• Title/Summary/Keyword: ASK 프로토콜

Search Result 23, Processing Time 0.026 seconds

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

Performance Comparison of ISO / IEC 18000-3 ASK and PJM Mode (ISO/IEC 18000-3 ASK 모드와 PJM 모드의 성능 비교)

  • Kim, Jae-Lim;Yang, Hoon-Gee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.70-80
    • /
    • 2008
  • This paper presents comparison of 18000-3 ASK and PJM mode RFID in terms of reading speed. This is accomplished by counting the occurrences of a few representative blocks which constitute the reader / tag interactions for each mode. To apply FS (frame slotted)-aloha protocol, four Q-algorithms, which are a Q-algorithm suggested in the standard document, a fixed Q-algorithm, a minimum Q-algorithm and the number of tag dependent Q-algorithm, are used. Through some simulations, we present the reading speed of each mode with respect to the Q-algorithm and the comparison of the reading speed between the two modes for each Q-algorithms.

  • PDF

Analysis of the M-Commerce Protocol based on Diffie-Hellman (Diffie-Hellman기반 M-Commerce 프로토콜 분석)

  • Kim Hyun-Seok;Kim Il-Gon;Choi Jin-Young;Noh Jung-Hyun;Yoo Hee-Jun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.226-228
    • /
    • 2005
  • 최근 모바일 단말기를 이용한 전자상거래 서비스가 활발해 짐에 따라, 사용자 및 서비스 제공자간의 통신 안전성 확보가 중요한 문제로 인식되고 있다. 지금까지 제안된 대부분의 모바일 프로토콜들은 상호 안전한 키 교환을 위해 Diffie-Hellman 알고리즘을 사용하고 있다. 본 논문에서는 BCY 및 ASK 프로토콜을 통해서 Diffie-Hellman 알고리즘 기반 모바일 프로토콜의 상호 키 교환 및 인증절차를 살펴보고, Casper 및 FDR 도구를 이용하여 무선환경기반 M-Commerce 프로토콜의 안전성을 분석하였다.

  • PDF

Performance Evaluation of an Underwater Propagation Delay-Aware Medium Access Control Protocol (수중 전파 지연을 고려한 매체 접근 제어 프로토콜에 대한 성능 평가)

  • Hwang, Ho Young;Kim, Woo-Sik;Lee, Sang-Kug;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.463-469
    • /
    • 2015
  • In this paper, we propose an underwater propagation delay-aware medium access control protocol and evaluate the performance of the proposed protocol. In the proposed propagation delay-aware medium access control protocol, a sink node can restore the received RTS frames that are not piled up in a slot time. We analyze and compare the performance of the proposed underwater propagation delay-aware medium access control protocol with that of the conventional medium access control protocol in various environments.

MAC Protocol for Single-Hop Underwater Sensor Network (싱글 홉 수중 센서 네트워크를 위한 매체접속제어 프로토콜 설계)

  • Baek, Seung-Kwon;Cho, Ho-Shin;Jang, Youn-Seon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.6
    • /
    • pp.499-505
    • /
    • 2009
  • Main design issues for MAC (Medium Access Control) protocol in underwater sensor networks are long propagation delay caused by the low speed of sound, difficult synchronization, and energy-limited node's life. We aimed to mitigate the problems of strict synchronization and channel inefficiency of TDMA and also the throughput degradation induced by unavoidable collisions in contention based MAC protocols. This proposed protocol improved not only the energy efficiency by adopting a sleep-mode, but also the throughput by reducing collisions and increasing channel efficiency.

Implementation of UHF RFID Tag Emulator (UHF 대역의 RFID 태그 에뮬레이터 구현)

  • Park, Kyung-Chang;Kim, Hanbyeori;Lee, Sang-Jin;Kim, Seung-Youl;Park, Rae-Hyeon;Kim, Yong-Dae;You, Young-Gap
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.11
    • /
    • pp.12-17
    • /
    • 2009
  • This paper presents a tag emulator for a UHF band RFID system. The tag emulator supports the 1800-6C and EPC global class 1 generation 2 standards. The transmitted signal from a reader is generated using the PIE coding and ASK modulation methods. Signals of a tag are from the FM0 coding and ASK modulation methods. The ARM7 processor carries out the overall control of the system and signal analysis of incoming data. The verification of the tag emulator employs the application platform implemented in C++. Users can define parameter values for protocol during the application run. The tag emulator presented in this paper allows evaluating various design alternatives of the target RFID system in real applications.

A Study on the Reliability Improvement of RFID System (RFID System의 신뢰성 향상에 관한 연구)

  • Ham Jung-Gi;Kwon Oh-Heung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.542-545
    • /
    • 2006
  • In recent years, RFID is widely used in Industrial applications including factory, material flow, logistics and defense areas. In this paper, we developed a RFID baseband system with ASK modulation and convolutional channel code. A commercial ASK RF module is used and its frequency range in $350\sim351MHz$ and power is 10mW and the convolution code is constraint length k=3 and rate R=1/2. The performance is measured by frame error rate and the convolutional code is very useful in performance improvement and, also we implemented the binary search algorithm as anti-collision method and we show the wave shapes whit collision occurrence. This RFID system is designed by FPGA therefore it produces result of speed-up and improvement of reliability.

  • PDF

Evaluation of Multiple Access Protocols for Controlling UUV (무인잠수체 통제를 위한 다중접속 프로토콜 평가)

  • Jung, Seung-Back;Cho, Jin-Soo;Shim, Tae-Bo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.6
    • /
    • pp.279-285
    • /
    • 2008
  • This study includes the efficiency assessment of a multiple access protocol for UUV (Underwater unmanned vehicle) control. Most of UUVs are controled by wire now; however, wireless control is demanded because of the demerit of the wire control that limits the place and activity. This study simulates efficiency of a standardization multiple access protocol (Pure ALOHA, Slotted ALOHA, Nonpersistent CSMA, Slotted Nonpersistent ISMA) formed for the purpose of performing wireless communication controlled by the ship or communication buoy at the sea surface and by the under water communication node at the bottom in order to efficiently control the UUV's. Results show that no significant changes occur related to changing type of the mother ship and the communication node; In addition, the Non-persistent CSMA and the Slotted Non-persistent ISMA show relatively high efficiency for underwater acoustic communication.

A bidirectional full duplex medium access control protocol for underwater acoustic networks (수중 음향 네트워크를 위한 양방향 전이중 매체 접속 제어 프로토콜)

  • Kang, Sung Min;Hwang, Ho Young;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.211-217
    • /
    • 2017
  • In this paper, we propose a bidirectional full duplex MAC (Medium Access Control) protocol for underwater acoustic networks. An underwater sensor node can set a back-off timer according to the priority of transmission. When the back-off timer expires, the underwater sensor node acquires a transmission opportunity. If a source node wants to send data to a destination node, it broadcasts RTS (Request-To-Send) including ID of the destination node to neighbor nodes. The destination node receiving RTS sends CTS (Clear-To-Send) to the source node to inform the bidirectional full duplex communication. After the source node receives CTS, the source node and the destination node can send the data to each other. In the underwater environment, the existing MAC protocol may take a lot of time for successful transmission of data due to long underwater propagation delay. On the other hand, the proposed bidirectional full duplex MAC protocol improves the throughput by shortening the time for successful transmission of data. In this paper, we analyze the throughput of the proposed bidirectional full duplex MAC protocol. In addition, we show that the proposed bidirectional full duplex MAC protocol has better performance in the presence of the long underwater propagation delay compared with existing MAC protocols for underwater environments.

RFID Tag 기술

  • 변상기
    • The Proceeding of the Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.2
    • /
    • pp.32-43
    • /
    • 2004
  • RFID 시스템에서 태그는 리더와 전자기 에너지 교환에 의해 동작을 하며 배터리를 사용하는 active 형 태그와 배터리를 사용하지 않는 passive형 태그로 크게 구분된다. 또한 태그는 자체 회로구조에 의해 harmonic 태그, anharmonic 태그, sequenced amplifier 태그로 나뉜다. Passive 태그에서는 리더의 반송파 backscatter 방식을 이용하여 동작을 하며 active 태그는 자체 발진회로에 의해 태그정보를 송신한다. 태그의 변조방식으로 PSK, FSK, ASK 등을 사용하며 변조방법에 따라 회로 구성과 프로토콜 설계가 달라진다. 또한 리더의 전파 신호를 정류하기 위하여 렉테나(rectenna)가 필요하다. 본 논문에서는 태그의 분류, 동작, 구조 등에 관한 일반적인 내용을 기술하였다. 특히 UHF 대역 이상의 태그 기술 최근 추세가 안테나 부분을 제외하고 CMOS one chip화 하는 수준으로서 900 MHz UHF 대역, 2.45 GHz RFID 칩이 상용화 되어 있다. 칩의 내부구조와 태그의 변조방식에 의거한 동작에 관한 개괄적인 내용을 서술하였다.