• Title/Summary/Keyword: 메시지

Search Result 5,164, Processing Time 0.034 seconds

A four-way handshake for reliable key exchange mechanism (신뢰성 있는 키 교환을 위한 4 단계 핸드셰이크 연결 메커니즘)

  • Song, Tae ill;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.969-972
    • /
    • 2010
  • 유 무선의 망을 함께 사용하는 무선 단말기에서는 기존의 통신방법으로는 안전하지 못한 네트워크 환경에서의 메시지 교환의 무결성을 입증하기 어렵다. 기존 논문에서 제시한 인증메시지를 이용한 신뢰성 있는 키 교환에서는 안전하지 못한 네트워크 환경에서의 신뢰성있는 키 교환이 가능하나, 상대적으로 많은 메시지 교환 절차와 암호화로 무선단말기와 서버 사이의 통신에 단점을 가지고 있다. 본 논문은 안전하지 못한 네트워크 환경에서의 무선 단말기와 유선 서버사이의 신뢰성 있는 키 교환을 위해 상호 연결을 맺는 과정을 제시한다. 제안된 논문은 연결 요청단계, 인증 메시지 교환단계, 홉 카운팅 단계, 신뢰성 확인단계로 구성되어 있다. 연결 요청단계에서는 서버와 클라이언트 사이의 연결 요청이 이루어지며, 인증 메시지 교환단계는 인증 메시지를 이용해 상호간의 신뢰성 확인 및 Seed 값의 분배를 실시한다. 홉 카운팅 단계에서는 패킷의 TTL(Time to live)를 이용하여 메시지의 변조여부를 확인하며, 신뢰성 확인 단계는 카운팅된 값으로 메시지의 신뢰성여부를 판단하는 단계로 구성된다.

A Study on the Vehicle Safety Communication considering the vehicle moving direction (차량의 진행 방향과 속도를 고려한 차량 안전 통신 기법 연구)

  • Jo, Mi-Young;Jin, Yan;Kim, Kee-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.662-665
    • /
    • 2011
  • 차량 안전 통신(VSC : Vehicle Safety Communication)은 차량의 각종 통신 장치들을 이용하여 교통 정보 획득과 주변 차량 사이에서 정보 교환을 통해 차량의 안전을 도모하는 기법이다. VSC 기법에서는 도로 위에서 발생할 수 있는 사고를 미리 방지하기 위해 차량 간 경고 메시지를 사용한다. 차량 간 메시지를 전송하기 위해서 브로드캐스트 전송기법을 이용하게 되는데, 이는 각 차량 간 메시지 전송을 위한 연결이 이루어지지 않았기 때문이다. 이렇게 브로드캐스트 기법을 사용하게 되면 차량은 자신이 받은 메시지를 다른 차량에게 재전송하게 되고, 또 다른 차량 역시 해당 메시지를 재전송 하게 되어 전송되는 메시지의 수도 점차 증가하게 된다. 이러한 현상을 브로드캐스트 폭풍 현상이라 한다. 따라서 본 논문에서는 차량 간에서 발생되는 브로드캐스트 폭풍 현상을 줄이기 위해 차량의 진행 방향과 속도를 이용하여 메시지의 재전송 범위를 제한함으로써 재전송 메시지를 줄이도록 하는 기법을 제안하고자 한다.

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.

a study of expression of non-coded Message in Visual Image and Graphic User Interface (그래픽 유저 인터페이스와 비언어적 메시지 영상 표현의 관계)

  • Seo, Hyun-Seok;Kim, Hyun-Suk
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.281-285
    • /
    • 2008
  • In the digital media era, coded and non-coded communication are used to convey the message. As the computer interface has been adopted human communication methods, non-coded communication has bee used in the computer interface as well. The changes of message structure in the computer interface have an effect on shifting the way of user's message acceptance from passive to active. The recently developed computer user interfaces are for user to experience diverse visual effect The communication conveyed with this visual effects could be vague but user can conceive strong impact. This experience is understood not only through the visual experience from a monitor screen but also with a sense of tactile. The meaning of sensual and spectacle motion image could be ambiguous. However in the experience of using an interface, it plentifully expands the human sense by giving a visual experience on a whim. The sensually extemporaneous and splendid visual effect that has vague meaning has been very common happening in digital media environment.

  • PDF

Message Scheduling Algorithm for Hard Real-time Communications of Periodic Messages on a Switched Ethernet (스위칭이더넷에서 주기적 메시지에 대한 경성 실시간 통신을 위한 메시지 스케쥴링 알고리즘)

  • Kim Myung-Kyun;Lee Hee-Chan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.684-690
    • /
    • 2006
  • This paper proposes a message transmission model for hard real-time communications of periodic messages on a switched Ethernet and also proposes an algorithm to schedule the messages to be transmitted within their deadlines. The proposed scheduling algorithm is a distributed one and is peformed by the source and the destination nodes without the modification of the operational features of the standard Ethernet switch. When a new periodic message needs to be transmitted, it is first checked whether it can be scheduled on both the transmission and the reception links without affecting the already-scheduled messages, and a feasible schedule is made for the new message if it is schedulable. The proposed scheduling algorithm guarantees the transmission of periodic messages within their deadline and allows flexible message transmission on a hard real-time switched Ethernet through the dynamic addition of new periodic messages during run-time.

A Multi-Agent Message Transport Architecture for Supporting Close Collaboration among Agents (에이전트들 간의 밀접한 협력을 지원하기 위한 다중 에이전트 메시지 전송 구조)

  • Chang, Hai Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.3
    • /
    • pp.125-134
    • /
    • 2014
  • This paper proposes a multi-agent message transport architecture to support application areas which need fast message communications for close collaboration among agents. In the FIPA(Foundation of Intelligent Physical Agents) agent platform, all message transfer services among agents are in charge of a conceptual entity named ACC(Agent Communication Channel). In our multi-agent message transport architecture, the ACC is represented as a set of system agents named MTSA(Message Transfer Service Agent). The MTSA enables close collaboration among agents by supporting asynchronous communication, by using Reactor pattern to handle agent input messages efficiently, and by selecting optimal message transfer protocols according to the relative positional relationships of sender agents and receiver agents. The multi-agent framework SMAF(Small Multi-Agent Framework), which is implemented on the proposed multi-agent message transport architecture, shows better performance on message transfer among agents than JADE(Java Agent Development Environment) which is a well-known FIPA-compliant multi-agent framework. The faster the speed of message transfer of a multi-agent architecture becomes, the wider application areas the architecture can support.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

Retained Message Delivery Scheme utilizing Reinforcement Learning in MQTT-based IoT Networks (MQTT 기반 IoT 네트워크에서 강화학습을 활용한 Retained 메시지 전송 방법)

  • Yeunwoong Kyung;Tae-Kook Kim;Youngjun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.131-135
    • /
    • 2024
  • In the MQTT protocol, if the retained flag of a message published by a publisher is set, the message is stored in the broker as a retained message. When a new subscriber performs a subscribe, the broker immediately sends the retained message. This allows the new subscriber to perform updates on the current state via the retained message without waiting for new messages from the publisher. However, sending retained messages can become a traffic overhead if new messages are frequently published by the publisher. This situation could be considered an overhead when new subscribers frequently subscribe. Therefore, in this paper, we propose a retained message delivery scheme by considering the characteristics of the published messages. We model the delivery and waiting actions to new subscribers from the perspective of the broker using reinforcement learning, and determine the optimal policy through Q learning algorithm. Through performance analysis, we confirm that the proposed method shows improved performance compared to existing methods.

Design and Implementation of a Reusable and Extensible HL7 Encoding/Decoding Framework (재사용성과 확장성 있는 HL7 인코딩/디코딩 프레임워크의 설계 및 구현)

  • Kim, Jung-Sun;Park, Seung-Hun;Nah, Yun-Mook
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.96-106
    • /
    • 2002
  • this paper, we propose a flexible, reusable, and extensible HL7 encoding and decoding framework using a Message Object Model (MOM) and Message Definition Repository (MDR). The MOM provides an abstract HL7 message form represented by a group of objects and their relationships. It reflects logical relationships among the standard HL7 message elements such as segments, fields, and components, while enforcing the key structural constraints imposed by the standard. Since the MOM completely eliminates the dependency of the HL7 encoder and decoder on platform-specific data formats, it makes it possible to build the encoder and decoder as reusable standalone software components, enabling the interconnection of arbitrary heterogeneous hospital information systems(HISs) with little effort. Moreover, the MDR, an external database of key definitions for HL7 messages, helps make the encoder and decoder as resilient as possible to future modifications of the standard HL7 message formats. It is also used by the encoder and decoder to perform a well formedness check for their respective inputs (i. e., HL7 message objects expressed in the MOM and encoded HL7 message strings). Although we implemented a prototype version of the encoder and decoder using JAVA, they can be easily packaged and delivered as standalone components using the standard component frameworks like ActiveX, JAVABEAN, or CORBA component.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.