• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.026 seconds

Design of The High-Level Architecture of Mobile Integration SNS Gateway and The MQTT Based Push Notification Protocol (모바일 통합 SNS 게이트웨이의 상위 구조 및 MQTT 기반의 푸시 알림 프로토콜 설계)

  • Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.344-354
    • /
    • 2013
  • In this paper, In order to solve the traffic of the SNS to be executed on smartphone, we propose the design of the SNS integrated gateway server. Also, we capture the payload size in a variety of methods to send the MQTT protocol and QoS level of MQTT protocol for communication between the client and the Gateway. And we present the results and analysis of packet loss and end-to-end delay. By using analysis proposed, we present the results of the integrated SNS Gateway push notification protocol design.

A Study on Cooperative-Intelligent Transport System Attack Scenarios and their Prevention and Response Mechanisms (C-ITS 공격 시나리오와 예방 및 대응 방안 연구)

  • Jang, Yoonsuh;Lee, Dong-Seob;Lim, Dong-Ho;Ahn, So-Hee;Shin, Jeonghoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.6
    • /
    • pp.133-140
    • /
    • 2015
  • C-ITS is a system that uses bidirectional communication between two vehicles or infrastructures to control traffic more conveniently, and safely. If C-ITS security is not properly prepared, it can cause traffic congestions and fatal traffic accidents, and therefore can affect greatly on the driver's life. This paper proposes the prevention and response mechanisms based on the cyber attack scenarios that can be used to attack C-ITS.

A Design of Encryption System Using XML Signature in Mobile Environment (모바일 환경에서의 XML 전자서명을 이용한 암호화 시스템 설계)

  • Sung, Kyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.4
    • /
    • pp.61-66
    • /
    • 2004
  • Electronic commerce that use Mobile Phone according as the radio Internet develops rapidly and performance of Mobile Phone develops is activated. It is said that electronic commerce that use these Mobile Phone is M-Commerce. Also, the most important controversial point is data security or an user certification technology at these electronic commerce, there are research reactor WPKI and WTLS about this technology. However, when transmit message again after sign electronic documents in Mobile Phone, if do not encrypt, danger exists to be exposed to outside. Therefore, in this paper, designed system to encipher document that handle and handles user certification applying XML electronic sign technique in Mobile environment. Prevent of XML electronic sign in Mobile environment through this paper, and can stave off danger from outside by enciphering electronic sign document.

  • PDF

A Case Study on Using Interactive Media of Large Space Structure (대공간구조물의 Interactive Media 적용 사례 분석)

  • Kim, Sic;Yoon, Sung-Won
    • Journal of Korean Association for Spatial Structures
    • /
    • v.11 no.4
    • /
    • pp.71-78
    • /
    • 2011
  • Interactive media are applied to inner and outer space of small public space to enhance for the interaction between the spectator and works, also widely used in the exterior wall by LED and projector for advertisement. In the other hand, case studies of interactive media for large space have not less accomplished than those of buildings and public spaces. Thus, these studies analyzed 11 large structure examples by display, content, interface, and technology device by comparison of those cases of ordinary building public space. First interactive media for large space are found to be contents(39%), and next one is play(27%), advertisement(17%) and message(17%).

Two-Tier Coordinated Checkpointing Algorithm for Cellular (셀룰라 네트워크를 위한 조정된 2-계층 체크포인팅 알고리즘)

  • 변계섭;김재훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.10A
    • /
    • pp.1615-1624
    • /
    • 2001
  • 이동 컴퓨팅 환경에서는 충분하지 못한 자원으로 인해 기존의 분산 알고리즘이 비효과적인 경우가 많다. 특히 이동 호스트의 낮은 가용성으로 인하여 중단 없는 서비스를 보장받기 힘들다. 이들의 원인은 낮은 대역폭과 호스트들의 이동성, 작은 저장장치 및 안전하지 않은 저장장치, 이동 호스트와 이동 호스트, 이동 호스트와 기지국간의 통신 오버헤드 그리고 충분하지 못한 배터리 수명들을 들 수 있다. 특히 통신 오버헤드(이동 호스트를 찾는 오버헤드, 이동 호스트의 정보를 저장하는 오버헤드 등)로 인해 호스트의 배터리 수명을 단축시키고 통신비용을 증가시킨다. 이러한 통신 오버헤드를 최소화함으로써 이동 호스트의 배터리 수명이나 고장으로부터 좀 더 안전한 시스템을 구성할 수 있다. 본 논문에서는 셀룰라 네트워크를 기반으로 하는 이동 컴퓨팅 환경에서 통신비용과 이동 호스트의 작업을 최소화시키는 조정된 2-계층 체크포인팅(coordinated checkpointing) 알고리즘을 제안하고 수학적으로 비용을 분석하였으며 기존 알고리즘과 성능을 비교하였다. 기존의 조정된 체크포인팅 알고리즘에서 통신비용(메시지 수)의 복잡도는 이동 호스트의 수의 제곱(O(n$^2$))이지만, 제안한 알고리즘은 기지국의 수 더하기 이동 호스트의 수의 제곱(O(n+$m^2$))이다. 일반적으로 기지국의 수에 비해 이동 호스트의 수가 상대적으로 훨씬 많기 때문에 (n>>m) 기존의 알고리즘에 비해 제안한 알고리즘은 상대적으로 많은 통신비용을 감소시킬 수 있다.

  • PDF

Power control protocol for reduction of energy consumption in Wireless Sensor Netoworks (무선 센서 네트워크 환경에서 노드의 에너지 소비 절감을 위한 파워 제어 프로토콜)

  • Han Jung-ahn;Kim Yn-hyng;Kim Byung-gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.28-36
    • /
    • 2005
  • Wireless Sensor Networks are the technology, in which various applications such as surveillance and information gathering are possible in the uncontrollable area of human. And numerous studies are being processed for the application of ubiquitous network environment. One of major issues in sensor network is the research for prolonging the lifetime of nodes through the use of various algorithms, suggested in the mac and routing layer. In this paper, aiming at reducing energy waste, caused by redundant transmission and receipt message, we propose the mac protocol using active signal and analysis performance through simulation.

Relational MANET Autoconfiguration Protocol(RMAP) for Mobile Ad Hoc Networks (Mobile Ad Hoc Network에서의 Relational MANET Autoconfiguration Protocol (RMAP))

  • Ra Sang-joon;Lee Su-kyoung;Song Joo-seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.349-354
    • /
    • 2005
  • Several IP autoconfiguration techniques for MANET have been proposed by this time. But most of them concentrate on dealing with address duplication, so they have problems with latency and inefficient address space utilization. In this paper, we proposed a new IP autoconfiguration technique, namely Relational MANET Autoconfiguration Protocol(RMAP). This technique distributes IP addresses effectively by exchanging messages and recovers IP addresses by applying parent-child relationship. Simulation experiments are conducted to demonstrate the enhancement of the proposed algorithm over other known algorithms regarding latency, uniform distribution, and IP address recovery ratio.

Location-based Routing Mechanism for Route Discovery (Low-Rate WPAN에서 경로탐색을 위한 위치기반 라우팅 메카니즘)

  • Lee, Jae-Jo;Heo, Joon;Hong, Choong-Seon;Lee, Dae-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9B
    • /
    • pp.808-817
    • /
    • 2004
  • Many researchers are now working in the Low-Rate WPAN environment. Low-Rate WPAN has as its goal the enhancing computer use by making many sensors available throughout the physical environment, but making them effectively invisible to the user. Low-Rate WPAN environment consists of wireless sensor devices that may move often. Movement of hosts results in a change in routes and the need of some mechanism for determining new routes. This paper suggests an approach to utilize location information to improve performance of a routing mechanism for Low-Rate WPAN Environment. Accordingly, we proved that the proposed mechanism results in a significant reduction in a number of routing messages when comparing with existing mechanisms.

Mobile WiMAX 보안 이슈와 해결 방안

  • Son, Tae-Sik;Choe, Uk;Choe, Hyo-Hyeon
    • Information and Communications Magazine
    • /
    • v.24 no.11
    • /
    • pp.5-13
    • /
    • 2007
  • 광대역 무선 접속 표준을 관장하는 IEEE 802.16 워킹 그룹은 IEEE 802.16 표준을 2004년에 발표하였으며 이 IEEE 802.16 표준안에는 현재 WiMAX(Worldwide Interoperability for Microwave Access)라 불리는 고정 및 저속 이동 접속에 대한 광대역 무선 통신 지원 기술이 포함되어 있다. 특히 여러 기술 중 보안 관점에서 IEEE 802.16 표준은 MAC 계층 안에 PKM(Privacy Key Management)라고 불리는 Security Sub-layer를 가지고 있다. PKM은 PKMv1과 PKMv2로 구분되며, 먼저 PKMv1은 기본적인 인증 및 기밀성 기능을 제공하고 IEEE 802.16 표준에 기본적으로 적용되어있다. 하지만, IEEE 802.16 표준 이후 많은 연구들이 PKMv1의 보안성에 대하여 의문을 제기하였고 이에 따라 IEEE 802.16 표준안의 확장 개선안으로서 완전한 이동성을 바탕으로 하는 2005년 발표된 IEEE 802.16e 표준안에서는 향상된 보안 기능을 제공하는 PKMv2를 제공하며 기존 표준안의 부족한 점을 보완하기 위하여 시도하였다. 이러한 PKMv2는 EAP(Extensible Authentication Protocol) 인증, AES(Advanced Encryption Standard) 기반 기밀성 제공 알고리즘, CMAC/HMAC(Cipher/Hashed Message Authentication Code)을 사용한 메시지 인증 기능 제공 등 보다 다양한 보안 기능을 제공하였다. 그러나 IEEE 802.16e 표준안의 보안 기능은 SS(Subscriber Station)과 BS(Base Station)간의 통신구간 보안에 초점을 맞추어서 네트워크 도메인간의 보안 문제나 핸드오버시 보안과 같은 네트워크 구조적 보안 취약성을 여전히 가지고 있다. 하지만 표준안에서 정의하고 있는 SS와 BS 구간 보안 역시 완전한 솔루션을 제시하고 있지는 않다. 본 논문에서는 이러한 취약성을 고찰하고 그에 따른 대응방안을 제시하였다.

A Study on the Design of Computer Game as a Communication Design (커뮤니케이션 디자인으로서의 컴퓨터게임 디자인)

  • 서승택
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.147-154
    • /
    • 1999
  • This is a suggestional thesis for fu. ;her study on computer game design. We can understand the computer game design as a new form of communication design.The particular qualities of computer game as communication is: 1. computer game is not a mere recording of past events but a creative reproduction by the player.; 2. its production procedure is a multiple structure of program engineering and multimedia design. Computer game design should be more than just production of visual image or technical results. It could be the design of "fields for training of identity".ity".uot;.

  • PDF