu-Yung;Lee, Dong-Hoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2007.02a
    • /
    • pp.169-172
    • /
    • 2007
  • 최근 DMB 서비스와 같이 저 전력 무선 환경에서 유료 콘텐츠 서비스가 활발히 이루어지고 있다. 이러한 콘텐츠 서비스를 정당한 서비스 수신자에게 제공하기 위해서는 서비스 제공자와 수신자 사이에 안전한 키 교환이 필요하다. 본 논문에서는 모바일 콘텐츠 서비스를 위한 효율적 인 ID-기반의 그룹 키 교환, 즉 다수의 서비스 수신자들(클라이언트)과 서비스 제공자(서버) 사이의 인증된 동적 그룹 키 교환 프로토콜을 제안한다 제안한 프로토콜은 클라이언트의 계산량이 낮아 저 전력 모바일 환경에 적합하며, 또한 가입과 탈퇴 발생 시에도 효율적으로 키 교환을 수행할 수 있다. 제안한 그룹 키 교환 프로토콜은 랜덤 오라클 모델에서 그 안전성을 제공한다.

  • PDF

Influence of Ion-Nitriding on Dynamic Fracture Toughness in Cr Alloy Steels (크롬합금강의 동적파괴인성에 미치는 이온실화처리의 영향)

  • 오세욱;윤한기;장래웅;김기술
    • Journal of Ocean Engineering and Technology
    • /
    • v.2 no.1
    • /
    • pp.150-162
    • /
    • 1988
  • The dynamic fracture toughness, $K_{Id}$,is measured in the heat-treated and ion-nitrided Cr-Mo, Ni-Cr-Mo steel using standard and Precracked Charpy specimens an imstrumented impact machine. The value of $K_{Id}$and both the energy of initiate fracture, and the total energy of fracture. Since the $K_{Id}$values of the precraked impact specimens are in accord with their theoretical ones, this testing method is sufficently practical. The effect of ion-nitriding are found to be larger than the heat-treaded specimen.

  • PDF

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

Security Analysis of a Secure Dynamic ID based Remote User Authentication Scheme for Multi-server Environment (멀티서버를 위한 안전한 동적 ID 기반 원격 사용자 인증 방식에 대한 안전성 분석)

  • Yang, Hyung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.273-278
    • /
    • 2013
  • Recently, user authentication schemes using smart cards for multi-server environment have been proposed for practical applications. In 2009, Liao-Wang proposed a secure dynamic ID based remote user authentication scheme for multi-server environment that can withstand the various possible attacks and provide user anonymity. In this paper, we analyze the security of Liao-Wang's scheme, and we show that Liao-Wang's scheme is still insecure against the forgery attack, the password guessing attack, the session key attack, and the insider attack. In addition, Liao-Wang's scheme does not provide user anonymity between the user and the server.

Development of Dynamic ID Allocation Algorithm for Real-time Quality-of-Service of Controller Area Network (Controller Area Network 의 실시간 서비스 품질 향상을 위한 동적 ID 할당 알고리즘 개발)

  • Lee, Suk;Ha, Kyoung-Nam;Lee, Kyung-Chang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.10
    • /
    • pp.40-46
    • /
    • 2009
  • Recently CAN (Controller Area Network) is widely used as an in-vehicle networking protocol for intelligent vehicle. The identifier field (ID) of CAN is used not only to differentiate the messages but also to give different priorities to access the bus. This paper presents a dynamic 10 allocation algorithm in order to enhance the real-time quality-of-service (QoS) performance. When the network traffic is increased, this algorithm can allocate a network resource to lower priority message without degradation of the real-time QoS performance of higher priority message. In order to demonstrate the algorithm's feasibility, message transmission delays have been measured with and without the algorithm on an experimental network test bed.

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.