• 제목/요약/키워드: 프로토콜분석

Search Result 2,984, Processing Time 0.031 seconds

SNMPv3 Security Module Design and Implementation Using Public Key (공개키를 이용한 SNMPv3 보안 모듈 설계 및 구현)

  • Han, Ji-Hun;Park, Gyeong-Bae;Gwak, Seung-Uk;Kim, Jeong-Il;Jeong, Geun-Won;Song, In-Geun;Lee, Gwang-Bae;Kim, Hyeon-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.122-133
    • /
    • 1999
  • Uses can share information and use resources effectively by using TCP/IP-based networks. So, a protocol to manage complex networks effectively is needed. For the management of the distributed networks, the SNMP(Simple Network Management Protocol) has been adopted as an international standard in 1989, and the SNMPv2 in which a security function was added was published in 1993. There are two encryption schemes in SNMPv2, the one is a DES using symmetric encryption scheme and the other is a MD5(Message Digest5) hash function for authentication. But the DES has demerits that a key length is a few short and the encryption and the authentication is executed respectively. In order to solve these problems, wer use a RSA cryptography in this paper. In this paper, we examine the items related with SNMP. In addition to DES and MD5 propose in SNMPv3, we chance security functionality by adopting RSA, a public key algorithm executing the encryption and the authentication simultaneously. The proposed SNMPv3 security module is written in JAVA under Windows NT environment.

  • PDF

Performance Analysis of Peer Aware Communications with CSMA/CA Based on Overhearing (Overhearing을 적용한 CSMA/CA 기반 대상인식통신 성능 분석)

  • Lee, Jewon;Ahn, Jae Min;Lee, Keunhyung;Park, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.251-259
    • /
    • 2014
  • In this paper, we propose Low Energy Service Discovery (LESD) protocol for common discovery mode of IEEE 802.15.8 Peer Aware Communications (PAC). In order to minimize power consumption, Basic Repetition Block (BRB) is defined. Device is able to select operating mode and synchronize other devices through it. Proposed MAC procedure is Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) based on overhearing technique. Even if device has not been received response signal since transmitted request signal, it is able to discover other devices of same group through the overhearing technique. IEEE 802.15.8 PAC has required that performances of common discovery mode are presented about discovered devices during the simulation time, discovery latency and average power consumption. By considering the number of devices per group and channel environment, two scenarios are evaluated through system level simulation and the simulation results of proposed scheme are compared with CSMA/CA in same simulation conditions. As a result, proposed scheme is able to get high energy efficiency of devices as well as increase the number of discovered devices during simulation time when the longer the number of devices is distributed over a limited area.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

Event-Related Potentials of a Monosyllabic Word (단음절 단어의 사건 관련 전위)

  • Min, Byoung-Kyong;Kim, Myung-Sun;Yoon, Tak;Kim, Jae-Jin;Kwon, Jun-Soo
    • Proceedings of the Korean Society for Cognitive Science Conference
    • /
    • 2002.05a
    • /
    • pp.211-215
    • /
    • 2002
  • 본 실험은 종합적 인지과정을 추론할 수 있는 결합 문제(binding problem)를 언어적인지 과정을 통해 알아 본 실험으로, 총 10 명(남:61여:4, 평균나이:24.40 $\pm$ 1.35)의 정상군을 대상으로, 4개의 음소로 이루어진 단음절 명사를 목표 자극(target stimulus)으로 하고, 4개 음소의 임의적인 조합으로서 글자를 이루지 못하는 비목표 자극(non-target stimulus)을, 각각 200 회와 800 회씩 시각적으로 0.5초씩 무작위로 제시하여 128 채널 고밀도 사건관련전위(ERP)를 측정하였다. 이번 실험 결과의 주요 특징은 글자가 아닌 비목표 자극보다 글자인 목표 자극에서 두드러지게 나타난 두정엽 부근의 P500 과 N900 이라고 할 수 있다. 자극 제시 비율의 차이에서 오는 oddball 효과로 인한 기존 P300 의 인지적 의미를 이번 결과의 P500 이 함축한다고 볼 수 있으며, 단음절 단어를 인지할 때, 글자임을 인식하는 순간은 의미적인지 과정이 진행되었다기보다 그 글자의 형태만으로 낯익은 글자인지를 분간하는 것으로 보인다 따라서, 이 경우 기존 언어 실험에 자주 등장하던 의미론적 peak 인 N400 은 보이지 않고, 곧바로 형태적이고, 통사적(syntactic)인 인지 처리 과정인 P500이 나타났다고 해석할 수 있다. 하지만, 이번 실험에서는 N400 대신에 N900 이 나타났다. 이 결과는 이번 ERP 실험과 병행된 프로토콜 분석을 통해, 피험자가 자극 제시 후, 약 900ms 정도에, 이미 제시되고 사라진 글자 자극을 다시 한번 떠올리는 인지 과정이 일어난다는 점과 관련 지어 해석하면, 기존에 의미적(semantic) 인지 과정으로만 해석했던 negative-peak 를 생각(thinking)과 같은 내재적인지 과정(internal cognitive process)으로 확장하여 일반화하는 추론도 생각해 볼 수 있다. 요컨대, 언어인지를 통한 이번 실험을 통해, 뇌파에서 검출되는 negative-peak 은 internal cognitive process로 추측되고, positive-peak 는 external cognitive process 라고 생각된다. 덧붙여, 유의해서 볼 점은 각 peak-topology 에서 Cz 의 진폭이 Fz 보다 크게 나온 점과, 일반적으로 언어 기능을 담당한다는 좌측 측두엽(T7)이 우측(T8)보다 통계적으로 더 유의미한 차이를 보였다는 점등이다.

  • PDF

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF

A New Resource Lists Architecture using Dynamic Notification Control Method (새로운 동적 통지 제어 방식을 사용한 리소스 리스트 구조)

  • Jang, Choon-Seo;Lee, Ky-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.133-140
    • /
    • 2012
  • In SIP(Session Initiation Protocol) service, users should send SIP SUBSCRIBE messages to the SIP server to get subscription informations of the other parties, and total amount of SIP messages becomes large in network as refresh messages and notification messages are generated to each SIP subscription. In this paper, a new resource lists architecture using dynamic notification control method has been proposed to solve these problems. In this architecture, service users can control event notification generation rate dynamically from the server according to the operation circumstances, and users can control generation of notification messages during refresh for maintaining SIP session. Furthermore users can also control generation of notification messages according to session connection conditions. A new resource lists MIME type has been designed, and several parameters for dynamic notification message control have been added to the extended SIP message headers. In this system new resource lists MIME type can be used for processing of the event package. Therefore total amount of SIP messages in network can be largely reduced, and load of the resource lists server for processing messages can be reduced also. The performance of the proposed method has been evaluated by experiments.

A Study on Development of Network Management Systems base on Component (컴포넌트 기반의 망관리 시스템 개발에 관한 연구)

  • Kim, Haeng-Kon;Kim, Ji-Young
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.937-950
    • /
    • 2004
  • With growing population of internet and web applications, distributed environment is considered to be the standard architecture of application. A network management systems(NMS) is necessary to control and monitor the complex network resources for providing and sharing the heft quality service. We recognize the NMS as a standard infrastructure for supporting efficient networking and a separate commercial applications. We believe every resource including software, hardware and environment for the network management should be separated from special protocols, vendors and applications. Therefore, We need a standard network management system that is efficient and consistent because of the heterogeous network features. In regards to software development, software reuse through assembling and extending the reusable elements such as patterns and components assures to realize the best productivity and quality The component based development(CBD) methodology that can assemble black box though well defined interfaces makes it possible to develop easer and quicker applications and is proved as the best software development solution involved in construction, selection and assembly of components. In this thesis, we describe the architecture for the network management and identify, define and design the components through analysis and design in the network management domain and Identified components mapped to the component architecture. We also specify the component development and design and implement the component for developing the network management. Implemented components apply to the component repository system that register, retrieve and understand the components. We analyze, design and implement the entire network management system based on configuration, connection, performance and fault management through the pre-developed components.

Effect of exercise program on activity of daily living in patients with dementia : A Systematic Review (운동프로그램이 치매환자의 일상생활활동에 미치는 효과에 대한 체계적 고찰)

  • Kim, Jae-Nam;Lee, chang dae;Park, Ji-Hyuk
    • Therapeutic Science for Rehabilitation
    • /
    • v.4 no.2
    • /
    • pp.7-15
    • /
    • 2015
  • Objectives : The aim of this study was to assess the clinical effect of exercise program used for treatment of activity of daily living skill in patients with dementia. Methods : We searched foreign studies registered from 2007 to 2014 based on PubMed database, using the following search terms : dementia, alzheimer disease, cognitive impairment, exercise program, physical activity, activity of daily living, ADL. Total 5 studies included from 215 studies after analysis papers. Results : selected paper's average pedro score was 6, Katz index of ADLs, Bathel ADL index, IADL activity of daily living assessment tool were used. there was significant improves of activity of daily living skill in the use of exercise program groups and it prevent decreased of activity of daily living skill. Conclusion : This study provide evidence of exercise program applied in clinical use and demonstrate effective on activity of daily living ability. This results expected to help suggesting basic data for exercise program to improve activity of daily living ability and making effective treatment approach method in the future.

Application of CSP Filter to Differentiate EEG Output with Variation of Muscle Activity in the Left and Right Arms (좌우 양팔의 근육 활성도 변화에 따른 EEG 출력 구분을 위한 CSP 필터의 적용)

  • Kang, Byung-Jun;Jeon, Bu-Il;Cho, Hyun-Chan
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.654-660
    • /
    • 2020
  • Through the output of brain waves during muscle operation, this paper checks whether it is possible to find characteristic vectors of brain waves that are capable of dividing left and right movements by extracting brain waves in specific areas of muscle signal output that include the motion of the left and right muscles or the will of the user within EEG signals, where uncertainties exist considerably. A typical surface EMG and noninvasive brain wave extraction method does not exist to distinguish whether the signal is a motion through the degree of ionization by internal neurotransmitter and the magnitude of electrical conductivity. In the case of joint and motor control through normal robot control systems or electrical signals, signals that can be controlled by the transmission and feedback control of specific signals can be identified. However, the human body lacks evidence to find the exact protocols between the brain and the muscles. Therefore, in this paper, efficiency is verified by utilizing the results of application of CSP (Common Spatial Pattern) filter to verify that the left-hand and right-hand signals can be extracted through brainwave analysis when the subject's behavior is performed. In addition, we propose ways to obtain data through experimental design for verification, to verify the change in results with or without filter application, and to increase the accuracy of the classification.

Design and Implementation of ISO/IEEE 11073 DIM Transmission Structure Based on oneM2M for IoT Healthcare Service (사물인터넷 헬스케어 서비스를 위한 oneM2M기반 ISO/IEEE 11073 DIM 전송 구조 설계 및 구현)

  • Kim, Hyun Su;Chun, Seung Man;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.3-11
    • /
    • 2016
  • In the environment of Internet of Things (IoT), IoT devices are limited by physical components such as power supply and memory, and also limited to their network performance in bandwidth, wireless channel, throughput, payload, etc. Despite these limitations, resources of IoT devices are shared with other IoT devices. Especially, remote management of the information of devices and patients are very important for the IoT healthcare service, moreover, providing the interoperability between the healthcare device and healthcare platform is essential. To meet these requirements, format of the message and the expressions for the data information and data transmission need to comply with suitable international standards for the IoT environment. However, the ISO/IEEE 11073 PHD (Personal Healthcare Device) standards, the existing international standards for the transmission of health informatics, does not consider the IoT environment, and therefore it is difficult to be applied for the IoT healthcare service. For this matter, we have designed and implemented the IoT healthcare system by applying the oneM2M, standards for the Internet of Things, and ISO/IEEE 11073 DIM (Domain Information Model), standards for the transmission of health informatics. For the implementation, the OM2M platform, which is based on the oneM2M standards, has been used. To evaluate the efficiency of transfer syntaxes between the healthcare device and OM2M platform, we have implemented comparative performance evaluation between HTTP and CoAP, and also between XML and JSON by comparing the packet size and number of packets in one transaction.