• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.031 seconds

Wireless Sensor Networks have Applied the Routing History Cache Routing Algorithm (무선센서 네트워크에서 Routing History Cache를 이용한 라우팅 알고리즘)

  • Lee, Doo-Wan;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1018-1021
    • /
    • 2009
  • Wireless Sensor Network collects a data from the specific area and the control is composed of small sensor nodes. Like this sensors to after that is established at the beginning are operated with the battery, the operational duration until several years must be continued from several months and will be able to apply the resources which is restricted in efficiently there must be. In this paper RHC (rounting history cache) applies in Directed Diffusion which apply a data central concept a reliability and an efficiency in data transfer course set. RHC algorithms which proposes each sensor node updated RHC of oneself with periodic and because storing the optimization course the course and, every event occurrence hour they reset the energy is wasted the fact that a reliability with minimization of duplication message improved.

  • PDF

Advanced AODV Routing Performance Evaluation in Vehicular Ad Hoc Networks (VANET에서 Advanced AODV 라우팅 성능평가)

  • Lee, Jung-Jae;Lee, Jung-Jai
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1011-1016
    • /
    • 2020
  • Rapid change in network topology in high-speed VANET(: Vehicular Ad Hoc Network) is an important task for routing protocol design. Selecting the next hop relay node that affects the performance of the routing protocol is a difficult process. The disadvantages of AODV(: Ad Hoc On-Demand Distance Vector) related to VANET are end-to-end delay and packet loss. This paper proposes the AAODV (Advanced AODV) technique to reduce the number of RREQ (: Route Request) and RREP (: Route Reply) messages by modifying the AODV routing protocol and adding direction parameters and 2-step filtering. It can be seen that the proposed AAODV reduces packet loss and minimizes the effect of direction parameters, thereby increasing packet delivery rate and reducing end-to-end delay.

An intelligent surveillance technique based on Wifi CCTV (와이파이 감시 카메라기반 지능형 방범 서비스 기술)

  • You, Jin-Sun;Kwon, Il-Young;Park, Chul;Yang, Jung-Ho;Park, Soon-Yong
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.1425-1428
    • /
    • 2013
  • 이 기술은 CCTV의 본연의 목적인 범죄 예방을 좀 더 효과적이고 효율적으로 하기 위해 개발하였다. 먼저 사용 공간에 제약을 줄이기 위해 와이파이 기반의 CCTV를 사용하기로 하였다. 그리고 단순히 영상을 수집하는 것이 아니라 아래와 같은 알고리즘을 영상에 적용하여 범죄 예방을 위한 판단을 좀 더 빠르고 정확하게 할 수 있도록 하였다. 첫 번째로 배경에서 객체들을 분리한 뒤 각각의 객체들을 labeling하여 서로를 구분하였다. 그 후 특징점을 이용해 각 객체들을 추적한 뒤 객체마다 적당한 관심영역을 설정한다. 관심영역에서 색을 이용한 외부인 침입 감지기능과 객체의 속도와 방향을 이용한 폭력적인 행동 감지기능을 적용하였다. 더 나아가 사용자의 편의를 위해 서버/클라이언트 모델을 사용하여 외부인 침입이나 폭력이 감지되면 서버가 클라이언트에게 경고 메시지와 함께 현재 상태를 이미지로 보낼 수 있도록 하였고 클라이언트가 원한다면 언제든지 실시간 영상도 볼 수 있도록 하였다.

Analysis of Server's Computational Cost for Multicast Batch Rekeying Scheme (멀티캐스트 일괄 키 갱신 방법의 서버계산 비용 분석)

  • Park Chang-Seop;Lee Gyu-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.71-80
    • /
    • 2005
  • In the near future, various aplications on the Internet will be based on the multicast group communication, so that the efficient group key management is essential for managing the frequent group join and leave events. In this paper, we propose several batch rekeying schemes extended from conventional individual rekeying schemes, and analyze the efficiencies of them in terms of both the number of encryption and one-way hash function as well as multicast message size. Considering multiple member leaves, a probabilistic approach is need to compute the average computational amounts for rekeying.

A Study of Formalized Presentation of Worm based on time-based Behavioral sequences (시간적인 행동 패턴을 고려한 웜의 정형 표현 기법 연구)

  • Lee Min-Soo;Shon Tae-Shik;Cho Sang-Hyun;Kim Dong-Soo;Seo Jung-Taek;Sohn Ki-Wook;Moon Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.53-64
    • /
    • 2006
  • Worm analysis report currently produced by anti-virus companies closely resemble those of virus report and do not properly characterize the specific attributes of worms. In this paper, we propose formalized presentation method based on time-based behavioral sequences to more accurately characterize worms. we define a format based on the behavior and communication patterns that occur between an infected host and a target host. we also propose a method for presently worm analysis data with that format. We also compare our framework with analysis data provided by Symantec.

Three-Party Authenticated Key Exchange Protocol using Smartcards (스마트카드를 이용한 3자 참여 인증된 키교환 프로토콜)

  • Jeon, Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.73-80
    • /
    • 2006
  • Recently, Sun et el. proposed a three-party authenticated key exchange protocol using the public key of the server and the derived verifier from the Password of a user. This paper proposes a password-based three-party authenticated key exchange protocol using smartcards. Since the proposed protocol has very low computation cost by using XOR and hash function operation instead of the public key operation, and reduces the count of message transmission to 20% compared with the protocol of Sun et el., it can execute an effective authenticated key exchange. Furthermore, the proposed protocol is safe from password guessing attack by not saving passwords in the server, and it is also safe from server compromise attack because the server cannot know the shared session key between the two users.

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

The Fast and Secure Authentication Mechanism for Proxy Mobile IPv6 (고속의 안전한 Proxy Mobile IPv6 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.11-24
    • /
    • 2012
  • Without a proper protection mechanism for the signaling messages to be used for the mobility support in the Proxy Mobile IPv6 (PMIPv6), it is also vulnerable to several security attacks such as redirect attack, MITM (Man-In-The-Middle) attack, replay attack and DoS (Denial of Service) attack as in Mobile IPv6. In this paper, we point out some problems of previous authentication mechanisms associated with PMIPv6, and also propose a new fast and secure authentication mechanism applicable to PMIPv6. In addition, it is also shown that the proposed one is more efficient and secure than the previous ones.

A Research on Intercommunication Method for Tactical Information Among Heterogeneous Mobile Combat Vehicles (이종(異種)의 전투기동차량 간 전술정보 연동 방안 검토)

  • Choi, Il-Ho;No, Hae-Whan;Song, Choong-Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.187-195
    • /
    • 2022
  • Modern Battle Fields are covered with various weapon systems, such as tanks, infantry vehicles, or artillery vehilces. In such environment, it is important to take it into consideration what kind of efficient method should be developed to communicate with heterogeneous friend combat systems for the exchange of tactical information aqcuired because military operations require coordinated actions. For this purpose, we made a research on tactical information equipments such as Battlefield Management Systems(BMSs) equipped in multiple kinds of Mobile Combat Vehicles(MCVs). The exchange of tactical information could be divieded into separate domains, such as connectivity, messages, and recognition processes by operators. In this article, we will deal with wireless radio connectivity, KVMF messages, and User Interfaces showing shared data.

A Study on Middleware Design for Steel Production (철강공정을 위한 미들웨어 구조 설계)

  • Kim, Dohun;Hwang, Hwa-won;Shin, Kee-young;Choi, Ja Young;Ko, Jaehoon;Kim, Chee-ha
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1434-1437
    • /
    • 2010
  • 본 논문은 철강공정을 위한 미들웨어 구조를 제시하였다. 제안된 미들웨어는 커널 코어, 철강공정에 필요한 각 서비스 기능, 응용 소프트웨어와의 연결을 유지하는 채널 매니저, 응용 소프트웨어의 서비스 요구를 처리하는 API 핸들러, 미들웨어 사용 API로 구성된다. 제안된 미들웨어는 분산환경을 지원하며, 산업체에서 주로 사용되는 운영체제들을 지원하도록 구현하였다. 제안된 미들웨어에 대해 각 서비스의 성능이 측정되었으나, 지면상 본 논문에는 동기 메시지 서비스, 타이머 서비스의 성능만을 제시하였다. 또한 제안된 미들웨어를 철강공정 중 하나인 열간압연공정에 적용한 결과, 기존 상용 미들웨어를 사용한 환경에 비해 응답시간 성능이 30-35% 향상하였음을 보였다.