• 제목/요약/키워드: CAN Protocol

검색결과 4,416건 처리시간 0.026초

VANET 환경에서 멀티 비콘을 적용한 충돌 회피 알고리즘에 관한 연구 (A Study of Collision Avoidance Algorithm Based on Multi-Beacon in the Vehicular Ad-hoc Network)

  • 김재완;엄두섭
    • 한국IT서비스학회지
    • /
    • 제11권4호
    • /
    • pp.195-213
    • /
    • 2012
  • In ubiquitous environments, the Intelligent Transportation System (ITS) protocol is a typical service used to improve the quality of life for humans. The Vehicular Ad-hoc Network (VANET) protocol, a part of ITS, needs further study with regards to its support for high reliability, high speed mobility, data transmission efficiency, and so on. The IEEE 802.11 standard provides a high data rate channel, but it was designed for peer-to-peer network protocols. IEEE 802.11p also provides a high data rate channel, however, it only facilitates communication between roadside and on-board equipment. A VANET has characteristics that enable its topology to change rapidly; it can also be expanded to a multi-hop range network during communication. Therefore, the VANET protocol needs a way to infer the current topology information relating to VANET equipped vehicles. In this paper, we present the Multi-Beacon MAC Protocol, and propose a method to resolve the problem of beacon collisions in VANET through the use of this Multi-Beacon MAC protocol. Evaluation of the performance of Multi-Beacon MAC protocol by means of both mathematical analyses and simulation experiments indicate that the proposed method can effectively reduce beacon collisions and improve the throughput and the delay between vehicles in VANET systems.

블록체인 기반 가상자산 관리를 위한 (1,3) 분산키의 비신뢰 기반 안전한 분산 복구 프로토콜 (Secure Recovery Protocol of (1,3) Distributed Key Share with Trustless Setup for Asset Management in Blockchain)

  • 배경일;박준후;류재철
    • 정보보호학회논문지
    • /
    • 제31권5호
    • /
    • pp.863-874
    • /
    • 2021
  • 비신뢰 기반 분산키 생성은 다수의 참여자가 개인키를 모르는 상태에서 개인키의 샤미르 비밀 공유를 공동 생성하는 프로토콜이다. 또한 이를 임계값 서명으로 확장할 경우 개인키를 복원하지 않고도 다수 참여자간의 암호 프로토콜을 통해서 디지털 서명을 생성할 수 있도록 한다. 본 연구는 활용성이 높은 (1,3) 샤미르 비밀 공유 구조에서 한 공유 값을 분실할 경우 동일한 개인키에 대한 전체 공유 값을 비신뢰 기반으로 재생성해서 공유 구조를 복구하는 프로토콜을 제안한다. 제안 프로토콜은 정확성과 기밀성 측면에서 분산키 생성과 동일한 보안 요건을 갖춘다. 블록체인 기반 가상자산 관리에 적용할 경우 안전한 개인키 관리와 서명 권한의 위임 및 불능화를 가능하게 한다.

Adaptive Range-Based Collision Avoidance MAC Protocol in Wireless Full-duplex Ad Hoc Networks

  • Song, Yu;Qi, Wangdong;Cheng, Wenchi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3000-3022
    • /
    • 2019
  • Full-duplex (FD) technologies enable wireless nodes to simultaneously transmit and receive signal using the same frequency-band. The FD modes could improve their physical layer throughputs. However, in the wireless ad hoc networks, the FD communications also produce new interference risks. On the one hand, the interference ranges (IRs) of the nodes are enlarged when they work in the FD mode. On the other hand, for each FD pair, the FD communication may cause the potential hidden terminal problems to appear around the both sides. In this paper, to avoid the interference risks, we first model the IR of each node when it works in the FD mode, and then analyze the conditions to be satisfied among the transmission ranges (TRs), carrier-sensing ranges (CSRs), and IRs of the FD pair. Furthermore, in the media access control (MAC) layer, we propose a specific method and protocol for collision avoidance. Based on the modified Omnet++ simulator, we conduct the simulations to validate and evaluate the proposed FD MAC protocol, showing that it can reduce the collisions effectively. When the hidden terminal problem is serious, compared with the existing typical FD MAC protocol, our protocol can increase the system throughput by 80%~90%.

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

MS/TP 프로토콜에서 대역폭할당기법구현 및 실험적 검증 (Implementation of Bandwidth Allocation Scheme in the MS/TP Protocol)

  • 홍숭호;송원석;권영찬
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.52-55
    • /
    • 2004
  • Digital communication networks have become a core technology in advanced building automation systems. BACnet(${\underline{B}}uilding$ ${\underline{A}}utomation$ and ${\underline{C}}ontrol$ ${\underline{net}}works$) is a standard data communication protocol designed specifically for building automation and control systems. BACnet adopts Master-Slave/Token-Passing (MS/TP) protocol as one of its field level networks. In this study, we introduce a method of implementing bandwidth allocation scheme in the MS/TP protocol. The bandwidth allocation scheme improves the capability of real-time communication of the original MS/TP protocol. The bandwidth allocation scheme introduced in this paper can be easily implemented in the existing MS/TP protocol with a slight modification. In this study, we actually developed the hardware and firmware of MS/TP module in which bandwidth allocation scheme is implemented.

  • PDF

Improvement of CH selection of WSN Protocol

  • Lee, WooSuk;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • 제6권3호
    • /
    • pp.53-58
    • /
    • 2017
  • A WSN (Wireless Sensor Network) is a network that is composed of wireless sensor nodes. There is no restriction on the place where it can be installed because it is composed wirelessly. Instead, sensor nodes have limited energy. Therefore, to use the network for a long time, energy consumption should be minimized. Several protocols have been proposed to minimize energy consumption, and the typical protocol is the LEACH protocol. The LEACH protocol is a cluster-based protocol that minimizes energy consumption by dividing the sensor field into clusters. Depending on how you organize the clusters of sensor field, network lifetimes may increase or decrease. In this paper, we will improve the network lifetime by improving the cluster head selection method in LEACH Protocol.

BACnet/IP 프로토콜에서 BBMD의 결함허용 기능 구현 (Implementation of Fault Tolerant BBMD Mechanism in BACnet/IP Protocol)

  • 조수운;홍승호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.107-109
    • /
    • 2005
  • BACnet(Building Automation and Control networks) is a standard data communication protocol designed specifically for building automation and control systems. BACnet provides BACnet/IP Protocol for data communication through the internet. BACnet device transmits BACnet broadcast messages and BACnet/IP messages using conventional IP technologies. Specially, BBMD(BACnet Broadcasting Management Device) is used to deliver BACnet broadcast messages. In this study, we propose a mechanism of fault tolerant BBMD in the BACnet/IP protocol. The Fault Tolerant BBMD mechanism(FTBM) improves the connectivity of BACnet/IP networks by inheriting the operation of BBMD in the networks. The FTBM is implemented with added functions to the original BACnet/IP protocol so that it can be applied together with original BACnet/IP devices. We also prove the FTBM's backward compatibility with original BACnet/IP protocol using experimental analysis.

  • PDF

A Grid-based Efficient Routing Protocol for a Mobile Sink in Wireless Sensor Networks

  • Lee, Taekkyeun
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권2호
    • /
    • pp.35-43
    • /
    • 2018
  • In this paper, we propose a grid-based efficient routing protocol for a mobile sink in wireless sensor networks. In the proposed protocol, the network is partitioned into grids and each grid has a grid head. For the efficient routing to a mobile sink, the proposed protocol uses a mobile sink representative node to send the data to a mobile sink and grid heads are used as a mobile sink representative node. Furthermore, the proposed protocol uses nodes in the boundary of the center grid as position storage nodes. The position storage nodes store the position of a mobile sink representative node and provide source nodes with it for data delivery. With these features, the proposed protocol can reduce a lot of overhead to update the position information and improve the delay of data delivery to a mobile sink. The proposed protocol performs better than other protocols in terms of the delay and the energy consumption per node in the performance evaluation.

외국인 환자 입원간호 프로토콜 개발 연구 (Development of Nursing Protocols for Hospitalized Foreign Patients)

  • 김금순;안정원;최윤경;서수량
    • 임상간호연구
    • /
    • 제22권2호
    • /
    • pp.161-172
    • /
    • 2016
  • Purpose: The purpose of this study was to develop a nursing protocol for care of hospitalized foreign patients based on necessary nursing care and to evaluate content validity and practical applicability. Methods: A survey was conducted to identify the need for protocol development and to prioritize necessary content to be included in the protocol (N=110). A draft protocol was developed, and 7 experts and 115 nurses evaluated content validity and practical applicability of the protocol. Results: Results of the needs survey showed that all participants agreed there is a need for a protocol. Based on the survey results, a protocol was developed which included: regional culture and healthcare, admission/discharge care, surgical care, pain management, care in diagnostic testing, medication administration, and blood transfusion. Score on the experts' evaluation of content validity of the protocol was $3.66{\pm}0.28$. Practical applicability score was $3.61{\pm}0.29$ in the experts' group and $3.16{\pm}0.11$ in the nurses' group. Total score for validity of the overall content was $29.46{\pm}5.62$. Conclusion: The nursing protocol developed in this study for care of hospitalized foreign patients can contribute to improvement in quality of nursing care for these patients and can also be used as a teaching guideline to educate nurses.

Modeling and Interoperability Test Case Generation of a Real-Time QoS Monitoring Protocol

  • Chin, Byoung-Moon;Kim, Sung-Un;Kang, Sung-Won;Park, Chee-Hang
    • ETRI Journal
    • /
    • 제21권4호
    • /
    • pp.52-64
    • /
    • 1999
  • QoS monitoring is a kind of real-time systems which allows each level of the system to track the ongoing QoS levels achieved by the lower network layers. For these systems, real-time communications between corresponding transport protocol objects is essential for their correct behavior. When two or more entities are employed to perform a certain task as in the case of communication protocols, the capability to do so is called interoperability and considered as the essential aspect of correctness of communication systems. This paper describes a formal approach on modeling and interoperability test case generation of a real-time QoS monitoring protocol. For this, we specify the behavior of flow monitoring of transport layer QoS protocol, i.e., METS protocol, which is proposed to address QoS from an end-to-end's point of view, based on QoS architecture model which includes ATM net work in lower layers. We use a real-time Input/Output finite State Machine to model the behavior of real-time flow monitoring over time. From the modeled real-time I/OFSM, we generate interoperability test cases to check the correctness of METS protocol's flow monitoring behaviors for two end systems. A new approach to efficient interoperability testing is described and the method of interoperability test cases generation is shown with the example of METS protocol's flow monitoring. The current TTCN is not appropriate for testing real-time and multimedia systems. Because test events in TTCN are for message-based system and not for stream-based systems, the real-time in TTCN can only be approximated. This paper also proposes the notation of real-time Abstract Test Suite by means of real-time extension of TTCN. This approach gives the advantages that only a few syntactical changes are necessary, and TTCN and real-time TTCN are compatible. This formal approach on interoperability testing can be applied to the real-time protocols related to IMT-2000, B-ISDN and real-time systems.

  • PDF