• Title/Summary/Keyword: 메시지 신뢰도

Search Result 433, Processing Time 0.021 seconds

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

Trust Discrimination Scheme Considering Limited Resources in Mobile P2P Environments (모바일 P2P환경에서 제한적인 자원을 고려한 신뢰성 판별 기법)

  • Choi, Minwoong;Ko, Geonsik;Jeon, Hyeonnwook;Kim, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.662-672
    • /
    • 2017
  • Recently, with the development of mobile devices and near field communication, mobile P2P networks have been actively studied to improve the limits of the existing centralized processing system. A peer has limited components such as batteries, memory and storage spaces in mobile P2P networks. The trust of a peer should be discriminated in order to share reliable contents in mobile P2P networks. In this paper, we propose a trust discrimination scheme considering limited resources in mobile P2P environments. The proposed scheme discriminates the trust of a peer by direct rating values using the rating information of the peer and indirect rating values by the other peers. The recent update time is included in the rating information. The proposed scheme reduces the redundant rating information by comparing the recent update times of the rating information. It is shown through performance evaluation that the proposed scheme reduces the number of messages and improves the accuracy of trust over the existing scheme.

Reliable Billing Schemes for Service Types in Mobile Communication Environments (이동통신 환경에서 신뢰할 수 있는 서비스별 과금 방법)

  • 김순석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1714-1725
    • /
    • 2003
  • In this paper we propose reliable billing schemes between users and contents providers where a user is provided value­added service for a paid contents using mobile terminals. Our schemes support various types of services such as short messages, bell sounds, images or music data transmissions, and games in mobile communication environments. Using hash chain method, we also reduced the computational overhead of mobile terminals and the volume of data transmitted between the user and the content provider. Content providers can save memory space because they don't need to store each user's usage evidence but still can charge.

Off-Line Electronic Payment Scheme using Smart Cards (스마트 카드를 사용한 오프 -라인 전자 지불 기법)

  • Kim, Jeong-Eun;Lee, Hyeong-U;Kim, Tae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1363-1372
    • /
    • 1999
  • 에이전트 기반 이동 컴퓨팅 환경에서 전자 상거래를 구현하기 위해 가장 필요로 하는 것은 안전한 지불 구조를 제공하는 것이다. 본 연구에서는 불확정 전송 기법 1,2 을 사용한 비대화형 엔티티 인증 기법과 Horster 기법 4,5 을 기반으로 메시지 복원 기능을 제공하는 공정 은닉 서명 기법을 제시한다. 또한 이를 직접 Brands가 제시한 오프-라인 전자 지불 시스템 3,6 에 접목한다. 인증 단계가 비대화형으로 수행되므로 이동 엔티티 인증에 효율적이고, 메시지 복원 기능을 갖고 공개 검증 기능을 제공하는 은닉 서명을 적용하기 때문에 카운터 방식을 사용한 스마트 카드 기반 전자 지불 시스템 6 에 효과적으로 적용할 수 있었다. 전자 화폐에 대해서 신뢰 센터에 의한 공정성 검토 기능을 추가로 제공하므로 전자 지불 시스템의 신뢰성을 향상시킬 수 있다.Abstract The primary requirements for realizing the electronic commerce in agent based mobile computing environments are to implement the compatible secure payment framework. In this paper, we propose both the non-interactive entity authentication scheme that is combined with oblivious transfer protocol 1,2 and the message recovery fair blind signature based on Horster scheme 4,5 . And these techniques are directly applied to the Brand's off-line electronic payment system 3,6 . As the authentication processes are done by non-interactive manner, we can also get efficiency for mobile entity authentication. Additionally, as the used signature scheme provides a message recovery function with publicly verifiable properties, it is efficiently applicable to a counter based off-line electronic payment scheme 6 based on the additional device like smart card. Therefore, we can enhance the reliability of proposed electronic payment system based on the publicly verifiable fairness in its electronic cash by a trusted judge.

Emergency Message Transmission Protocol using CSMA/TDMA in Medical Body Area Networks(MBANs) (Medical Body Area Networks(MBAN)에서 CSMA/TDMA를 이용한 긴급 메시지 전송 프로토콜)

  • Kim, Kyung-Jun
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.224-230
    • /
    • 2009
  • In the latest date, medical body area networks (MBANs) are emerging as a new technology for diagnosis the human body. MBANs in the health care fields are based on short-range and low-power (e.g. ubiquitous computing) among small-sized devices, and have been used by means of medical services. In this paper, we proposed an emergency message transmission protocol using carrier sense multiple access/time division multiple access in MBANs. This scheme focuses on dependability and power-efficiency. In order to increase the reliability of the transmission, this scheme modified a MCTA slot of IEEE 802.15.3 standard to a SR-MCTA slot. SR-MCTA slot is assigned by MBAN coordinator according to requesting terminal nodes. The method, having the priority of transmission, occurs a collision packet randomly. Results from this proposed solution revel that reservation-based TDMA medical body area network(MBAN) protocol for transmitting emergency message was improved in terms of transmission delay.

  • PDF

Low-Latency Beacon Scheduling Algorithms for Vehicular Safety Communications (차량간 안전 통신에서 짧은 지연시간을 보장하는 비콘 스케줄링 알고리즘)

  • Baek, Song-Nam;Jung, Jae-Il;Oh, Hyun-Seo;Lee, Joo-Yong
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.1
    • /
    • pp.19-28
    • /
    • 2011
  • The safety applications based on the IEEE 802.11p, periodically transmit the safety-related information to all surrounding vehicles with high reliability and a strict timeline. However, due to the high vehicle mobility, dynamic network topology and limited network resource, the fixed beacon scheduling scheme excess delay and packet loss due to the channel contention and network congestion. With this motivation, we propose a novel beacon scheduling algorithm referred to as spatial-aware(SA) beacon scheduling based on the spatial context information, dynamically rescheduling the beaconing rate like a TDMA channel access scheme. The proposed SA beacon scheduling algorithm was evaluated using different highway traffic scenarios with both a realistic channel model and 802.11p model in our simulation. The simulation results showed that the performance of our proposed algorithm was better than the fixed scheduling in terms of throughput, channel access delay, and channel load. Also, our proposed algorithm is satisfy the requirements of vehicular safety application.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

An Efficient Directional MAC Protocol for Vehicular Ad-hoc Networks (차량 Ad-hoc에서 효율적인 메시지 전달을 위한 지향성 MAC 프로토콜)

  • Ji, Soonbae;Kim, Junghyun;You, Cheolwoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.9-16
    • /
    • 2015
  • Quick and safe message transmission is an important research topic of vehicular ad hoc networks (VANET). Most studies assume that the periodic broadcast of beacon-frames between vehicles increases the safety of the driver. In this paper, we propose a medium access control (MAC) protocol and location-based clustering for the VANET to support reliable data transfer. In our proposal, the cluster heade (CH) manage the access and allocate the resources of the node. Our proposal uses simulation to confirm the reduction of the transmission delay and the collision rate of the signal.

A Semantic-based transaction protocol for guaranteeing transaction interoperability (트랜잭션 상호호환성 보장을 위한 시맨틱스 기반의 트랜잭션 프로토콜)

  • Gang Dong-U;Lee Sun-Jae;Kim Gwang-Su;Lee Jae-Yeol
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.258-264
    • /
    • 2006
  • 웹 서비스 기반의 비즈니스 프로세스 관리 시스템은 트랜잭션에 대한 신뢰도의 확보를 위하여 트랜잭션 관리가 필요하다. 트랜잭션 관리를 위한 여러 트랜잭션 프로토콜들이 제시되었지만, 다양한 프로토콜들은 서로간의 이질성으로 인해 비즈니스 프로세스 관리 시스템들 간의 상호호환을 저해한다. 이를 해결하기 위하여 본 연구에서는 시맨틱스 기반의 트랜잭션 프로토콜을 제안한다. 시맨틱스 기반의 트랜잭션 프로토콜은 상태와 메시지에 대한 정적 시맨틱스(Static Semantics)와 상태 전이에 관한 동작 시맨틱스(Operational Semantics)로 구성된다. 정적 시맨틱스는 프로토콜의 상태와 메시지를 Web Ontology Language(OWL)을 사용하여 온톨로지 기반으로 정의한 모델로서, 트랜잭션 프로토콜에 대한 상호 이해도를 높일 수 있을 것으로 기대된다. 동작 시맨틱스는 비즈니스 트랜잭션의 상태전이를 Abstract State Machine(ASM)으로 정의한 모델로서, 트랜잭션 실행에 대한 자동화와 체계적인 모니터링을 지원할 것으로 기대된다. 트랜잭션 프로토콜들간의 상호호환을 위하여 이러한 정적 시맨틱스와 동작 시맨틱스를 기반으로 하여 각 트랜잭션 프로토콜 및 중립 트랜잭션 프로토콜의 시맨틱스를 정의한다. 정의된 각 트랜잭션 프로토콜의 정적 시맨틱스는 중립 트랜잭션 프로토콜의 정적 시맨틱스와 온톨로지 기반의 매핑 관계를 형성한다. 중립 트랜잭션 프로토콜의 정적 시맨틱스를 매개로 한 온톨로지 매핑은 각 트랜잭션 프로토콜들 간의 상호호환을 지원할 것으로 기대된다.

  • PDF

Design and Implementation of Linear Protection Switching for Fast Restoration in Carrier-class Ethernet Networks (캐리어 이더넷 망에서 빠른 절체를 위한 선형 프로텍션 스위칭 기능 설계 및 구현)

  • Ahn, Kye-Hyun;Kim, Kwang-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.883-891
    • /
    • 2009
  • This paper proposes Ethernet linear protection switching technology in order to provide the SONET/SDH-like resiliency over Metro Ethernet Networks. The proposed design is made of an architecture with a control processor board and several data processing boards, where the control processor board is independent of data processing board, providing a flexible solution for carrier Ethernet system. However, it leads an increasing message delay between inter-processors. In this paper, we implement and confirm a restoration of failed transport connections withing 50 millisecond in spite of increasing message delay between the control processing board and data processing board providing carrier-class network survivability.