• Title/Summary/Keyword: 프로토콜 설계 및 검증

Search Result 295, Processing Time 0.026 seconds

Design and Implementation of the Internetworking Architecture between IPv4 and IPv6 in IMS based Mobile networks (IMS기반 이동패킷망에서의 IPv4/IPv6 연동구조 설계 및 구현)

  • You, Seugn-Kwan;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.168-174
    • /
    • 2006
  • In this paper, we propose an architecture for communication between the IPv4-based UA and the IPv6-based UA in IMS based Mobile Networks, and design and implement the IMS protocol Translator for verification of the architecture. For the design of the internetworking between the IPv4 and the IPv6, we analyze the transition mechanisms and investigate the protocol translator. The IMS protocol translator is composed of the IMS-ALG(IP Multimedia Subsystem - Application Level Gateway) and TrGW(Translation Gateway), and the conformance of these components are verified by experiments.

Concealing Communication Paths in Wireless Sensor Networks (무선 센서 네트워크에서의 통신 경로 은닉)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.12
    • /
    • pp.1353-1358
    • /
    • 2014
  • Tremendous amount of dummy packets are generally generated for faking over a wireless sensor network so as to keep the location privacy of nodes on the communication paths against the global eavesdropping. In this paper, a scoped-flooding protocol is designed for transferring data between each source and mobile sink(aka, basestation) where, the only nodes within the scope are allowed to issue dummy packets at every idle time so that the location privacy of the nodes on the paths is kept and the amount of dummy packets is reduced to the extend of the flooding scope. The size of the flooding diameter can be taken into consideration of the privacy level and the communication cost. We design a detailed specification of the protocol and verify several properties.

Design and implementation of validation tool for TTCN test case (TTCN으로 기술된 시험 항목 검증 도구의 설계 및 구현)

  • Lee, Ok-Bin;Lee, Hyeon-Jeong;Jin, Byeong-Mun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.12
    • /
    • pp.3176-3184
    • /
    • 1998
  • 프로토콜 적합성 시험을 효과적으로 하기 위하여 시험항목을 올바로 기술하는 것은 매우 중요하다. 시험 항목 검증을 자동화한다면 수 작업으로 할 때의 번거로움과 오류를 피할 수 있다. 이 연구에서는 이러한 수 작업으로 생성된 시험 항목의 검증을 자동화함으로써 오류를 줄이고, 적합성 시험의 생산성을 향상시키기 위한 시험 항목 검증 도구를 설계하고 이를 구현하였다. 검증대상 시험 항목은 TTCN형태이고 검증의 핵심기반은 reachability tree analysis 방법이다.

  • PDF

Design and Implementation of variable TDMA MAC Protocol of WDM method on Ethernet PON Using OPNET (OPNET을 이용한 Ethernet PON에서의 WDM 방식의 가변 TDMA MAC 프로토콜의 설계 및 구현)

  • 정민석;장용석;엄종훈;조정현;김승호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04d
    • /
    • pp.608-610
    • /
    • 2003
  • Ethernet PON(Passive Optical Network)에서 핵심 기술 중의 하나인 MAC(Media Access Control) 프로토콜은 ONU(Optical Network틴nit)들이 상향으로 트래픽을 전송할 때 공유되어 있는 링크상의 충돌을 방지하고, 효율적인 대역폭을 할당하기 위한 스케줄링 알고리즘을 포함하고 있다. 본 논문에서는 차세대 가입자 망인 Ethernet PON에서 상향으로의 대역폭 부족을 개선하기 위하여, n개의 파장을 사용한 가변 슬롯 할당 TDMA(Time Division Multiple Access) 방식의 MAC 프로토콜을 제안한다. 이를 검증하기 위하여 OPNET 시뮬레이션 도구를 이용해 Ethernet PON 모델을 설계하고 시뮬레이션 한다.

  • PDF

Design of Home-Gateway Authentication Protocol Using Beacon in Wireless Environment (무선 환경에서 Beacon을 이용한 Home-Gateway 상호인증 프로토콜 설계)

  • Park, GeunIl;Kang, Jungho;Jun, Moon-Soeg
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.256-258
    • /
    • 2016
  • 무선통신은 어디에서나 쉽게 서비스를 받을 수 있다. 하지만 주파수를 이용하여 무선통신을 하기 때문에 Data가 Sniffing Attack에 취약하다. 이러한 취약점을 개선하기 위해 Data를 보호하기 위해 보다 안전한 프로토콜이 필요하다. 따라서 본 논문에서는 무선 환경에서 사용자 위치정보 값을 Beacon의 RSSI와 삼변 측량법을 이용하여 Home-Gateway와 User 간 상호 인증 및 key 교환 프로토콜을 제안한다. 제안하는 프로토콜은 보안성 평가를 통해 안전성을 검증하였으며 제안하는 프로토콜을 통해 Sniffing Attack으로부터 안전한 통신이 가능하다.

Mixed Dual-rail Data Encoding Method Proposal and Verification for Low Power Asynchronous System Design (저전력 비동기식 시스템 설계를 위한 혼합형 dual-rail data encoding 방식 제안 및 검증)

  • Chi, Huajun;Kim, Sangman;Park, Jusung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.7
    • /
    • pp.96-102
    • /
    • 2014
  • In this paper, we proposed new dual-rail data encoding that mixed 4-phase handshaking protocol and 2-phase handshaking protocol for asynchronous system design to reduce signal activities and power consumption. The dual-rail data encoding 4-phase handshaking protocol should leat to much signal activities and power consumption by return to space state. Ideally, the dual-rail data encoding 2-phase handshaking protocol should lead to faster circuits and lower power consumption than the dual-rail 4-phase handshaking protocol, but can not designed using standard library. We use a benchmark circuit that contains a multiplier block, an adder block, and latches to evaluate the proposed dual-rail data encoding. The benchmark circuit using the proposed dual-rail data encoding shows an over 35% reduction in power consumption with 4-phase dual-rail data encoding.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

The VoIP System on Chip Design and the Test Board Development for the Function Verification (VoIP 시스템 칩 설계 및 기능 검증용 보드 개발)

  • 소운섭;황대환;김대영
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.990-994
    • /
    • 2003
  • This paper describes the VoIP(Voice over Internet Protocol) SoC(System on Chip) Design and the test board development for the function verification to support voice communication services using Internet. To implement the simple system of configuration, we designed the VoIP SoC which have ARM922T of 32bit microprocessor, IP network interface, voice signal interface, various user interface function. Also we developed test program and communication protocol to verify the function of this chip. We used several tools of design and simulation, developed and tested a test board with Excalibur which includes ARM922T microprocessor and FPGA.

  • PDF

SDL-OPNET Co-Simulation Technique for the Development of Communication Protocols with an Integrated Approach to Functional Verification and Performance Evaluation (기능 검증 및 성능 평가 통합 접근 방법을 통한 통신 프로토콜 개발을 위한 SDL-OPNET 코-시뮬레이션 기법)

  • Yang, Qi-Ping;Kim, Tae-Hyong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.157-164
    • /
    • 2010
  • While both functional verification and performance evaluation of a system are necessary for the development of effective and reliable communication systems, they have been usually performed individually through functional modeling with formal language tools and performance modeling with professional network performance evaluation tools, respectively. However, separate and duplicated modeling of a system may cause increase of the cost and inconsistency between the models. In order to overcome this problem, this paper proposes an integrated design technique that estimates the performance of a communication protocol designed in SDL with SDL-OPNET co-simulation. The proposed technique presents how to design a co-simulation system with the environment functions of Tau and the external system module of OPNET. InRes protocol was used as an example to show the applicability and usefulness of the proposed technique.