• Title/Summary/Keyword: Broadcast protocol

Search Result 303, Processing Time 0.02 seconds

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

Development of The DCCP for Data Reliability in IP Traffic System (IP기반 교통시스템에서 데이터의 신뢰성을 위한 DCCP 개발)

  • Park, Hyun-Moon;Seo, Hae-Moon;Lee, Gil-Yong;Park, Soo-Hyun;Kim, Sung Dong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.7-17
    • /
    • 2010
  • ITS(Intelligent Transport System) as things are used for Broadcast service using TDMB/TPEG/NAVI rather than personal seamless service. It is attaching weight to Traffic information gathering, Charging, Settlement service. This research is applied to improve DCCP(Datagram Congestion Control Protocol) which has function as protecting data and preserving message boundary. The improving method is like that we solve data trust in UDP because Connection and Transmission overhead in UDP is less than in TCP. We fix the data loss which is generated from unordered delivery section of IP base wireless service by using DCCP protocol. We guarantee of connection with OBE(On-Board Equipment) and reliance about transmission of data by complement to mapping table and multi-hoping. Finally, We evaluate the performance about transmission of IP based data. We constructed a test-bed near research center for this test.

MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks

  • Kim, Sung-Won;Kim, Byung-Seo;Lee, In-Kyu
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.63-74
    • /
    • 2012
  • Multicast data communication is an efficient communication scheme, especially inmulti-hop ad hoc networks where the media access control (MAC) layer is based on one-hop broadcast from one source to multiple receivers. Compared to unicast, multicast over a wireless channel should be able to deal with varying channel conditions of multiple users and user mobility to provide good quality to all users. IEEE 802.11 does not support reliable multicast owing to its inability to exchange request-to-send/clear-to-send and acknowledgement packets with multiple recipients. Thus, several MAC layer protocols have been proposed to provide reliable multicast. However, additional overhead is introduced, as a result, which degrades the system performance. In this paper, we propose an efficient wireless multicast MAC protocol with small control overhead required for reliable multicast in multi-hop wireless ad hoc networks. We present analytical formulations of the system throughput and delay associated with the overhead.

Vehicle-to-Vehicle Broadcast Protocols Based on Wireless Multi-hop Communication (무선 멀티 홉 통신 기반의 차량간 브로드캐스트 프로토콜)

  • Han, Yong-Hyun;Lee, Hyuk-Joon;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.53-64
    • /
    • 2009
  • Inter-vehicular communication that propagates information without infrastructures has drawn a lot of interest. However, it is difficult to apply conventional ad-hoc routing protocols directly in inter-vehicular communication due to frequent changes in the network topology caused by high mobility of the vehicles. MMFP(Multi-hop MAC Forwarding) is a unicast forwarding protocol that transport packets based on the reachability information instead of path selection or position information. However, delivering public safety messages informing road conditions such as collision, obstacles and fog through inter-vehicular communication requires broadcast rather than unicast since these messages contain information valuable to most drivers within a close proximity. Flooding is one of the simplest methods for multi-hop broadcast, but it suffers from reduced packet delivery-ratio and high transmission delay due to an excessive number of duplicated packets. This paper presents two multi-hop broadcast protocols for inter-vehicular communication that extend the MMFP. UMHB(Unreliable Multi-Hop Broadcast) mitigates the duplicated packets of MMFP by limiting the number of nodes to rebroadcast packets. UMHB, however, still suffers from low delivery ratio. RMHB(Reliable Multi-Hop Broadcast) uses acknowledgement and retransmission in order to improve the reliability of UMHB at the cost of increase in transmission delay, which we show through simulation is within an acceptable range for collision avoidance application.

  • PDF

A improved back-off algorithm using the gaussian model in the vehicular networks (차량 간 통신에서 가우시안 모델을 적용한 개선된 백오프 알고리즘)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.225-230
    • /
    • 2012
  • When a car accident happened, the accident vehicle should broadcast a safe message to its neighbors in multi-hop. However, the pure flooding is difficult to protect a chain-reaction collision because of the frequent collision and the communication delay. To solve this problem, we proposes a back-off algorithm applied to the estimation of the neighbor node count using the t-distribution. And we proposes a MAC protocol preventing the communication delay by separating the neighbor's count collection channel and data channel. As a result, we show the frame reception success rate of our protocol improved more 10% than the previous protocol.

A New Optimistic Concurrency Control Method for Mobile Transactions (이동 트랜잭션을 위한 새로운 낙관적 동시성 제어 방법)

  • Kim, Chi-Yeon;Bae, Seok-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.439-446
    • /
    • 2003
  • A crucial limitation in environments where data is broadcast to very large client populations is the low bandwidth available for clients to communicate with servers. Many advanced applications are developed in mobile computing environments, but conventional concurrency controls are not suitable because of the low bandwidth of wireless network. In this paper, we propose a new optimistic concurrency control protocol for mobile transactions. In this protocol, mobile read-only transactions can be completed locally at the clients without additional communication, only mobile update transactions are sent to the server for global validation. Our protocol reduces unnecessary aborts occurred in the previous study using only conflict information. In addition to, our algorithm can detect and resolve non-serializable execution using by data table maintained in a server.

Enhanced Anti-Collision Protocol for Identification Systems: Binary Slotted Query Tree Algorithm

  • Le, Nam-Tuan;Choi, Sun-Woong;Jang, Yeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9B
    • /
    • pp.1092-1097
    • /
    • 2011
  • An anti-collision protocol which tries to minimize the collision probability and identification time is the most important factor in all identification technologies. This paper focuses on methods to improve the efficiency of tag's process in identification systems. Our scheme, Binary Slotted Query Tree (BSQT) algorithm, is a memoryless protocol that identifies an object's ID more efficiently by removing the unnecessary prefixes of the traditional Query Tree (QT) algorithm. With enhanced QT algorithm, the reader will broadcast 1 bit and wait the response from the tags but the difference in this scheme is the reader will listen in 2 slots (slot 1 is for 0 bit Tags and slot 2 is for 1 bit Tags). Base on the responses the reader will decide next broadcasted bit. This will help for the reader to remove some unnecessary broadcasted bits which no tags will response. Numerical and simulation results show that the proposed scheme decreases the tag identification time by reducing the overall number of request.

An MPEG-4 Compliant Interactive Multimedia Streaming Platform Using Overlay Networks

  • Kim, Hyun-Cheol;Patrikakis, Charalampos Z.;Minogiannis, Nikos;Karamolegkos, Pantelis N.;Lambiris, Alex;Kim, Kyu-Heon
    • ETRI Journal
    • /
    • v.28 no.4
    • /
    • pp.411-424
    • /
    • 2006
  • This paper presents a multimedia streaming platform for efficiently transmitting MPEG-4 content over IP networks. The platform includes an MPEG-4 compliant streaming server and client, supporting object-based representation of multimedia scenes, interactivity, and advanced encoding profiles defined by the ISO standard. For scalability purposes, we employ an application-layer multicast scheme for media transmission using overlay networks. The overlay network, governed by the central entity of the network distribution manager, is dynamically deployed according to a set of pre-defined criteria. The overlay network supports both broadcast delivery and video-on-demand content. The multimedia streaming platform is standards-compliant and utilizes widespread multimedia protocols such as MPEG-4, real-time transport protocol, real-time transport control protocol, and real-time streaming protocol. The design of the overlay network was architected with the goal of transparency to both the streaming server and the client. As a result, many commercial implementations that use industry-standard protocols can be plugged into the architecture relatively painlessly and can enjoy the benefits of the platform.

  • PDF

Performance Analysis of MAC Protocol for Packet Data Service in CDMA Based Mobile Communication Systems (CDMA 기반 이동통신 시스템에서의 패킷 데이터 서비스를 위한 MAC 프로토콜의 성능분석)

  • 박성수;조동호;송영재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.973-986
    • /
    • 1999
  • In this paper, we propose MAC protocol that consists of channel access mechanism and transmission mechanism to support effective wireless packet data service. In channel access mechanism, broadcast channel announces status information of random access channel, and mobile station tries random access based on status information. Also, mobile station has access probability to prevent collision increase due to transmission of short message. For effective transmission, mobile station changes transmission rate based on transmission queue status to adapt burst traffic characteristics. In restricted environments of transmission code and bandwidth, proposed protocol shows better performance than cdma2000 system.

  • PDF

A hybrid-vehicular communication systems using a gaussian model for sending a safe message (안전 메시지 전달을 위해 가우시안 모델을 적용한 하이브리드 차량 통신 시스템)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.161-166
    • /
    • 2012
  • When a car accident happened on a highway, the accident vehicle should broadcast a safe message to its neighbors in order to prevent a chain-reaction collision. Also, there is a problem that the estimation accuracy is low because of the memory limit from increasing the sampling count. In this paper, we proposes a HVC systems using a back-off algorithm applied to a gaussian model. And we proposes a MAC protocol preventing the communication delay by separating the neighbor count collection channel, data channel, and RSU communication channel. As a result, we show the frame reception success rate of our protocol improved about 10% than the previous protocol.