• Title/Summary/Keyword: 전송지연

Search Result 2,391, Processing Time 0.03 seconds

Transmission Latency-Aware MAC Protocol Design for Intra-Body Communications (인체 채널에서 전자기파 전송 지연 특성을 고려한 다중 매체 제어 프로토콜 설계)

  • Kim, Seungmin;Park, JongSung;Ko, JeongGil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.8
    • /
    • pp.201-208
    • /
    • 2019
  • Intra-Body Communication (IBC) is a communication method using the human body as a communication medium. The fact that our human body consists of water and electrolyte allow such communication method could work and have strength in low-power. However, because the IBC directly affects to human body by using it as a medium, there was a lack of research in communication protocols of each communication layer. In this paper, we suggests MAC parameters which affects the performance of communication in human body channel, and propose new MAC protocol. Our results shows that our MAC is suitable for supporting high data rate applications with comparable radio duty cycle performance.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Analysis on the Effects of TRV and MOV in Real System with TCSC (TCSC가 적용된 실계통 시스템에서의 TRV와 MOV의 영향에 대한 분석)

  • Lee, Seok-Ju
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.2
    • /
    • pp.41-46
    • /
    • 2019
  • The application of series compensator in a power system affects other devices such as circuit breakers transient recovery voltage (TRV) problem. In this paper, we analyze the TRV effect on a line circuit breaker in the cases with and without thyristor-controlled series capacitor (TCSC) via simulation, and suggest an effective method to overcome the increase of TRV due to the TCSC installation. It also discusses the impact of proposed protection on metal oxide varistor (MOV). A 345 kV transmission line in Korea was selected as a study case. Grid system was modelled using PSCAD (Power Systems Computer Aided Design) / EMTDC(Electro Magnetic Transient Direct Current). The TRV was analyzed by implementing a short circuit fault along the transmission line and at the breaker terminal. The proposed protection scheme, the TRV satisfies the standard. However, the MOV energy capacity increased as the delay time increased. This result can solve the TRV problem caused by the expected transmission line fault in a practical power system.

Design and Implement of BACnet based Intelligent Building Automation Control System (모바일 카메라를 이용한 방송 시스템 설계 및 구현)

  • Park, Youngha;Seong, Kiyoung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1330-1336
    • /
    • 2021
  • Media sharing platform such as YouTube have grown significantly in the mobile environment. This is a platform that allows users to select and view broadcast programs that are only available on TV through network-connected PCs and mobiles, and share their media content to communicate. Currently, in the era where mobile and TV broadcasts can be viewed equally, there is a time difference between the video and real-time screen transmitted to TV and mobile, different from the actual situation.We want this time difference to be realized in the same way as the real time, and there is a need for a system that can broadcast in a free environment at any time. Therefore, in this paper, a broadcasting system was designed and implemented in a mobile environment. The result of reducing the delay time difference due to the improvement of the processing method was obtained.

Provably-Secure and Communication-Efficient Protocol for Dynamic Group Key Exchange (안전성이 증명 가능한 효율적인 동적 그룹 키 교환 프로토콜)

  • Junghyun Nam;Jinwoo Lee;Sungduk Kim;Seungjoo Kim;Dongho Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.163-181
    • /
    • 2004
  • Group key agreement protocols are designed to solve the fundamental problem of securely establishing a session key among a group of parties communicating over a public channel. Although a number of protocols have been proposed to solve this problem over the years, they are not well suited for a high-delay wide area network; their communication overhead is significant in terms of the number of communication rounds or the number of exchanged messages, both of which are recognized as the dominant factors that slow down group key agreement over a networking environment with high communication latency. In this paper we present a communication-efficient group key agreement protocol and prove its security in the random oracle model under the factoring assumption. The proposed protocol provides perfect forward secrecy and requires only a constant number of communication rounds for my of group rekeying operations, while achieving optimal message complexity.

Analysis of Forwarding Schemes for Push-based Information Service in Connected Vehicles over NDN (커넥티드 차량 엔디엔 네트워크 안에 푸쉬 기반 정보 서비스를 위한 전달 기법 분석)

  • Lim, Huhnkuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.280-285
    • /
    • 2021
  • When VNDN technology is used as a communication technology for infotainment application services of connected vehicles, it is possible to realize data-centric networking technology in which data is the subject of communication.Vehicle security attacks and hacks, performance degradation during long-distance data transmission, and frequent data loss It is possible to innovate the limitations of the current host-oriented Internet-based infotainment application service technology of connected vehicles. The data packet forwarding issue to deliver critical information data that is very sensitive to delay in the VNDN on a push-based basis to RSU (Road Side Unit), etc. is one of the issues to be solved for realizing VNDN-based application services. We comprehensively analyze existing forwarding techniques to support push-based data traffic under the environment, and compare and analyze each technique in terms of performance.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Feasibility Verification of Real-time Digital River Twin Model Implementation for Small Stream Risk Monitoring (소하천 및 저지대 침수 위험 감시를 위한 실시간 하천 디지털 트윈 모델 구현 가능성 검증)

  • Bong-Joo Jang;Intaek Jung;Sung-Sim Yoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.315-315
    • /
    • 2023
  • 급격한 기후변화에 기인하여 전 세계적으로 거듭되는 돌발홍수로 인한 피해가 급격히 증가하고 있는 실정이다. 우리나라에서도 최근 중소 규모의 하천 뿐 아니라 도시 생활하천, 도심지 저지대에서 갑작스런 홍수와 침수로 인해 많은 인명과 재산 피해를 경험하고 있다. 이런 문제를 인식하여 최근 정부차원에서 다양한 센서와 인공지능에 기반하는 많은 인프라 및 연구 투자가 이루어지고 있지만, 높은 설치 및 운영 비용과 우리나라의 복잡한 하천 환경 특성으로 인해 소하천이나 도심지 저지대에서는 그 효율성을 제대로 발휘하지 못하고 있다. 따라서 본 논문에서는 주변환경의 변화에 강인한 복합 센서단말을 통해, 하천 정보(유량, 유속, 수위 등)을 실시간 측정하고, 해당지역의 특성을 고려한 하천 또는 저지대의 위험도를 스스로 판단할 수 있는 기술을 제안한다. 또한, 본 논문에서는 제안한 저비용 초소형의 단말 장치로 지점의 하천 정보를 실시간 측정하여 IoT망을 통해 3차원 하천 디지털트윈 모델로 전달하여, 유속과 수위를 그대로 재연함으로써, 하천 침수 위험 감시의 효율성을 검증하였다. 3차원 DEM(Digital Elevation Models) 데이터와 실제 하천을 관측한 데이터를 이용한 디지털트윈 검증 결과, 데이터 전송 지연시간을 감안하여 3초 이내에 하천의 수위와 유속이 3차원 모델에 반영되는 것을 확인하였다. 이 결과로부터 열악한 환경에서도 실시간 하천 상황을 원거리에서 모니터링 할 수 있으며, 강우와 유출에 따른 하천 홍수 메카니즘을 새롭게 시뮬레이션할 수 있는 방법론을 제시할 수 있을 것으로 기대한다.

  • PDF

A Study on the Quality Improvement of Real-Time Earthquake Data (실시간 지진데이터 품질향상을 위한 연구)

  • Yoon, Jin-sub;Ryu, Se-hwan;Jeong, Ji-eun;Park, Ji-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.306-309
    • /
    • 2022
  • Recently, the frequency of earthquakes is rapidly increasing in Korea. As a result, concerns about earthquakes are increasing. Response and recovery in the event of an earthquake are also important, but it is necessary to identify management vulnerabilities in advance and perform prevention and preparation activities. K-water collects real-time earthquake data by operating an earthquake accelerator to manage facilities safe from earthquakes. In addition, real-time data is transmitted to external organizations. Therefore, various efforts are being made to improve the quality of data. In order to reduce the management vulnerability of the earthquake monitoring system in advance, high-quality data can be produced by minimizing the delay time of data collection and establishing a real-time quality analysis system and base for earthquake data using big data. Accordingly, it is expected to protect the lives and property of the people from earthquake disasters by securing dam safety management and high-quality earthquake data and providing rapid data to external institutions.

  • PDF

Node ID-based Service Discovery for Mobile Ad Hoc Networks (모바일 애드-혹 네트워크를 위한 노드 ID 기반 서비스 디스커버리 기법)

  • Kang, Eun-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.109-117
    • /
    • 2009
  • In this paper, we propose an efficient service discovery scheme that combines peer-to-peer caching advertisement and node ID-based selective forwarding service requests. P2P caching advertisement quickly spreads available service information and reduces average response hop count since service information store in neighbor node cache. In addition, node ID-based service requests can minimize network transmission delay and can reduce network load since do not broadcast to all neighbor node. Proposed scheme does not require a central lookup server or registry and not rely on flooding that create a number of transmission messages. Simulation results show that proposed scheme improved network loads and response times since reduce a lot of messages and reduce average response hop counts using adaptive selective nodes among neighbor nodes compared to traditional flooding-based protocol.