• 제목/요약/키워드: CAN Protocol

검색결과 4,416건 처리시간 0.029초

WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜 (Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP)

  • 정경숙;홍석미;정태충
    • 정보보호학회논문지
    • /
    • 제13권1호
    • /
    • pp.11-18
    • /
    • 2003
  • 인터넷이 무선 구간으로 확대됨에 따라 보안측면에서도 효율적이고 안전한 새로운 보안 프로토콜이 필요하게 되었다. 본 논문에서는 이러한 요구를 해결하기 위해 통신량이 적을 뿐만 아니라 신뢰 기관이 비밀키를 보유함으로 인해서 발생하는 문제점을 해결할 수 있는 새로운 프로토콜을 제안하고자 한다. 이 프로토콜은 비대화형 불확정 전송 프로토콜로서 기존의 안전도가 검증된 EIGamal 공개키 알고리즘을 기반으로 하였다. 제안된 프로토콜은 불확정 전송 프로토콜이므로 서버와 클라이언트간의 통신량을 줄일 수 있고, 챌린지 선택 비트(challenge selection bit)를 사용하여 클라이언트가 서버에 인증되는 확률을 줄임으로서 프로토콜의 효율성을 높였다. 또한 이중지수승(double exponentitation)을 사용함으로써 메시지를 복호화 할 경우 기존의 이산대수나 소인수문제보다 어렵게 되므로 프로토콜의 안정성을 높일 수 있다.

p-Persistent MAC Protocol for WDM Ring Networks

  • 소원호;김영천
    • 한국통신학회논문지
    • /
    • 제32권9B호
    • /
    • pp.589-597
    • /
    • 2007
  • In this paper, a WDM metro ring consisting of access nodes with $FT-FR^n$ (Fixed Transmitter - n Fixed Receivers) is considered. A trade-off exists between node throughput and transmission fairness because the access nodes share wavelength channels. In order to eliminate the transmission unfairness and to increase throughput, the p-persistent medium access control (MAC) protocol is proposed: each node uses an empty optical slot to transmit a packet and make it available with the extraction of a transferred packet at the source access node, called source-stripping. The local empty slot can be used to transfer a head-of-line packet in the local buffer with probability p or it is used for the next downstream nodes with 1-p. The proposed MAC protocol provides better node throughput than the non-persistent protocol and exhibits better fairness index than the 1-persistent protocol in WDM ring networks. In addition, numerical analysis shows that the proposed MAC protocol maximizes the node throughput under uniform traffic conditions. For more detailed results, we use the network simulation under Poisson and self-similar traffic. Furthermore, unpredictable traffic constructed by the combination of the former and the latter is also considered. The reasonable probability of the p-persistent protocol for a given architecture can be determined through simulation.

IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location- Awareness Services

  • Kim, Baek-Gyu;Kang, Soon-Ju
    • Journal of Computing Science and Engineering
    • /
    • 제2권4호
    • /
    • pp.412-427
    • /
    • 2008
  • We propose ID-exchange protocol for Connectionless Location-Awareness Service (CLAS) to locate mobile nodes in indoor sensor network. When adapting location-awareness service to sensor network, the target system must be designed in accordance with various metrics which reflect the system requirement. We especially consider sustainability of the existing service which has been provided for its original purpose, such as environmental monitoring. The detailed meaning of sustainability here is that, even if location-awareness service is newly added to the existing service, the system must be assured to retain a stable network condition, and to deal with newly caused traffic properly. The CLAS ID-exchange protocol is especially designed for fixture and mobile nodes communication to achieve these properties. The protocol operates on 802.15.4 MAC layer to make mobile node work independently of the procedure to build routing table of fixture node, so a stable routing condition can be achieved even if there are many mobile nodes. Moreover, the dedicated frequency channel is assigned only for this protocol, so that traffic caused by location-awareness service can be distributed to another channel. A real system adapting the protocol was implemented to monitor fire and authorities' positions. We verified the overhead and elapsed time for location-awareness. The result shows the proposed protocol has a high performance in detecting speed, traffic distribution, and stability of overall network.

최소 예약슬롯 보증 음성/데이타 집적 PRMA 프로토콜에 관한 연구 (A Study on the Voice/Data Integrated PRMA Protocol With the Minimum Reservation Slot Assured)

  • 김태규;조동호;윤용중
    • 한국통신학회논문지
    • /
    • 제18권2호
    • /
    • pp.250-260
    • /
    • 1993
  • PRMA(Packet Reservation Multiple Access) 프로토콜은 연집 트래픽 특성을 갖는 불특정다수의 단말기들이 공유채널을 엑세스하기 위해 서로 경쟁하는 환경하에서 음성 트래픽과 데이터 트래픽을 집적하여 서비스하는데 매우 효율적인 것으로 잘 알려져 있다. 그러나 PRMA 프로토콜에서는 부하가 커지면 예약채널의 용량이 영(Zero)으로 축소될 수도 있으므로 시스템이 불안정해지고 고부하 상태에서는 제대로 동작할 수 없다. 본 논문에서는 이러한 PRMA의 단점을 보완할 수 있으며 보다 안정되게 동작하는 음성/데이타 직접 PRMA 프로토콜을 제안하고, 프레임 및 슬롯구조를 제시하여, 제안된 프로토콜의 성능을 컴퓨터 시뮬레이션을 통하여 분석해 보았다. 시뮬레이션 결과, 기존의 방식에 비해 제안된 프로토콜이 보다 효율적으로 음성과 데이타를 집적할 수 있으며, 고부하 상태에서도 보다 안정되게 동작함을 알 수 있었다.

  • PDF

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment

  • Nam, Jung-Hyun;Kim, Moon-Seong;Paik, Ju-Ryon;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.751-765
    • /
    • 2012
  • Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks.

IMS 망에서 세션 모니터링을 위한 비쥬얼 프로토콜 분석기 (A Visual Protocol Analyzer for Session Monitoring over IMS Network)

  • 정인환*
    • 한국통신학회논문지
    • /
    • 제36권3B호
    • /
    • pp.195-207
    • /
    • 2011
  • 본 논문에서는 IMS 망에서 단말기간 세션 연결 정보를 그래픽으로 표현해주는 비쥬얼 프로토콜 분석기(VIPA: Visual IMS Protocol Analyzer)를 설계하고 구현한다. 구현된 프로토콜 분석기는 IMS 망에서 세션 설정을 위해 사용되는 SIP 프로토콜 정보를 패킷 단위로 수집하고 분석하여 세션 상태를 그래픽으로 표현함으로써 프로토콜 분석의 편의성을 제공한다. 기존의 프로토콜 분석기가 단말기 측면의 부분적인 세션 연결 상태만 보여주는 한계가 있었으나 구현된 프로토콜 분석기는 세션에 참여하는 모든 사용자 기기들 간의 세션 연결 상태를 확인할 수 있다.

중환자실 섬망예방을 위한 근거중심 간호중재 프로토콜 개발 (Development of an Evidence-Based Protocol for Preventing Delirium in Intensive Care Unit Patients)

  • 문경자;이선미
    • 임상간호연구
    • /
    • 제16권3호
    • /
    • pp.175-186
    • /
    • 2010
  • Purpose: Delirium can be a highly prevalent symptom in intensive care units but it may still be under-recognized despite its relation with inclined morbidity, mortality, cost, and readmission. Therefore, this study aimed to develop a protocol that covers risk factors and non-pharmacological interventions to prevent delirium in ICU patients. Methods: This study was conducted using methodological design, and it followed the Scottish Intercollegiate Guideline Network (SIGN) guideline development steps: 1) the scope of protocol was decided (population, intervention, comparison, and outcomes); 2) guidelines, systematic reviews, and protocols were reviewed and checked using methodology checklist; 3) the level of evidence and recommendation grades was assigned; 4) the appropriateness of recommendations was scored by experts; 5) the final protocol & algorithm was modified and complemented. Results: The evidence-based delirium prevention protocol was completed that includes predisposing factors, precipitating factors and recommendations with evidenced grades. Conclusion: This protocol can be used as a guide nurses in screening patients with high risk factors of delirium as well as in intervening the patients non-pharmacologically to prevent delirium.

Polling을 이용한 전력선 통신(PLC) 프로토콜의 설계 (Design of Power Line Communication Protocol using Polling Concept)

  • 임은정;강철신
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.31-34
    • /
    • 2005
  • In this paper, we proposed a MAC protocol which can be used in power line communications(PLC). In the power line communication network, the data signal cannot travel long distance because of a serious attenuation. Consequently, we need to have a number of repeaters (amplifiers) in order to recover the signal power, which causes flooding problem in the network The proposed MAC protocol uses polling concept and solves the flooding problem in the power line communication network. The proposed protocol can be applied to power line communication networks for automatic power distribution control system. A mathematical analysis has been carried out to estimate the performance of the proposed protocol.

  • PDF

Multiple-Packet Reception MAC Protocol Applying Pulse/Tone Exchange in MIMO Ad-Hoc Networks

  • Yoshida, Yuto;Komuro, Nobuyoshi;Ma, Jing;Sekiya, Hiroo
    • Journal of Multimedia Information System
    • /
    • 제3권4호
    • /
    • pp.141-148
    • /
    • 2016
  • This paper proposes a medium access control (MAC) protocol for multiple-input multiple-output (MIMO) ad-hoc networks. Multiple-packet receptions in MIMO systems have attracted as a key technique to achieve a high transmission rate. In the conventional protocols for multiple-packet receptions, timing offsets among multiple-frame transmissions cause frame collisions induced by hidden nodes, which degrades network performance. In the proposed protocol, transmission synchronization among hidden nodes can be achieved by applying pulse/tone exchanges. By applying the pulse/tone exchanges, multiple-packet receptions among hidden nodes can be achieved, which enhances network throughputs compared with the conventional protocol. Simulation results show effectiveness of the proposed protocol.

접근시간 간격 확인 방식을 이용한 RFID 보안강화 프로토콜 설계 (Design of RFID Cryptanalysis Strengthening Protocol Using Access Time Interval scheme)

  • 김성진;박석천
    • 한국컴퓨터정보학회논문지
    • /
    • 제11권6호
    • /
    • pp.193-200
    • /
    • 2006
  • RFID의 적용 범위는 점차 그 영역을 확대되고 있으나, 보안과 더불어 개인영역 침해에 대한 연구는 아직은 미흡한 실정이다. 본 논문에서는 기존 RFID 보안 프로토콜을 분석하고 정보보호와 프로토콜의 경량화 문제를 해결하기 위하여 접근시간간격과 경량화 RSA 알고리즘을 이용한 새로운 프로토콜을 제안한다. 제안된 프로토콜을 통해 양방향 정보 송수신에 대한 정보보호 문제를 해결하고 이를 구현하고자 한다.

  • PDF