• Title/Summary/Keyword: 프로토콜 성능

Search Result 2,785, Processing Time 0.036 seconds

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

Robust Wireless Sensor and Actuator Network for Critical Control System (크리티컬한 제어 시스템용 고강건 무선 센서 액추에이터 네트워크)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1477-1483
    • /
    • 2020
  • The stability guarantee of wireless network based control systems is still challenging due to the lossy links and node failures. This paper proposes a hierarchical cluster-based network protocol called robust wireless sensor and actuator network (R-WSAN) by combining time, channel, and space resource diversity. R-WSAN includes a scheduling algorithm to support the network resource allocation and a control task sharing scheme to maintain the control stability of multiple plants. R-WSAN was implemented on a real test-bed using Zolertia RE-Mote embedded hardware platform running the Contiki-NG operating system. Our experimental results demonstrate that R-WSAN provides highly reliable and robust performance against lossy links and node failures. Furthermore, the proposed scheduling algorithm and the task sharing scheme meet the stability requirement of control systems, even if the controller fails to support the control task.

Methodology for the efficiency of routing summary algorithms in discontiguous networks (Discontiguous Network에서 라우팅 축약 알고리즘의 효율화에 대한 방법론)

  • Hwang, Seong-kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1720-1725
    • /
    • 2019
  • In this paper, we consider the efficiency of the scheme for for routing summary algorithms in discontiguous networks. Router than updating and transmitting the entire subnet information in the routing protocol, only the shortened update information is sent and the routing table is shortened to make the router resources more efficient and improve network stability and performance. However, if a discontiguous network is formed in the network design process, a problem arises due to the network contraction function and does not bring about the result of fundamental router efficiency. Using different major networks subnets one major network, causing problems in communication and routing information exchange if the configuration is incorrect. The algorithm proposed in this paper removes only the auto-summary algorithm from the existing algorithm, which increases the complexity and stability of the routing table and reduces the CPU utilization of network equipment from 16.5% to 6.5% Confirmed.

A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine (Support Vector Machine 기반 TCP/IP 헤더의 은닉채널 탐지에 관한 연구)

  • 손태식;서정우;서정택;문종섭;최홍민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • In explosively increasing internet environments, information security is one of the most important consideration. Nowadays, various security solutions are used as such problems countermeasure; IDS, Firewall and VPN. However, basically internet has much vulnerability of protocol itself. Specially, it is possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledge number, timestamp and so on. In this Paper, we focus cm the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, we used Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using Support Vector Machine.

A Modeling of Realtime Fuel Comsumption Prediction Using OBDII Data (OBDII 데이터 기반의 실시간 연료 소비량 예측 모델 연구)

  • Yang, Hee-Eun;Kim, Do-Hyun;Choe, Hoseop
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.2
    • /
    • pp.57-64
    • /
    • 2021
  • This study presents a method for realtime fuel consumption prediction using real data collected from OBDII. With the advent of the era of self-driving cars, electronic control units(ECU) are getting more complex, and various studies are being attempted to extract and analyze more accurate data from vehicles. But since ECU is getting more complex, it is getting harder to get the data from ECU. To solve this problem, the firmware was developed for acquiring accurate vehicle data in this study, which extracted 53,580 actual driving data sets from vehicles from January to February 2019. Using these data, the ensemble stacking technique was used to increase the accuracy of the realtime fuel consumption prediction model. In this study, Ridge, Lasso, XGBoost, and LightGBM were used as base models, and Ridge was used for meta model, and the predicted performance was MAE 0.011, RMSE 0.017.

Design of Hybrid V2X Communication Platform for Evaluation of Commercial Vehicle Autonomous Driving and Platooning (상용차 자율 군집 주행 평가를 위한 하이브리드 V2X 통신 플랫폼 설계)

  • Jin, Seong-keun;Jung, Han-gyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.521-526
    • /
    • 2020
  • In this paper, we propose a design method and process for hybrid V2X communication platform that combines WAVE communication and LTE-V2X communication which are C-ITS communication protocols for vehicle environments and Legacy LTE communication which is a commercial mobile communication for evaluating the autonomous platooning platform of commercial vehicles. For a safe and efficient autonomous platooning platform, an low-latency communication function based on C-ITS communication is required, and to control it, commercial communication functions such as Legacy LTE, which can be connected at all times, are required. In order to evaluate such a system, the evaluation equipment must have the same level of communication performance or higher. The main design contents presented in this paper will be applied to the implementation of hybrid V2X terminals for functional evaluation.

User-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage (블록체인과 분산 스토리지를 활용한 프록시 재암호화 기반의 사용자 중심 재해 복구 시스템)

  • Park, Junhoo;Kim, Geunyoung;Kim, Junseok;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1157-1169
    • /
    • 2021
  • The disaster recovery refers to policies and procedures to ensure continuity of services and minimize loss of resources and finances in case of emergency situations such as natural disasters. In particular, the disaster recovery method by the cloud service provider has advantages such as management flexibility, high availability, and cost effectiveness. However, this method has a dependency on a service provider and has a structural limitation in which a user cannot be involved in personal data. In this paper, we propose a protocol using proxy re-encryption for data confidentiality by removing dependency on service providers by backing up user data using blockchain and distributed storage. The proposed method is implemented in Ethereum and IPFS environments, and presents the performance and cost required for backup and recovery operations.

Effect of Influent Gas on Mechanical Acceleration Durability Test of PEMFC Polymer Membrane (PEMFC 고분자막의 기계적 가속 내구 평가 과정에서 유입 가스의 영향)

  • Oh, Sohyeong;Hwang, Byungchan;Jung, Sunggi;Jeong, Jihong;Park, Kwonpil
    • Korean Chemical Engineering Research
    • /
    • v.60 no.3
    • /
    • pp.321-326
    • /
    • 2022
  • As the thickness of the polymer membrane of PEMFC(Proton Exchange Membrane Fuel Cells) is getting thinner for PEMFC performance and price reduction, research on improving durability has become more important. In the durability evaluation of membranes, the mechanical durability evaluation time is more than twice that of the chemical durability evaluation time, so it is necessary to select the durability evaluation conditions well. In this study, we tried to check how much the mechanical durability evaluation time changes when there is a difference in the inflow gas type and flow rate in the mechanical durability evaluation protocol (Wet/Dry). When nitrogen was used at a flow rate of 2,000 mL/min, the evaluation time increased by 1.25 times compared to when air was used. An increase in the degradation rate of the electrode Pt was the main factor when air was used. When the flow rate was reduced to 800 mL/min, the air and nitrogen evaluation times increased by 1.5 times and 1.2 times, respectively.

A Study of Virtual IoT System using Edge Computing (엣지 컴퓨팅 기반 가상 IoT 시스템 연구)

  • Kim, Min-A;Seok, Seung-Joon
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.51-62
    • /
    • 2020
  • Open IoT platform that shares communication infrastructure and provides cloud resources can flexibly reduce development period and cost of smart service. In this paper, as an open IoT platform, we propose a virtual IoT system based on edge computing that implements a virtual IoT device for a physical IoT device and allows service developers to interact with the virtual device. A management server in the edge cloud, near the IoT physical device, manages the creation, movement, and removal of virtual IoT devices corresponding to the physical IoT devices. This paper define the operations of the management server, the physical IoT device, and the virtual IoT device, which are major components of the virtual IoT system, and design the communication protocol required to perform the operations. Finally, through simulations, this paper evaluate the performance of the edge computing based virtual IoT system by confirming that each component performs the defined states and operations as designed.

Power Consumption Analysis of Asynchronous CSL mode MAC in Wi-SUN (Wi-SUN에서 비동기 CSL 모드 MAC의 전력소모 분석)

  • Yoon, Mi-Hee;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.59-63
    • /
    • 2022
  • In recent years, research on smart factory wireless mobile communication technology that wirelessly remotely controls utilities is being actively conducted. The Wi-SUN(Wireless Smart Utility Network) Alliance proposed Wi-SUN protocol structure suitable for building a platform such as a smart factory as a new wireless communication standardization standard based on EEE802.15.4g/e. It analyzes the performance of the IEEE802.15.4e CSL(Coordinated Sampled Listening) Mode MAC(Media Access Control) in terms of power consumption and looks at considerations for efficient operation. Although CSL-MAC can dramatically reduce power consumption at the receiving end in an asynchronous manner, it has been found that the transmitting end has a disadvantage in that power consumption occurs due to an excessive wake-up sequence.