• Title/Summary/Keyword: Application protocol

Search Result 1,507, Processing Time 0.028 seconds

A Study on the Application of Offset Project for GHG Emission Reduction in Refrigerant Sector - CDM, California Compliance Offset Program - (냉매부문 온실가스 감축을 위한 외부감축사업 활용에 관한 조사 연구 - CDM, 캘리포니아 상쇄제도를 중심으로 -)

  • Park, Yeon-Hwa;In, Eun-Jeong;Kim, Hong-Rok
    • Journal of Climate Change Research
    • /
    • v.7 no.3
    • /
    • pp.283-288
    • /
    • 2016
  • In this study, applicability of GHG ETS Offset Program in Korea for a refrigerant sector was analyzed by reviewing foreign management policy and project status in progress related to refrigerants in the disposal stage. In order to derive the implication of the domestic Offset Program, it was looked into approved offset projects and certified offset credits current state in Korea. Offset Program has approved 22 methodologies up to the present, so it is necessary to enhance the accessibility to GHG reduction in various industrial sector including the refrigerant sector by developing appropriate methodologies. In this study firstly, it was investigated that management regulation of countries are managing the refrigerants in the disposal stage such as United States, Japan, Australia. Secondly, of CDM methodologies there were two methodologies associated with the refrigerant reduction(treatment), which were decomposition HFC-23 and destruction of HFC-134a. Also there were a non-registered methodology about destruction of HFC-134a of end of life vehicles. Lastly, in California according to Compliance Offset Program, there was Compliance Offset Protocol in ODS Projects that provided eligible conditions. Based on the review, it was examined the possible conditions for domestic offset project for refrigerant sector

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

A Method to Enhance the Security of ZKIP with Weak Keys and Its Application (약한 키를 가지는 대화식 영지식 증명의 안전성 강화 방법과 그 응용)

  • 양대헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.33-42
    • /
    • 2002
  • We present a systematic way to armor a zero-knowledge interactive proof based identification scheme that has badly chosen keys. Keys are sometimes mistakenly chosen to be weak(neither random nor long), and a weak key is often preferred to a strong key so that it might be easy for human to remember. Weak keys severely degrade the security of ZKIP based identification schemes. We show using off-line guessing attack how the weak key threats the security of ZlKIP based identification schemes. For the proper usage of ZKIP, we introduce a specialized form of ZKIP, which has a secret coin-tossing stage. Using the secret coin tossing, a secure framework is proposed for ZKIP based identification schemes with weak key in the ideal cipher model. The framework is very useful in password based authentication and key exchange protocol

A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT

  • Tandon, Aditya;Kumar, Pramod;Rishiwal, Vinay;Yadav, Mano;Yadav, Preeti
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1317-1341
    • /
    • 2021
  • Nowadays, the Internet of Things (IoT) is adopted to enable effective and smooth communication among different networks. In some specific application, the Wireless Sensor Networks (WSN) are used in IoT to gather peculiar data without the interaction of human. The WSNs are self-organizing in nature, so it mostly prefer multi-hop data forwarding. Thus to achieve better communication, a cross-layer routing strategy is preferred. In the cross-layer routing strategy, the routing processed through three layers such as transport, data link, and physical layer. Even though effective communication achieved via a cross-layer routing strategy, energy is another constraint in WSN assisted IoT. Cluster-based communication is one of the most used strategies for effectively preserving energy in WSN routing. This paper proposes a Bio-inspired cross-layer routing (BiHCLR) protocol to achieve effective and energy preserving routing in WSN assisted IoT. Initially, the deployed sensor nodes are arranged in the form of a grid as per the grid-based routing strategy. Then to enable energy preservation in BiHCLR, the fuzzy logic approach is executed to select the Cluster Head (CH) for every cell of the grid. Then a hybrid bio-inspired algorithm is used to select the routing path. The hybrid algorithm combines moth search and Salp Swarm optimization techniques. The performance of the proposed BiHCLR is evaluated based on the Quality of Service (QoS) analysis in terms of Packet loss, error bit rate, transmission delay, lifetime of network, buffer occupancy and throughput. Then these performances are validated based on comparison with conventional routing strategies like Fuzzy-rule-based Energy Efficient Clustering and Immune-Inspired Routing (FEEC-IIR), Neuro-Fuzzy- Emperor Penguin Optimization (NF-EPO), Fuzzy Reinforcement Learning-based Data Gathering (FRLDG) and Hierarchical Energy Efficient Data gathering (HEED). Ultimately the performance of the proposed BiHCLR outperforms all other conventional techniques.

A Design of Blockchain-based LoRa Multi-hop Network for Smart Grid (스마트 그리드를 위한 블록체인 기반 LoRa 멀티홉 네트워크 설계)

  • Jeon, Seongho;Kim, Seungku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.440-448
    • /
    • 2021
  • This paper presents problems of network technology in smart grid and implements a blockchain-based LoRa multi-hop network to solve them. Since some smart grid applications are operated in harsh environments, it is difficult to establish communication infrastructure. We propose a LoRa network with multi-hop using the Flooding routing protocol. Smart grid environment composes an independent network using various power grid protocols depending on the application. Since this has a problem that an independent infrastructure must be established for each network, a single gateway device supports multiple power grid protocols to implement a method for network integration. Lastly, the author applied Hyperledger-based blockchain to the LoRa network to ensure the integrity of data in a smart grid environment, and strengthened security by physically distributing it. After constructing the three suggestions on the actual test bed, we confirmed that the network operates normally through experiments.

Policy-based In-Network Security Management using P4 Network DataPlane Programmability (P4 프로그래머블 네트워크를 통한 정책 기반 인-네트워크 보안 관리 방법)

  • Cho, Buseung
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.3-10
    • /
    • 2020
  • Recently, the Internet and networks are regarded as essential infrastructures that constitute society, and security threats have been constantly increased. However, the network switch that actually transmits packets in the network can cope with security threats only through firewall or network access control based on fixed rules, so the effective defense for the security threats is extremely limited in the network itself and not actively responding as well. In this paper, we propose an in-network security framework using the high-level data plane programming language, P4 (Programming Protocol-independent Packet Processor), to deal with DDoS attacks and IP spoofing attacks at the network level by monitoring all flows in the network in real time and processing specific security attack packets at the P4 switch. In addition, by allowing the P4 switch to apply the network user's or administrator's policy through the SDN (Software-Defined Network) controller, various security requirements in the network application environment can be reflected.

Analysis of Disinfection Practices in Foodservice Operations According to the Application of Hazard Analysis and Critical Control Point (식품안전관리인증기준 적용 여부에 따른 급식시설의 소독 실태 분석)

  • Park, Min-Seo;Lee, Hye-Yeon;Bae, Hyun-Joo
    • Journal of the FoodService Safety
    • /
    • v.2 no.2
    • /
    • pp.103-110
    • /
    • 2021
  • This study was conducted to compare and evaluate the difference in washing and disinfection when the Hazard Analysis and Critical Control Point (HACCP) protocol was applied to foodservice operations. The results of the survey were as follows: Among the 116 foodservice operations surveyed, 67.2% were HACCP-compliant and 32.8% were not HACCP-compliant. Also, 62.9% served meals once daily, and 79.3% conducted food safety education once a month. Compared to HACCP non-compliant foodservice operations, the disinfection performance of HACCP-compliant operations was significantly better concerning worktables (p<0.001), food inspection tables (p<0.001), preparation tables for distribution (p<0.01), serving tables (p<0.01), overflow and trenches(p<0.05), sinks (p<0.05), and insect attracting lamps (p<0.01). Similarly, the disinfection performance of HACCP-compliant foodservice operations was significantly better for 18 cooking utensils and personal tools such as food slicers (p<0.001), multiple cooking machines (p<0.05), tray carts (p<0.001), stainless steel tools (p<0.001), rubber gloves (p<0.05). Worktables (45.1%), serving tables (29.6%), sinks (37.0%), and scales (21.6%) were most often disinfected 'at the end of each task', while food inspection tables (36.5%), food preparation tables for distribution (31.2%), dish machines (34.2%), overflow and trenches (25.7%), and floors (25.8%) were most often disinfected 'once a day'. All cooking utensils were most often disinfected 'at the end of each task'. 'Chemical disinfection' was most frequently used in all foodservice facilities. To improve the food safety management of foodservice operations, it is necessary to apply the HACCP protocol and comply with the washing and disinfection manual.

CoSace: A Windows WebDAV Client Supporting Effective Collaborative Works (CoSpace: 효과적인 협업 작업을 지원하는 윈도우즈 웹데브 클라이언트)

  • Lee, Hong-Chang;Park, Jin-Ho;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.79-89
    • /
    • 2009
  • As an IETF standard protocol, WebDAV provides infrastructure for managing and authoring resources and supports asynchronous collaborative authoring on the Web. The CoSlide server is an extension of the Jakarta Slide WebDAV server, providing various workspaces and collaborative services through the WebDAV protocol. The CoSlide server supports workspaces for storing and sharing information of various users, and provides environment for effective collaborative authoring. Actual collaboration activities are performed through a collaboration client software which provides collaboration services along with the CoSlide server. In this paper, we describe the development of the CoSpace client which operates in association with the CoSlide server, presenting effective collaborative environment. The CoSpace client provides user interfaces for accessing and controlling the resources of each workspace on the CoSlide server. In particular, CoSpace provides the facility to launch an authoring application from its workspace view, automatic locking, and downloading the content to be edited, and resource movement using mouse drag & drop.

Evaluation Of LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol

  • Paul, Timothy D;Rathinasabapathy, Vimalathithan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1540-1560
    • /
    • 2022
  • Latest technological innovation in the development of compact lower power radios has led to the explosion of Internet of Things. With Wi-Fi, Zigbee and other physical layer protocols offering short coverage area there was a need for a RF protocol that had a larger coverage area with low power consumption. LoRa offers Long Range with lower power consumption. LoRa offers point to point and point to multipoint connections. with Single hop communication in place the need for routing protocols are eliminated. LoRa Wide Area Network stack can accommodate thousands of nodes under a single LoRa gateway with a single hop communication between the end nodes and LoRaWAN gateway. This paper takes an experimental approach to analyze the basic physical layer parameters of LoRa and the practical coverage offered by a LoRaWAN under highly dense urban conditions with variable topography. The insights gained from the practical deployment of the LoRaWAN network, and the subsequent performance analysis is used to design a novel public utility monitoring platform. The second half of the papers is designing a robust platform to integrate both existing wired sensor water meters, current and future generation wireless water meters. The Common Automated Metering Platform is designed to integrate both wired sensors and wireless (LoRaWAN and Wi-Fi) supported water meters. This integrated platform reduces the number of nodes under each LoRaWAN gateway and thus improves the scalability of the network. This architecture is currently designed to accommodate one utility application but can be modified to integrate multi-utility applications.

Practical Application of Cryopreservation of In Vitro Grown Shoot Tips of Strawberry (Fragaria × ananassa Duch.) using Droplet-Vitrification

  • Jinjoo Bae;Young-Yi Lee;Jae-Young Song;Jung-Ro Lee;Munsup Yoon
    • Proceedings of the Plant Resources Society of Korea Conference
    • /
    • 2021.04a
    • /
    • pp.36-36
    • /
    • 2021
  • Cryopreservation has been broadly used as an efficient method for a long-term conservation for many types of plants especially vegetatively propagated plants. Among several cryopreservation methods, a droplet-vitrification was the most widely applicable and efficient method. Studies have developed protocols for strawberry using droplet-vitrification method and suggested the practical use of the protocol for large number of germplasm with a little modification. In this study, the droplet vitrification method of shoot tip has been tested on 31 accessions provided around the world. Shoot tips were precultured on Murashige and Skoog (MS) liquid medium supplemented with 0.3~0.5M sucrose. Precultured explants were osmoprotected with loading solution, 35% of PVS3 (C4, 17.5% glycerol and 17.5% sucrose) for 40 min and exposed to dehydration solution, PVS3 (B1, 50% glycerol and 50% sucrose) for 60 min. Then, the explants were transferred onto droplets containing 2.5 uL PVS3 on sterilized aluminum foils prior to direct immersion in liquid nitrogen (LN) for 1hr. The cryopreserved shoot tips were rapidly warmed in a water bath at 40C and then unloaded in MS with 0.8M sucrose for 40 min. The shoot tips were cultured in NH4NO3-free MS post culture medium for 2 weeks. Subsequently, the explants were moved to the MS medium for 6 weeks and evaluated the regrowth rate. By this droplet-vitrification protocol, twenty-four accessions showed at least 40% regrowth rate. Out of 24 accessions, 'Nonsan1ho' had the highest regeneration rate of 85.8% and 'Jumbo pureberry' had the lowest with 42.1%.

  • PDF