• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.033 seconds

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

An Implementation of Gateway System for Light-weight Ethernet Interface of Engine-part's Equipments of Small Vessels (소형 선박 기관부 탑재 장비의 경량화 이더넷 인터페이스를 위한 게이트웨이 시스템의 개발)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kim, Hyun-Woo;Shin, Il-Sik;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.115-122
    • /
    • 2017
  • Recently, the on-board equipments of vessels are getting diversifications with high technologies. With changing the trends, the shipboard network is turning to the light-weight ethernet architecture for integrated data management. For that necessity, this paper covers a development of the gateway system which gathers and processes the measured analog or NMEA data from loaded equipments to convert the messages based on IEC 61162-450 (standard for light-weight ethernet network of ships) in engine parts of small vessel. To do this, we analyzed the requirements for standardization of ship's equipments and related studies. To solve the problems of existing equipments, we defined the additional data formats (sentence formatter), developed the gateway system, and verified the utility of the developed system. Consequently, we established an interfacing framework for management and application of the generated data based on the ethernet in vessel.

Separated Control Signaling Protocol for WDM Optical Networks (파장 분할 다중화 방식을 사용하는 광 전송망을 위한 분리 제어 신호 방식)

  • No, Seon-Sik;Kim, Su-Hyeon;So, Won-Ho;Kim, Yeong-Cheon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.6
    • /
    • pp.1-11
    • /
    • 2000
  • In this paper, we propose a novel control signaling protocol that efficiently controls connection setup and increases the utilization of network resources. The proposed protocol, Separated Control Signaling Protocol(SCSP), separates bearer control from call control lot WDM optical networks. The main function of call control is to check the availability of network resources such as wavelengths and receivers at destination node. Bearer control is to reserve and assign wavelengths. The signaling architecture of this protocol consists of call controller and hearer controller The call controller handles call setup and release, activates the beater controller, and manages the status of call and bearer. The bearer controller reserves wavelengths, sets up bearer, tears down bearer. and notifies the status of beater to call controller. The state transition diagrams of each controller are designed. Using control messages and related primitives, the information flows for call setup and bearer setup, hearer teardown and call release, and reaction for setup failures are described to evaluate the performance. The simulation results show that the separated control signaling protocol is superior to conventional one in terms of call blocking probability and resource utilization.

  • PDF

Design and Implementation of ASTERIX Parsing Module Based on Pattern Matching for Air Traffic Control Display System (항공관제용 현시시스템을 위한 패턴매칭 기반의 ASTERIX 파싱 모듈 설계 및 구현)

  • Kim, Kanghee;Kim, Hojoong;Yin, Run Dong;Choi, SangBang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.89-101
    • /
    • 2014
  • Recently, as domestic air traffic dramatically increases, the need of ATC(air traffic control) systems has grown for safe and efficient ATM(air traffic management). Especially, for smooth ATC, it is far more important that performance of display system which should show all air traffic situation in FIR(Flight Information Region) without additional latency is guaranteed. In this paper, we design a ASTERIX(All purpose STructured Eurocontrol suRveillance Information eXchange) parsing module to promote stable ATC by minimizing system loads, which is connected with reducing overheads arisen when we parse ASTERIX message. Our ASTERIX parsing module based on pattern matching creates patterns by analyzing received ASTERIX data, and handles following received ASTERIX data using pre-defined procedure through patterns. This module minimizes display errors by rapidly extracting only necessary information for display different from existing parsing module containing unnecessary parsing procedure. Therefore, this designed module is to enable controllers to operate stable ATC. The comparison with existing general bit level ASTERIX parsing module shows that ASTERIX parsing module based on pattern matching has shorter processing delay, higher throughput, and lower CPU usage.

Hardware Fault Attack Resistant RSA-CRT with Parallel Support (오류주입 공격에 강건하며 병렬연산이 가능한 RSA-CRT)

  • Eun, Ha-Soo;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.59-70
    • /
    • 2012
  • RSA-CRT is one of the commonly used techniques to speedup RSA operation. Since RSA-CRT performs its operations based on the modulus of two private primes, it is about four times faster than RSA. In RSA, the two primes are normally thrown away after generating the public key pair. However, in RSA-CRT, the two primes are directly used in RSA operations. This led to hardware fault attacks which can be used to factor the public modulus. The most common way to counter these attacks is based on error propagation. In these schemes, all the outputs of RSA are affected by the infected error which makes it difficult for an adversary to use the output to factor the public modulus. However, the error propagation has sequentialized the RSA operation. Moreover, these schemes have been found to be still vulnerable to hardware fault attacks. In this paper, we propose two new RSA-CRT schemes which are both resistant to hardware fault attack and support parallel execution: one uses common modulus and the other one perform operations in each prime modulus. Both proposed schemes takes about a time equal to two exponentiations to complete the RSA operation if parallel execution is fully used and can protect the two private primes from hardware fault attacks.

An Integrated Processing Method for Image and Sensing Data Based on Location in Mobile Sensor Networks (이동 센서 네트워크에서 위치 기반의 동영상 및 센싱 데이터 통합 처리 방안)

  • Ko, Minjung;Jung, Juyoung;Boo, Junpil;Kim, Dohyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.65-71
    • /
    • 2008
  • Recently, the research is progressing on the SWE(Sensor Web Enablement) platform of OGC(Open Geospatial Consortium) to provide the sensing data and moving pictures collected in a sensor network through the Internet Web. However, existed research does not deal with moving objects like cars, trains, ships, and person. Therefore, we present a method to deal with integrated sensing data collected by GPS device, sensor network, and image devices. Also, this paper proposes an integrated processing method for image and sensing data based on location in mobile sensor networks. Additionally, according to proposed methods, we design and implement the combine adapter. This combine adapter receives a contexts data, and provides the common interface included parsing, queueing, creating unified message function. We verity the proposed method which deal with the integrated sensing data based on combine adapter efficiently. Therefore, the research is expected to help the development of a various context information service based on location in future.

  • PDF

A Study of the Similarities between Comic Subtitles on Korean Television and Visual Codes in Comics (커뮤니케이션 메시지의 생산과 수용에 대한 매체기호학적 연구를 위한 제언 : 한국 텔레비전의 자막 사용이 갖는 특성을 중심으로)

  • Ju, Hyeong-Il
    • Korean journal of communication and information
    • /
    • v.15
    • /
    • pp.75-115
    • /
    • 2000
  • In Korea, since the mid 1990s, the subtitles are largely employed on television programs especially on diverting programs like talk shows and game shows. The functions of these subtitles are different from those of the traditional subtitles. The traditional subtitles are used to give credits, explain an action, or represent dialogue, to be brief they are used to give informations. But the new type of subtitles are used to amuse the public. Not only the new subtitles represent words of the guests but also they present opinions or judgements of the program producer. They show also what to give attention to, what the guest feels and finally what to laugh at. These subtitles are very well received by the public. So they are employed more and more frequently by lots of programs. These subtitles will be ratted comic subtitles because their principal function Is to raise a laughter and to make fun. The purpose of this study is to attempt to find some particularities concerning the uses of the comic subtitles on Korean television. The study suggests that the comic subtitles call for the very known social codes because they should be understood clearly by the public. The forms and styles of the codes employed in the comic subtitles are very similar to those used in the comics. Some graphic codes especially developed in the comics are employed with success in the comic subtitles. The comic subtitles are aiming to amuse and provoke a laughter by written text and visual codes usually employed in the comics. But why does the program producer use the comic titles for make the public laugh? Laugh is not a emotional reaction but a act caused by the intellectual judgement. Written text and visual codes employed in the comic subtitles permit to judge the situation intellectually because they give to the public a moment for think about what they treat. They permit the public to see more clearly the situational relations which can provoke a laughter. The comic subtitles constitute now one of the main elements on Korean television. It means that the insertion of writing in the audiovisual media is popular in Korea. The study suggests that there is something in Korean culture which can favours this insertion : in Korea, writing has never been separated from painting. It seems that in Korea, there has been no clear separation between written culture and visual culture. But this point must be approached more carefully and needs profound researches.

  • PDF

Oriented Constructivism Class Operating System for Considering Interactions between Education Player (교육주체간 상호작용을 고려한 구성주의 기반 학급운영시스템)

  • Moon, Chang-Bae;Goh, Yo-Seop;Son, Chung-Ki;Ma, Ji-Sun;Cho, Jung-Won;Park, Jung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.454-462
    • /
    • 2010
  • The current curriculum in the 7th informatics, which simply highlights the use of applied programs rather than enhancing creativity through learning several principles in information science and thus making it hard to have optimism on the future as a powerhouse in IT. By diagnosing these problems, Education Ministry revised the existing curriculum to have a more scientific access to the informatics. However, the curricular revision fails to meet the needs of learners sufficiently because it tends to put the considerations of theoretical specialists before the learners them selves. This paper compares and analyzes the overall understanding of learners on informatics, current-curriculum and 7th revised curriculum and that of college-level, thus offering the student-centered one. Also, the research tries to bridge the opinion gap between developer and learner by looking into the understanding level of university majors about the current curriculum. In doing so, thesis may provide the basis on exploring new approaches and contribute to establishing 7th revised curriculum in school.

Development of Smart Phone Application for the Safe Operation of Inland Vessels (내수면 선박의 안전운항을 위한 스마트폰기반 어플리케이션 개발)

  • Jo, Byung-Wan;Lee, Yun-Sung;Kim, Do-Keun;Kim, Jung-Hoon;Kim, Kil-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.4
    • /
    • pp.442-454
    • /
    • 2016
  • Recently, due to the increment of national income and the living standard of citizens, the leasure business has been dramatically expanded. Among the business, inland water activities such as cruise tour or water taxi have drawn attention from the people. As more people come for a new pleasure, the frequency and the number of services continues to rise yet the safety of people values less recently. In fact, the number of relating accidents also has risen accordingly. In order to prevent such accidents in inland waters, the vessels' real time voyage data, the advanced warning system and the emergency rescuing system are required. In this paper, we have developed navigation guiding application for safety of passengers and vessels in inland waters. Navigation guiding applications not only provide Inland Electronic Navigational Chart(IENC) and vessel information but also allows communication between traffic service center and nearby vessels in case of an emergency situation. In order to implement Navigation guiding applications, developing Inland Electronic Navigational Chart was inevitable. Therefore, IENC of Han River, has developed based on measuring the water depth using multi-beam echo sounder system.

An Efficient Scheme for Electing Cluster Header and Second Header Using Remaining Electric Energy in Ad Hoc Networks (Ad Hoc 네트워크에서 잔여전력량을 이용한 효율적인 클러스터 헤더 및 보조 헤더 선출 기법)

  • Park, Hyeran;Kim, Wuwoan;Jang, Sangdong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.27-30
    • /
    • 2012
  • In the Cluster-Based Routing Protocol (CBRP) a cluster header in each cluster should be elected. The cluster headers consume energy much more than other nodes because they manage and operate all of mobile nodes in their cluster. The traditional CBRP elects a cluster header without considering the remaining electric energy of each node. So, there exists problems that the cluster header has short average lifetime, and another cluster header should be elected again frequently. In this paper, we propose the improved protocol which prolongs the lifetime of the cluster header, decreases of header re-elected problem, decreases of header re-elected problem and enhances the stability of the path. In order to achieve this, when a cluster header is elected in a cluster, the remaining electric energies of all the nodes are compared with one another, and the node with the highest energy is elected as the cluster header. Also, the node with the second highest energy is elected as the second header. If the elected cluster header is unable to perform the role of the cluster header because the remaining energy level goes low, it sends a beacon message to neighbor member nodes and the second header will serve as the cluster header.

  • PDF