• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.029 seconds

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.504-523
    • /
    • 2014
  • This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.

BACnet/ZigBee-based Lighting Control System (BACnet/ZigBee 프로토콜 기반의 조명제어시스템)

  • Chon, Y.J.;Park, T.J.;Park, D.K.;Hong, S.H.
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.117-119
    • /
    • 2006
  • BACnet(Building Automation and Control networks) is a standard data communication protocol designed specifically for building automation and control systems. BACnet provides five options for datalink layer protocols and these five datalink layer options can be applied with various transmission media. Recently wireless technology prevails in automation area. ZigBee is a standard protocol based on IEEE 802.15.4 for low-speed wireless communication network. In this study, we propose a BACnet/ZigBee model that uses ZigBee wireless technology in a BACnet communication network system as a wireless datalink layer protocol. We also applied this model to a lighting control system to evaluate the feasibility of proposed technology. The technology proposed in this paper can extend the application of BACnet not only for building automation but also for home automation by taking the advantages of ZigBee wireless communication technology in BACnet communication network systems.

  • PDF

Introduction to IPSEC(Internet Protocol Security) (인터넷 보안 프로토콜 IPSEC)

  • Choi, Y.B.;Hwang, S.O.;Lee, J.S.;Yoon, K.S.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.6 s.60
    • /
    • pp.51-63
    • /
    • 1999
  • IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

Evaluating an (m, k)-firm Deadline Real-time Stream Based on a Reliable Transport Protocol in Wireless Sensor Networks

  • Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.129-134
    • /
    • 2012
  • As application-specific requirements for wireless sensor networks emerge, both real-time and reliable communications become major research challenges in wireless sensor networks due to the many constraints on nodes and wireless links. To support these services, several protocols have been proposed. However, since most of them were designed as well as developed for general purpose applications, it is not recommended that they be directly adapted to applications with special requirements. In this paper, we propose a way to extend the current reliable transport protocol to cover a special real-time service, the (m,k)-firm deadline stream, in wireless sensor networks. While the proposed scheme is basically built on the PSFQ protocol for reliability, some features have been newly developed to support the (m,k)-firm stream efficiently. Finally, simulation results are given to demonstrate the feasibility of the proposed scheme in high traffic and with failed links.

A Simple Cost Analysis of Host ID-LOC Separating protocol using SDN Features

  • Lee, Chan-Haeng;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.41-47
    • /
    • 2016
  • The IP address used in the Internet has the role of both identifier and locator to bind a host and the application, however, this binding restricts some functions such as mobility and multi-homing. As a result, we suggested a host ID-LOC separation protocol using DHT with SDN features. The proposed scheme is a network-based scheme, and uses IPv6 addresses. The underlying network is partitioned into Host Identity domain and IP domain for identifiers and locators. In this paper, we present a simple cost model for analyzing both the proposed scheme and one of the previous works, the MOFI. The result of cost analysis shows better performance of the proposed scheme.

Performance Evaluation of Distributed Clustering Protocol under Distance Estimation Error

  • Nguyen, Quoc Kien;Jeon, Taehyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.11-15
    • /
    • 2018
  • The application of Wireless Sensor Networks requires a wise utilization of limited energy resources. Therefore, a wide range of routing protocols with a motivation to prolong the lifetime of a network has been proposed in recent years. Hierarchical clustering based protocols have become an object of a large number of studies that aim to efficiently utilize the limited energy of network components. In this paper, the effect of mismatch in parameter estimation is discussed to evaluate the robustness of a distanced based algorithm called distributed clustering protocol in homogeneous and heterogeneous environment. For quantitative analysis, performance simulations for this protocol are carried out in terms of the network lifetime which is the main criteria of efficiency for the energy limited system.

Design and Verification of Satellite B-ISDN Multi-Signalling Protocol (위성 B-ISDN 다중신호 프로토콜의 설계 및 검증)

  • 박석천;남기모;김동영;변지섭;최동영
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.13-16
    • /
    • 1999
  • The terrestrial/satellite hybrid network may replace or supply the terrestrial network in some areas or certain application. Futhermore, it can play an important role in the development of B-ISDN due to their features of flexible wide coverage, independent of ground distances and geographical constraints, multiple access and multipoint broadcast. Also, satellite have the capability to supply terrestrial ATM and B-ISDN with flexible links for access networks as well as trunk networks. This paper describes the design and verification of the interworking protocol between terrestrial B-ISDN and satellite network. For the verification, the designed interworking protocol is modeled by Petri-net and analyzed by reachability tree.

  • PDF

Realization of Water AMR Network using ZigBee Protocol (ZigBee 무선표준을 이용한 상수도 원격검침 네트워크 구현)

  • Kwon, Jong-Won;Park, Yong-Man;Odgerel, Odgerel;Kim, Hie-Sik
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.168-170
    • /
    • 2006
  • In this paper, authors realize water AMR(Automatic Meter Reading) network using low power ZigBee protocol included routing ability for improving wireless communitation error detection and network range. ZigBee wireless standard is an important standard of the field related Ubiquitous industry and recently has application to Home-Network. It's special features are to spend low power and to include routing ability each terminator. Because of these features, authors realize water AMR system on Embedded system using ZigBee protocol for applying to transfer data between a water meter and RF module equipped with a water meter in each house.

  • PDF

Improved TDMA with Superframe Structure-based CSMA/CA MAC protocol for Wireless Body Area Network (WBAN을 지원하기 위한 개선된 슈퍼프레임 구조를 가지는 TDMA 기반의 CSMA/CA MAC 프로토콜)

  • Lee, Jae-Soo;Ahn, Jeong-Keun;Yun, Chan-Young
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.1
    • /
    • pp.87-93
    • /
    • 2012
  • Due to the development of information and communication, there is a rising interest on WBAN(Wireless Body Area Network) that maintain and check the human being health. According to the application of different quality of service and a special mechanism for transferring medical data are required in WBAN environment. In this paper, we proposed the new formed superframe that has CSMA/CA based TDMA scheduling and CSMA/CA used IEEE 802.15.4 in order to process emergency data and on-demand data in WBAN environment. We estimated performance of the proposed MAC protocol by compared performance of other MAC protocols that are IEEE 802.15.4 MAC protocl and Z-MAC protocol has contention access period based TDMA scheduling.

Secure-CoAP Protocol over NoSec applying the concept S-Broker (S-Broker 개념을 적용한 NoSec 기반의 Secure-CoAP Protocol)

  • Heo, ung;Kim, youngse;Kim, keecheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.785-788
    • /
    • 2016
  • 최근 IoT 프로토콜 가운데 가장 활발히 논의되는 프로토콜로 CoAP(Constrained Application Protocol)이 있다. CoAP은 4가지 보안모드로 운영된다. 그 중 3가지 모드인 PresharedKey, RawPublicKey, Certificate 모드의 경우 DTLS(Datagram Transport Layer Security)가 적용된 방식이다. 반면 NoSec 모드는 DTLS가 적용되지 않은 기본방식이다. 본 논문에서는 DTLS의 복잡한 Handshake 방식으로 인한 전력소모 및 Performance의 저하를 고려한 새로운 방식을 제안한다. NoSec 환경의 CoAP 프로토콜에 S-Broker(Secure-Broker)를 적용한 security 및 performance 향상 방안이다. 제안한 방식으로 경량화 통신을 구현하여 무결성과 보안 강도를 높였다. 추가적으로 Proxy의 forwarding 기능과 caching 기능을 구현하여 성능의 향상을 도모한다.