• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.032 seconds

The problem resolution algorithm in ESP protocol (ESP 프로토콜에서의 문제점 보완 알고리즘)

  • Lee, Yeong-Ji;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.189-196
    • /
    • 2002
  • IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to Provide data encryption, authentication and integrity in real transmission Packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that tome. This vague has many risks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrpty IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee more safe transmission on the public network.

A Fast Recovery Publish/Subscribe Scheme in Mobile Ad-hoc Environments (이동 애드혹 환경에서 빠른 복구를 지원하는 발행/구독 기법)

  • Moon, Sang-Chul;Ko, Yang-Woo;Lee, Dong-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.186-190
    • /
    • 2008
  • This paper analyzes previous work on publish/subscribe in mobile ad-hoc networks with respect to collaboration methods among distributed event brokers. Our experiments suggest that approaches building event delivery structures are suitable for a scenario where there are events of various types each of which is consumed by a few subscribers. However, these approaches based on independent periodic exchange of network topology information may fail to reflect the up-to-date information when building event delivery paths. For this reason they do not correctly recover a broken path caused by node mobility, which results in lower event delivery rates. This paper proposes a scheme for building and maintaining event delivery paths based on advertisements initiated by and hence propagated from the root node. This guarantees correct recovery of event delivery paths within each period. Our experiments show that, our proposed scheme gives a better event delivery ratio with lower overhead.

A Method of Test Case Generation using BPMN-based Model Reduction for Service System (BPMN기반의 모델 단축을 이용한 서비스 시스템의 테스트 케이스 생성 기법)

  • Lee, Seung-Hoon;Kang, Dong-Su;Song, Chee-Yang;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.595-612
    • /
    • 2009
  • The early test can greatly reduce the cost of error correction for system development. It is still important in SOA based service system. However, the existing methods of test case generation for SOA have limitations which are restricted to only web service using XML. Therefore, this paper proposes a method of test case generation using BPMN-based model reduction for service system. For minimizing test effort, an existing BPM is transformed into S-BPM which is composed of basic elements of workflow. The process of test case generation starts with making S-BPM concerning the target service system, and transforms the target service system into directed graph. And then, we generate several service scenarios applying scenario searching algorithm and extract message moving information. Applying this method, we can obtain effective test cases which are even unlimited to web service. This result is the generation of test case which is reflected in the business-driven property of SOA.

A study on a sequenced directed diffusion algorithm for sensor networks (센서네트워크용 Sequenced Directed Diffusion 기법 연구)

  • Jang, Jae-Shin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.889-896
    • /
    • 2007
  • Advances in wireless networking, micro-fabrication and integration, and embedded microprocessors have enabled a new generation of massive-scale sensor networks. Because each sensor node is limited in size and capacity, it is very important to design a new simple and energy efficient protocol. Among conventional sensor networks' routing protocols, the directed diffusion scheme is widely blown because of its simplicity. This scheme, however, has a defect in that sending interest and exploratory data messages while setting connection paths consumes much energy because of its flooding scheme. Therefore, this paper proposes a new sensor network routing protocol, called sequenced directed diffusion with a threshold control, which compromises the conventional directed diffusion scheme's defect and offers an energy efficient routing idea. With a computer simulation, its performance is evaluated and compared to the conventional directed diffusion scheme. Numerical results show that the proposed scheme offers energy efficiency while routing packets, and resolves ill-balanced energy consumption among sensor nodes.

Design and Implementation of Real-Time Management System for Efficient Operation of Motor Control Center (모터제어센터의 효율적인 운영을 위한 실시간 관리 시스템의 설계 및 구현)

  • Lee, Tae-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.247-253
    • /
    • 2008
  • In this paper, we describes the design and implementation of real-time management system for efficient operation via monitoring and control of MCC(Motor Control Center). The real-tine management system can be divided hardware(MCC panel) and software(management program). First, hardware is divided into load attaching motor and MCC components for working together control and data network. Second, software(management system) are consisted of communication interface, environment setting, data processing modules. The produced and implemented reduction model of MCC panel is pretested using m-PRO, iM-PRO devices, and HyperTerminal. For field test, MCC panel is tested by RS-232C/485, communication procedure in management system is certified by transmitting and receiving message using control command. By the experimental results, the implemented real-time management system can be used to operate MCC system.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

A Framework to Evaluate Communication Quality of Operators in Nuclear Power Plants Using Cosine Similarity (코사인 유사도를 이용한 원자력발전소 운전원 커뮤니케이션 품질 평가 프레임워크)

  • Kim, Seung-Hwan;Park, Jin-Kyun;Han, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.165-172
    • /
    • 2010
  • Communication problems have been regarded as one of the biggest causes in trouble in many industries. This led to extensive research on communication as a part of human error analysis. The results of existing researches have revealed that maintaining a good quality of communication is essential to secure the safety of a large and complex process system. In this paper, we suggested a method to measure the quality of communication during off-normal situation in main control room of nuclear power plants. It evaluates the cosine similarity that is a measure of sentence similarity between two operators by finding the cosine of the angle between them. To check the applicability of the method to evaluate communication quality, we compared the result of communication quality analysis with the result of operation performance that was performed by operators under simulated environment.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

Reagent storage management system using advanced sensors (첨단센서를 활용한 시약장 관리 시스템)

  • Jang, Jae-Myung;Lee, Jong-Won;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.790-791
    • /
    • 2016
  • The system used in the laboratory of chemistry and medical is management only by measuring the temperature inside the reagent management within and recording in handwriting. When you hold the reagent, it can not recognize in real time the problems that occur in the interior, an accident occurs. you can not find a use record reagent storage, a problem with the management of an efficient reagent can be generated. In this paper, we propose a reagent management system that leverages the embedded boards and sensors in the laboratory reagents effectively manage to resolve it. As a result, Converting the information of the reagent to the data using the NFC, the administrator can identify the reagent user to register and manage hazardous reagents. Converted by using the NFC information of the reagent to the data, the administrator can identify the reagent user to register and manage hazardous reagents, temperature, humidity, so that it can be controlled by utilizing the VOC sensor to. Also it is passes the message to the administrator in the event of a particular risk situation. This is believed to enable the effective administration in a laboratory reagent.

  • PDF

A Study on the Secure Key Escrow System (안전한 키 위탁 시스템에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.83-92
    • /
    • 1999
  • Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.