• Title/Summary/Keyword: 프로토콜 메시지

Search Result 1,153, Processing Time 0.032 seconds

Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs (신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석)

  • Ryu, Eun-Kyung;Lee, Sung-Woon;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In a paper recently published in the International Journal of Parallel, Emergent and Distributed Systems, Biswas et al. proposed a VANET message authentication scheme which uses an identity-based proxy signature mechanism as an underlying primitive. The authors claimed that their scheme supports various security features including the security of proxy-key, the security against message forgery and the security against replay attack, with non-repudiation and resistance to proxy-key compromise. Here, we show how an active attacker, who has no knowledge of an original message sender's private key, can compute the proxy-signature key of the corresponding message sender, meaning that the scheme is completely insecure. We also suggest an enhanced version of the protocol capable of solving such serious security holes.

A Study on the Comparison of Reliability Between MQTT and CoAP (Confirmative Message) (MQTT와 CoAP(Confirmative message) 신뢰성 비교)

  • Ryu, Kuem-gang;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.485-487
    • /
    • 2017
  • With the growth of the IoT, security is a growing concern. Things the risk of IoT security has been constantly raised, and there have been many cases of hacking. As a result, there is a growing concern and scale about security, but there is a lack of interest and research on the message protocols between Iot devices. With the development of the IoT, the importance of low-power, lightweight and accurate message delivery will become more important and more advanced message protocols will be needed. In this paper, it is aimed to construct the system for communication between client and server of MQTT and CoAP with Confirmative option, which are most used among IoT message protocols and compare the message reliability of each communication protocol to check efficiency.

  • PDF

A Traffic Hazard Prediction Algorithm for Vehicle Safety Communications on a highway (고속도로에서 차량 안전 통신을 위한 교통사고 위험 예측 알고리즘)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.319-324
    • /
    • 2012
  • Vehicle safety communications is one among the important technologies in order to protect a car accident. For this, many protocols forwarding a safe message have studied to protect a chain-reaction collision when a car accident occurs. most of these protocols assume that the time of generating a safe message is the same as an accident's. If a node predicts some traffic hazard and forwards a safe message, a driver can response some action quickly. So, In this paper, we proposes a traffic hazard prediction algorithm using the communication technique. As a result, we show that the frame reception success rate of using our algorithm to the previous protocol improved about 4~5%.

Design and Implementation of Protocol to Transfer Secure Messages for PDA (PDA에서 운용 가능한 보안 메시지 전송 프로토콜 설계 및 구현)

  • Lee, Ki-Young;Lee, Jeong-Kyoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.181-187
    • /
    • 2005
  • This paper proposes and implements a service model to transfer messages safely for PDA on CDMA wireless network and a secure massage transfer protocol which considers characteristics of PDA. Proposed service uses SMS(Short Message Service) connect to a off-line client device with the wired network for data communication. After receiving SMS message, client device processes the SMS message and creates a data channel through RAS(Remote Access Service), then the data of the server can be pushed to clients. The implemented security protocol can provide safe data transmission on each communication line through two way channels(SMS and data). Also, by using security nonce table, this protocol can reduce a number of transmissions for exchanging a safe session key, so intensity of encryption can be increased.

Lightweight DTLS Message Authentication Based on a Hash Tree (해시 트리 기반의 경량화된 DTLS 메시지 인증)

  • Lee, Boo-Hyung;Lee, Sung-Bum;Moon, Ji-Yeon;Lee, Jong-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1969-1975
    • /
    • 2015
  • The Internet of Things (IoT), in which resource constrained devices communicate with each other, requires a lightweight security protocol. In this paper, we propose a new message authentication scheme using a hash tree for lightweight message authentication in the Datagram Transport Layer Security (DTLS) protocol. The proposed scheme provides lightweight secure operations compared with those of the DTLS protocol. Besides, it provides more suitable performance than the DTLS protocol for an IoT environment, thanks to the reduced use of message authentication code.

XML-based Message Transmission Protocol for Mobile Emergency Medical Service in the Pre-Hospital Phase (병원 전단계 모바일 응급의료 서비스를 위한 XML 기반 메시지 전송 프로토콜)

  • Kim, Heung Shik
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.24-30
    • /
    • 2015
  • For suddenly encountered emergencies, most people embarrass, and can not often deliver the correct message when they report. Recently in the commonplace smart software environment, it is important that they can transmit the correct individual emergency situation efficiently and can receive the best service, and can provide the efficient emergency medical services to real-time around the other emergencies. In this paper, we design a standard protocol for the rapid and accurate technology for transmitting XML-based structured messages to provide an efficient emergency medical services, and offers a emergency medical services protocol to make them available more efficiently.

The Modified Aviation TDMA Protocol for an Improvement in Aeronautical RF Spectrum Utilization (항공통신에서 효율적인 RF 주파수 활용을 위한 항공용 TDMA 변형 프로토콜)

  • Park, Hyo Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.1 no.1
    • /
    • pp.47-58
    • /
    • 1997
  • In this paper, the modified aviation TDMA protocol that can improve the aeronautical communication spectrum utilization is studied to satisfy the increasing air traffic demands. Currently European states proposed the scheme reducing the channel spacing from current 25 kHz to 8.33 kHz and U. S. FAA proposed the system using TDMA technique that divides access into four parallel circuits. The modified aviation TDMA protocol can complement the defects of these current systems. In modified aviation TDMA protocol, message channel that is used between aircraft and ground station is divided into uplink channel and downlink channel. After receiving the acknowledgement of the reservation request, aircraft sends messages at the allocated slots. Numerical analysis and simulation results show that the modified aviation TDMA scheme has high channel efficiency in the aviation environment.

  • PDF

Data Dissemination Protocol for Supporting Both Sink Mobility and Event Mobility in Wireless Sensor Networks (무선 센서 네트워크에서 싱크 이동성과 이벤트 이동성을 지원하는 데이타 전달 프로토콜)

  • Choi, Young-Hwan;Lee, Dong-Hun;Ye, Tian;Jin, Min-Sook;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.316-320
    • /
    • 2008
  • Data dissemination schemes for wireless sensor networks, where sinks and event targets might be mobile, has been one of the active research fields. For doing that, stationary nodes gathered data on behalf of mobile sinks and the relayed data in previous studies. their schemes, however, lead to frequent query flooding and report congestion problems over sink moving. We propose a data dissemination protocol to solve both the query flooding and the report congestion problem. Our scheme improves the two shortcomings through sink location management. Finally, we prove effectiveness of our protocol through computer simulations.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

MIPv6 Binding Update Protocol Secure Against both Redirect and DoS Attacks (Redirect 공격과 DoS 공격에 안전한 MIPv6 바인딩 업데이트 프로토콜)

  • Kang Hyun-Sun;Park Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.115-124
    • /
    • 2005
  • We propose a new binding update(BU) protocol between mobile node(CN) and correspondent node(CN) for the purpose of preventing redirect attacks and DoS attacks observed from the existing BU protocols and enhancing the efficiency of the BU protocol. Home agent plays a role of both authentication server validating BU message and session key distribution center for MN and CN. Also propose the stateless Diffie-Hellman key agreement based on cryptographically generated address (CGA). Suity of our proposed Protocol is analyzed and compared with other protocols. The proposed protocol is more efficient than previous schemes in terms of the number of message flows and computation overhead and is secure against both redirect and DoS attacks.