• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.029 seconds

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Embedded Processor based PPP Implementation for Globalstar Satellite Modem (글로벌스타 위성 모뎀을 위한 임베디드 프로세서 기반 PPP(Point-to-Point Protocol) 구현)

  • Moon, Hyun-Geol;Lee, Myung-Eui
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.409-418
    • /
    • 2008
  • In this paper, we programed the PPP(Point-to-Point Protocol) used in embedded application environments for Globalstar Satellite Modem. There are number of satellite communication systems such as Orbcomm, Globalstar, Inmarsat and etc. But each satellite data service have provided a communication interface only for their own data links. A data communication link is needed to communicate with Globalstar satellite service. Globalstar communication system uses PPP to establish data communication link, so we implemented the embedded processor based PPP protocol. The user terminal equipment also designed in this paper has various input/output devices and sensors applicable to any user specific application. The proposed PPP program works well with Globalstar data communication link through experimental tests.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

MPMTP-AR: Multipath Message Transport Protocol Based on Application-Level Relay

  • Liu, Shaowei;Lei, Weimin;Zhang, Wei;Song, Xiaoshi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1406-1424
    • /
    • 2017
  • Recent advancements in network infrastructures provide increased opportunities to support data delivery over multiple paths. Compared with multi-homing scenario, overlay network is regarded as an effective way to construct multiple paths between end devices without any change on the underlying network. Exploiting multipath characteristics has been explored for TCP with multi-homing device, but the corresponding exploration with overlay network has not been studied in detail yet. Motivated by improving quality of experience (QoE) for reliable data delivery, we propose a multipath message transport protocol based on application level relay (MPMTP-AR). MPMTP-AR proposes mechanisms and algorithms to support basic operations of multipath transmission. Dynamic feedback provides a foundation to distribute reasonable load to each path. Common source decrease (CSD) takes the load weight of the path with congestion into consideration to adjust congestion window. MPMTP-AR uses two-level sending buffer to ensure independence between paths and utilizes two-level receiving buffer to improve queuing performance. Finally, the MPMTP-AR is implemented on the Linux platform and evaluated by comprehensive experiments.

Implementation of the wireless headset using Bluetooth (블루투스를 이용한 무선 헤드셋 구현)

  • 이병로
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1138-1145
    • /
    • 2003
  • The Bluetooth wireless technology is the new short-range RF transmission standard for low-power, low-cost, short-range radio links between mobile devices and electric product. The technology can eliminate the confusion of cables, connectors and protocols confounding communications between devices. Mobile phones, pagers, laptops, PDAs, digital cameras and more, all now have a common structure for communicating across their product platforms. In this paper, we present the Bluetooth protocol stack and headset profiles for the communication between mobile phone and headset. And then, we construct application software which is embedded in the device that operates an application over the Bluetooth protocol stack Next we implement wireless headset using MSP430, not real time operating system.

A Study of an NAT Protocol using Virtual IP Information in the TCP Segment (TCP 세그멘트내의 가상 IP 정보를 이용하는 NAT 프로토콜에 대한 연구)

  • Hwang, Jae-Yong;Ju, Gi-Ho
    • The Journal of Engineering Research
    • /
    • v.5 no.1
    • /
    • pp.45-55
    • /
    • 2004
  • NAT (Network Address Translation) is an IP address modification protocol that translates private IP address into authentic Internet address. The main features of NAT are to improve network security and to save IP address. Generally speaking, in order to perform its functionality, NAT uses the address information in the packet header. Certain application protocols, however, use the information in the packet data as well as the information in the packet header to perform end-to-end communication. Therefore, to support these types of application protocols, NAT should be able to perform appropriate translation of protocol information in the packet data. In this thesis, we design and implement a method which translates virtual IP information in the packet date into real IP information by using port proxy server.

  • PDF

Design of Improved Strong Password Authentication Scheme to Secure on Replay Attack (재전송 공격에 안전한 개선된 강력한 패스워드 인증 프로토콜 설계)

  • Kim, Jun-Sub;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.133-140
    • /
    • 2011
  • Password-based authentication is the protocol that two entities share a password in advance and use the password as the basic of authentication. Password authentication schemes are divided into weak-password and strong-password authentication scheme. SPAS protocol, one of the strong-password authentication scheme, was proposed for secure against DoS attack. However it has vulnerability of the replay attack. In this paper, we analyze the vulnerability to the replay attack in SPAS protocol. Then we also propose an Improved-Strong Password Authentication Scheme (I-SPAS) with secure against the replay attack.

Delivering Augmented Information in a Session Initiation Protocol-Based Video Telephony Using Real-Time AR

  • Jang, Sung-Bong;Ko, Young-Woong
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Online video telephony systems have been increasingly used in several industrial areas because of coronavirus disease 2019 (COVID-19) spread. The existing session initiation protocol (SIP)-based video call system is being usefully utilized, however, there is a limitation that it is very inconvenient for users to transmit additional information during conversation to the other party in real time. To overcome this problem, an enhanced scheme is presented based on augmented real-time reality (AR). In this scheme, augmented information is automatically searched from the Internet and displayed on the user's device during video telephony. The proposed approach was qualitatively evaluated by comparing it with other conferencing systems. Furthermore, to evaluate the feasibility of the approach, we implemented a simple network application that can generate SIP call requests and answer with AR object pre-fetching. Using this application, the call setup time was measured and compared between the original SIP and pre-fetching schemes. The advantage of this approach is that it can increase the convenience of a user's mobile phone by providing a way to automatically deliver the required text or images to the receiving side.

Strategic Application of Epigenetic Regulators for Efficient Neuronal Reprogramming of Human Fibroblasts

  • Gary Stanley Fernandes;Rishabh Deo Singh;Debojyoti De;Kyeong Kyu Kim
    • International Journal of Stem Cells
    • /
    • v.16 no.2
    • /
    • pp.156-167
    • /
    • 2023
  • Background and Objectives: Cellular reprogramming in regenerative medicine holds great promise for treating patients with neurological disorders. In this regard, small molecule-mediated cellular conversion has attracted special attention because of its ease of reproducibility, applicability, and fewer safety concerns. However, currently available protocols for the direct conversion of somatic cells to neurons are limited in clinical application due of their complex nature, lengthy process, and low conversion efficiency. Methods and Results: Here, we report a new protocol involving chemical-based direct conversion of human fibroblasts (HF) to matured neuron-like cells with a short duration and high conversion efficiency using temporal and strategic dual epigenetic regulation. In this protocol, epigenetic modulation by inhibition of histone deacetylase and bromodomain enabled to overcome "recalcitrant" nature of adult fibroblasts and shorten the duration of neuronal reprogramming. We further observed that an extended epigenetic regulation is necessary to maintain the induced neuronal program to generate a homogenous population of neuron-like cells. Conclusions: Therefore, our study provides a new protocol to produce neurons-like cells and highlights the need of proper epigenetic resetting to establish and maintain neuronal program in HF.

Study on the Chinese Declarations to the London Protocol at the Time of Its Accession (런던의정서 가입 시 중국이 제출한 통지(선언)에 대한 검토)

  • Choi, Ji-Young;Hong, Gi-Hoon;Shin, Chang-Hoon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.34 no.2
    • /
    • pp.126-135
    • /
    • 2012
  • Republic of Korea designates a waste disposal site within the fishing zone administered jointly with Chin in the Yellow Sea. The issue of waste disposal at sea is subject to the 1996 Protocol to the Convention on the Prevention of Marine Pollution by Dumping of Wastes and Other Matter commonly called London Protocol. China, one of the contracting parties declared that if China becomes a party to a dispute concerning the interpretation and application of the Protocol, the Arbitral procedure of the Protocol shall only be applied with written consent of the Government of China according to the Article 16.5 of the Protocol at the time of its accession. The Article allows any State may declare that, when it is a party to dispute about the interpretation or application of precautionary approach or polluter pay principle, its consent will be required before the dispute may be settled by means of the Arbitral procedure of the Protocol. This paper analyzes the legal basis of Chinese declaration and its implication to parties that may be in dispute with China using international precedents of similar nature and a game theory.