• Title/Summary/Keyword: 통신 프로토콜 설계

Search Result 1,577, Processing Time 0.036 seconds

Max-Win based Routing(MWR) Protocol for Maritime Communication Networks with Multiple Wireless Media (다중무선매체 해상통신망을 위한 최대승수기반 경로배정 프로토콜)

  • Son, Joo-Young;Mun, Seong-Mi
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1159-1164
    • /
    • 2010
  • The current maritime data communications mainly depend on radio and satellite which have restrictions on data rate and cost. That leads to needs of novel relatively-high-speed data communication systems at sea just like on land. This paper proposes a routing protocol (MWR) for newly designed model of ship-to-ship communication networks at sea. The MWR protocol finds out an optimal route by selecting an optimal network for each specific application from overlapped networks of available wireless media at sea.

Collision Avoidance System of Container Terminal Crossroad, using an Ad-hoc Network (Ad-hoc 네트워크를 이용한 컨테이너터미널 교차로에서의 충돌방지 시스템 설계)

  • Ha, Il-Ho;Do, Dae-Man;Hyun, Maeng-Hwan;Choi, Young-Bok
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.1079-1081
    • /
    • 2011
  • 컨테이너터미널 장치장 내 교차로에서 무인 YT(Yard Tractor)간 충돌방지를 위하여 RFID(Radio Frequency Identification) 태그와 ad-hoc 네트워크를 이용한 교차로 충돌방지 알고리즘을 제안한다. 또한 ad-hoc 네트워크 라우팅 프로토콜은 장치장 교차로에서 충돌방지를 위한 YT 간 통신성능을 결정하는 중요한 요소로써, 장치장 교차로 환경과 YT의 이동성을 고려하여 프로토콜을 결정해야 한다. 따라서 RFID 태그를 이용한 YT 위치정보와 AODV(Ad hoc On demand Distance Vector) 방식의 Hello 메시지를 이용해서 충돌방지를 위한 ad-hoc 네트워크 라우팅 프로토콜을 제안한다.

Design of a Lightweight Security Protocol Using Post Quantum Cryptography (양자내성암호를 활용한 경량 보안 프로토콜 설계)

  • Jang, Kyung Bae;Sim, Min Joo;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.165-170
    • /
    • 2020
  • As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.

A Study about Implementation Method of Multi-Interface Multi-Channel 2.4GHz Active RFID Reader Protocol (다중인터페이스 다중채널 2.4GHz 능동형 RFID 리더 프로토콜 구현방법에 관한 연구)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-Doek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1005-1014
    • /
    • 2010
  • When reader collect tags, we found that they tend to get together to specific interface in Multi-Interface Multi-Channel 2.4GHz Active RFID system. To solve this problem, we designed the LP-Combind and AP-Balanced protocol for load distribution between interfaces, then verified its superiority of the performance through the simulation. There are three problems to implement designed protocols in hardware of firmware-level. first, tag selects randomly the channel of reader and reader need the method which can change the channel of tags. second, reader has the synchronization problem between reader and tag. third, reader has problem that MCU of reader have to operate simultaneously dual interface. To slove this problems, we designed the message and implemented method for tag channel change and the protocol in order to adjust synchronization between reader and tag, Therefore, we compared and analyzed the performance of protocols by experiment. If LP windows size is same, the performance of LP-Combined protocol and AP-Balanced protocol which lower collision probability by its load distribution is more outstanding than single interface protocol performance.

A Secure Multicast Key Distribution Protocol (안전한 멀티캐스트 키분배 프로토콜)

  • 조현호;박영호;이경현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.152-156
    • /
    • 2001
  • In this paper we propose a secure multicast key distribution protocol using OFT(One-way Function Trees). The proposed protocol is a hybrid scheme of DKMP(Distributed Key Management Protocol) that guarantees all group member's participation for generating a group key, and CKMP(Centralized Key Management Protocol) that makes it easy to manage group key and design a protocol. Since the proposed protocol also computes group key using only hash function and bitwise-XOR, computational overhead ran be reduced. Hence it is suitably and efficiently adaptive to dynamic multicast environment that membership change event frequently occurs.

  • PDF

MAC Protocol for Single-Hop Underwater Sensor Network (싱글 홉 수중 센서 네트워크를 위한 매체접속제어 프로토콜 설계)

  • Baek, Seung-Kwon;Cho, Ho-Shin;Jang, Youn-Seon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.6
    • /
    • pp.499-505
    • /
    • 2009
  • Main design issues for MAC (Medium Access Control) protocol in underwater sensor networks are long propagation delay caused by the low speed of sound, difficult synchronization, and energy-limited node's life. We aimed to mitigate the problems of strict synchronization and channel inefficiency of TDMA and also the throughput degradation induced by unavoidable collisions in contention based MAC protocols. This proposed protocol improved not only the energy efficiency by adopting a sleep-mode, but also the throughput by reducing collisions and increasing channel efficiency.

Design of a Real-time Monitoring Protocol For Smart Ship-Area Network (지능형 선박용 백본 네트워크 기반에서의 실시간 모니터링 관리 프로토콜 설계)

  • Jung, Min-Young;Tak, Sung-Woo
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1795-1798
    • /
    • 2010
  • 본 논문에서는 TCP/IP (Transmission Control Protocol/Internet Protocol) 기반의 모니터링 및 관리 시스템인 단순 네트워크 관리 프로토콜(SNMP : Simple Network Management Protocol)을 분석하여 모니터링 관리 프로토콜 설계에서 고려되어야 할 요구 사항 및 성능인자를 기술하였다. 또한 선박 네트워크 장치의 장애 및 통신선의 절체와 같은 동시 다발적인 사고로 인한 결손에 효율적으로 대처하기 위한 장애 관리 기능과 앞선 요구사항 및 성능 인자를 고려 하여 선박용 백본 네트워크 기반에서의 실시간 모니터링 관리 프로토콜을 설계 하였다.

Design of Robust RFID Authentication Protocol Using AES Cipher Processor (AES 암호 프로세서를 이용한 강인한 RFID 인증 프로토콜 설계)

  • Nam-Ki Lee;Tae-Min Chang;Byung-Chan Jeon;Jin-Oh Jeon;Su-Bong Ryu;Min-Sup Kang
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1473-1476
    • /
    • 2008
  • 본 논문에서는 RFID 시스템의 Tag와 Reader 사이의 보안상의 문제점을 해결하기 위하여 공격에 강인한 AES 암호 프로세서 기반 인증 프로토콜을 제안한다. 제안한 인증 프로토콜은 Reader에서 난수를 생성하고 Tag와 Reader 그리고 Back-End Server의 인증과 통신 데이터를 암호화 하여 기존의 보안상의 문제점을 개선하고, ISO/IEC 18000-3 표준 프로토콜을 기반으로하여 확장된 패킷 구조를 사용한다. 제안한 시스템은 Xilinx ISE 9.1i 환경에서 Verilog HDL을 사용하여 설계하였으며, 설계 검증은 Mentor 사의 Modelsim 6.2c를 사용하여 제안된 시스템이 정확히 동작함을 확인하였다.

A Study on Conformance Test Tool of Communication Protocol for Railway Signaling Systems (철도신호용 통신 프로토콜의 적합성 시험도구 개발에 관한 연구)

  • Lee Jae-Ho;Hwang Jong-Gyu;Seo Mi-Seon;Kim Sung-Un
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.1418-1420
    • /
    • 2004
  • 비정형적인 방법에 의해 설계되어진 프로토콜은 불확실성과 오류를 내포하고 있을 수 있으며, 이러한 특성은 프로토콜의 안전성에 매우 심각한 영향을 미치게 된다. 또한 구형되어진 프로토콜 명세에 만족하게 구현되어졌는지를 확인하는 것 또한 프로토콜 엔지니어링에서 매우 중요한 부분이다. 즉, 프로토콜 명세의 정형검정과 적합성 시험은 프로토콜 개발 과정에서 매우 중요한 부분이다. 본 논문에서는 유한상태 레이블 천이시스템(LTS Labeled Transition System)으로 명세화된 철도 신호제어용 프로토콜 Type 1 모델에 대한 적합성 시험을 위하여 프로토콜 제어흐름을 IOFSM으로 모델링하였으며, 이 명세로부터 UIO 방법에 의한 적합성 시험계열 생성방법을 제시하였다. 또한, 프로토콜 검정 및 적합성 시험 방법을 실제 프로토콜의 정확성을 분석하는 데 사용할 수 있도록 프로토콜 검정기와 시험기를Windows 환경하에서 GUI기능에 의해 Window상에 구현되도록 하여 프로토콜 명세의 정확성을 평가할 수 있게 하였다.

  • PDF

VLSI Design and Implementation of Multimedia Transport Protocol for Reliable Networks

  • Jong-Wook Jang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.1 no.1
    • /
    • pp.21-33
    • /
    • 1997
  • This dissertation deals with the design and VLSI implementation of the MTP(Multimedia Transport Protocol) protocol for the high speed networks. High throughput, functional diversity and flexible adaptation are key requirements for the future transport protocol. However it is very difficult to satisfy all these requirements simultaneously. Fortunately, the future networks will be very reliable. It means that the future transport protocol will usually perform some fixed functions without the protocol state information. According to this concept, we proposed and designed the MTP protocol that is consisted of Information Plane and Control Plane. Information Plane performs some fixed functions that are independent of the protocol state information as far as no error. However Control Plane manages the protocol state information and controls the operation of Information Plane. Our MTP protocol was finally implemented as an FPGA chip using the VHDL. We built a testbed for verification of the implemented protocol, and it was shown that the MTP protocol worked correctly and made a throughput of about 800 Mbps. Our future works include the addition of multiplexing and multicasting capabilities to our protocol for multimedia applications.

  • PDF