• Title/Summary/Keyword: CAN Protocol

Search Result 4,418, Processing Time 0.026 seconds

Drug Treatment Protocol for HIV Infected Patients Using State Feedback Integral Control Technique (상태궤환 적분제어기법을 이용한 HIV 감염 환자에 대한 약물 치료기법)

  • Jo, Nam-Hoon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.10
    • /
    • pp.1454-1459
    • /
    • 2015
  • In this paper, a drug treatment protocol is proposed for an HIV infection model that explicitly includes the concentration of healthy T cells, infected T cells, and HIV. Since real parameters of HIV infection model differ from patient to patient, most drug treatment protocols are not able to achieve the treatment goal in the presence of modelling errors. Recently, based on the nonlinear robust control theory, a robust treatment protocol has been proposed that deals with parameter uncertainties. Although the developed scheme is inherently complex, it cannot be applied to the case where all parameters are unknown. In this paper, we propose a new drug treatment protocol that is much simpler than the previous one but can achieve the treatment goal even when all model parameters are unknown. The simulation results verify that the substantial improvement in the performance can be achieved by the proposed scheme.

Routing Protocol for Energy Balancing in Energy Harvesting Wireless Sensor network (에너지 하베스팅 무선 센서네트워크에서 에너지균형을 위한 라우팅프로토콜)

  • Kang, Min-Seung;Park, Hyung-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.666-669
    • /
    • 2020
  • Energy harvesting sensor networks have the ability to collect energy from the environment to overcome the power limitations of traditional sensor networks. The sensor network, which has a limited transmission range, delivers data to the destination node through a multi-hop method. The routing protocol should consider the power situation of nodes, which is determined by the residual power and energy harvesting rate. At this time, if only considering the magnitude of the power, power imbalance can occur among nodes and it can induce instantaneous power shortages and reduction of network lifetime. In this paper, we designed a routing protocol that considers the balance of power as well as the residual power and energy harvesting rate.

A Study on the Implementation of CAN in the Distributed System of Power Plant (발전설비 분산제어 시스템에서 CAN 구축기술 연구)

  • Kim, Uk-Heon;Hong, Seung-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.6
    • /
    • pp.760-772
    • /
    • 1999
  • The CAN is a serial communication protocol for distributed real-time control and automation systems. Data generated from field devices in the distributed control of power plant are classified into three categories: real-time event data, real-time control data, non-real-time data. These data share a CAN medium. If the traffic of the CAN protocol is not efficiently controlled, performance requirements of the power plant system could not be satisfied. This paper proposes a bandwidth allocation algorithm that can be applicable to the CAN protocol. The bandwidth allocation algorithm not only satisfies the performance requirements of the real-time systems in the power plant but also fully utilizes the bandwidth of CAN. The bandwidth allocation algorithm introduced in this paper is validated using the integrated discrete-event/continuous-time simulation model which comprises the CAN network and distributed control system of power plant.

  • PDF

A QoS Aware multi-layer MAC(QAML-MAC) Protocol for Wireless Sensor Networks (무선센서네트워크에서 QoS 지원을 위한 다중계층 MAC 프로토콜)

  • Kim, Seong-Cheol;Park, Hyun-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.111-117
    • /
    • 2011
  • In this paper, we propose an QoS aware multi-layer MAC(QAML-MAC) protocol in a wireless sensor networks. Since the proposed protocol is based on the sleep-awake architecture, which save node's energy to prolong the entire network lifetime. For this purpose the QAML-MAC first classifies incoming data according to their transmission urgency and then saves them. The protocol also adapts the cross-layer concept to re-arrange the order of transmission with the same destination. So the delay can be decreased, which can not be obtained with the previous related protocols. And high priority data such as real-time multimedia or critical value in the field monitoring applications can be transmitted quickly, Furthermore the proposed protocol has advantage of decreasing transmitted data collisions using multiple layers of idle listening when there is no high-priority data. So energy consumptions of sensor nodes can be saved and the network lifetime can be prolonged.

Desing of the High-Perfrimance Group Transport Protocol To support QoS for Distributed Multimedia Application over ATM (ATM 상에서 분산 멀티미디어 응용을 위한 서비스 품질을 지원하는 고성능 그룹 트랜스포트 프로토콜 설계)

  • Song, Byeong-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.1059-1075
    • /
    • 1997
  • The transprot layer protocol for distrubuted multimedia applications in high speed network should gurantee the Quality of Serivce(QoS)requested by uwer.,The QoS Parmenters can be divied into two calssifications:those depend on the speed of a network such as bandiwidth,end-to-end transmission delay and throughput;and net- woek independent parameters such as various typed of group communications, retransmission method based on multimeda characteristic,acceptable packet wrror rate and transmission priority.In this proposed protocol,we divided user's QoS into performance redated parmeters and non-performance related parameters.The perform- ance-related paramenters are mapped into ATM traddic paramenters by the Distributed QoS Manger(DQM),the QoS manager,and the non-performance redlted paramenters are supported by the Distributed Multimedia Trans-port protocol(DMTP),a high-performance group transport protocol.Especially,becaues the DMTP is designed with considering the IP protocol,it can be efficiently used as an underlying protocol not onlu in ATM,but also in Ethernet,Token ring and FDDI LAN.

  • PDF

Design of an Efficient User Authentication Protocol Using subgroup of Galois Field (유한체의 부분군을 이용한 효율적인 사용자 인증 프로로콜 설계)

  • 정경숙
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.105-113
    • /
    • 2004
  • If the protocol has fast operations and short key length, it can be efficient user authentication protocol Lenstra and Verheul proposed XTR. XTR have short key length and fast computing speed. Therefore, this can be used usefully in complex arithmetic. In this paper, to design efficient user authentication protocol we used a subgroup of Galois Field to problem domain. Proposed protocol does not use GF($p^6$) that is existent finite field, and uses GF($p^2$) that is subgroup and solves problem. XTR-ElGamal based user authentication protocol reduced bit number that is required when exchange key by doing with upside. Also, Proposed protocol provided easy calculation and execution by reducing required overhead when calculate. In this paper, we designed authentication protocol that is required to do user authentication.

  • PDF

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

Robust Matrix-based RFID Mutual Authentication Protocol (견고한 행렬기반 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11C
    • /
    • pp.883-891
    • /
    • 2008
  • In 2006, Lee and Ahn proposed a matrix-based RFID authentication protocol which eliminates the security problems in HB and $HB^+$ RFID authentication protocols. Their proposed protocol provides the following three merits: (1) it reduces the computational costs of the RFID tag. (2) it reduces the communication overhead between the reader and the tag. (3) it protects the user privacy. However, this paper points out that Lee and Ahn's proposed protocol is insecure to various attacks because it does not provide mutual authentication which the RFID tag does not authenticate the legality of the RFID reader unlike their claims. In addition, this paper proposes an improved matrix-based RFID mutual authentication protocol that can provide the mutual authentication. As a result, the proposed protocol not only can provide strong security and but also guarantee high efficiency because it reduces the communication rounds compare with Lee-Ahn's protocol.

A Protocol Analyzer for SW based Multimedia Communication System (SIP 기반 멀티미디어 통신 시스템을 위한 프로토콜 분석기)

  • Jung In-hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.4
    • /
    • pp.312-333
    • /
    • 2005
  • SIP(Session Initiation Protocol) has been proposed for session control protocol of Internet multimedia communication system like VoIP(Voice over IP). SIP has complicated session control steps to support various kinds of audio and video formats and to assure service quality of real time data communication. Up until now, existing protocol analyzers can not provide such detailed information of SIP based communication system. In this paper, therefore, we propose a new protocol analyzer as a tool that can analyze and diagnose SIP based multimedia communication system throughout the session initiation, data exchange and session change steps. The propose traffic analyzer, which is called STAT(SIP based Traffic Analysis Tool), Is implemented on Winder's environment so that it is generally usable and extensible. Since STAT analyze low level packets captured via Ethernet broadcasting property, it is able to provide session status and real time traffic monitoring information without any affection to the communication system. The STAT which is implemented in this paper. therefore, is expected to be a useful tool for developing and managing of a SIP based multimedia communication system.

An Improved Protocol for the Secure Mobile IPv6 Binding Updates (안전한 모바일 IPv6 바인딩 갱신을 위한 개선된 프로토콜)

  • You, Il-Sun;Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.605-612
    • /
    • 2004
  • In MIPv6, unauthenticated binding updates expose the involved MN and CN to various security attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols have been proposed. In this paper, we pro-pose a novel protocol for the secure binding updates in MIPv6, which can resolve the drawbacks of the Deng-Zhou-Bao's protocol [2], by adopt-ing Aura's CGA scheme with two hashes [9]. Aura's scheme enables our protocol to achieve stronger security than other CGA-based protocols without a trusted CA, resulting in less cost of verifying the HA's public key than the Deng-Zhou-Bao's protocol. Through the comparison of our protocol with other protocols such as the Deng-Zhou-Bao's protocol, CAM-DH and SUCV, we show that our protocol can provide better performance and manageability in addition to stronger security than other approaches.