• Title/Summary/Keyword: CoAP

Search Result 298, Processing Time 0.024 seconds

THERMAL SATABILITY AND MAGNETORESISTANCE OF TOP SPIN VALVE WITH SYNTHETIC ANTIFERROMAGNET CoFe/Ru/CoFe/IrMn

  • J. Y. Hwang;Kim, M. Y.;K. I. Jun;J. R. Rhee;Lee, S. S.;D. G. Hwang;S. C. Yu;Lee, S. H.
    • Proceedings of the Korean Magnestics Society Conference
    • /
    • 2002.12a
    • /
    • pp.64-65
    • /
    • 2002
  • Recently the synthetic antiferromagnetic layer (SAF) has received much attention because it replaces the pinned layer of the conventional spin valve (CSV) sensors and its overall performance [1], The spin valve (SV) with SAF has the from buffer/F/Cu/APl/Ru/AP2/AF, where F is the soft ferromagnetic layer (typically NiFe with CoFe interfacial doping), AP1 and AP2 are two ferromagnetic layers (typically CoFe alloys) antiferromagnetically coupled through a thin Ru layer. (omitted)

  • PDF

Research for Adaptive Wireless AP Profile selection via Efficient network connection of Android System-based (안드로이드 시스템 기반의 적응적 무선 AP 프로파일 선택을 통한 효율적 네트워크 연결에 관한 연구)

  • Back, Jong-Kyung;Han, Kyung-Sik;Sonh, Seung-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.632-634
    • /
    • 2012
  • In order for the connection to the wireless network from the list of priorities of the wireless AP to AP profile automatic connection by selecting the preferred method to register a profile, which is determined at the time of the change, the user does not respond to the demands of the part. In this study, the frequency of the user's access in accordance with the wireless AP, and by creating a profile, the user needs to meet with regard to network access adaptive research.

  • PDF

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

DDoS Security Considerations When proposing a protocol for CoAP (CoAP을 위한 프로토콜 제안 시 DDoS 보안 고려사항)

  • Jo, Seoyeon;Gong, Seonghyeon;Seok, Byoung-jin;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.204-207
    • /
    • 2019
  • DDoS(Distributed Denial of Service) 공격은 네트워크상에서 다수의 시스템 협업으로 하나의 표적 시스템을 공격하여 서비스의 가용성을 침해하는 공격이다. 이는 점차 지능적인 방법으로 진화하고 있으며 특히 IoT를 대상으로 한 DDoS 공격이 증가하고 있다. 이기종의 기기들이 연결된 IoT는 기존 IT디바이스와 비교하여 제한된 자원을 가지고 있어 IoT 네트워크 특성을 고려한 DDoS 보안 기법이 요구된다. 국제 인터넷 표준화 기구 IETF에서 IoT를 지원하기 위해 제정한 CoAP(Constrained Application Protocol)은 기존 IT 네트워크와 호환성을 가진 응용 계층 프로토콜이다. 본 논문은 CoAP의 DDoS 공격 취약점과 대응 방안을 정리하고 새로운 프로토콜을 추가할 시 고려해야 할 사항을 제시한다.

Study on the Enhancement of Burning Rate of HTPB/AP Solid Propellants (HTPB/AP계 고체 추진제의 연소속도 증진 방안 연구)

  • Lee, Sunyoung;Ryu, Taeha;Hong, Myungpyo;Lee, Hyoungjin
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.21 no.4
    • /
    • pp.21-27
    • /
    • 2017
  • In this paper, in order to control the burning rate and pressure exponent of HTPB/AP/Al based propellant for the improvement of performance, the effect of the size ratio of AP particles and various contents of Butacene as burning catalyst on combustion properties was investigated. In the propellant formulation with both $28{\mu}m$ Al of 23% and Butacene of 3%, the burning rate and pressure exponent were increased with increasing the contents of $9{\mu}m$ AP particles. And the burning rate was increased with increasing the contents of Butacene with showing the relatively low pressure exponent in the propellant containing Butacene. However, the significant variations of pressure exponent by contents of Butacene were not observed.

GHG-AP Integrated Sink/Emission Inventories and Environmental Value Analysis in Vegetation Sector of Seoul (서울시 식생부문 온실가스-대기오염 통합 흡수/배출량 인벤토리 및 환경가치분석)

  • Jung, Jaehyung;Kwon, O-Yul
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.31 no.1
    • /
    • pp.72-82
    • /
    • 2015
  • We constructed greenhouse gas (GHG) and air pollution (AP) integrated sink/emission inventories and evaluated the environmental value for the vegetation sector in Seoul during year 2010. The data of vegetation, classified into four sectors of cultivated land, forest land, park and street tree, were obtained from Statistics Korea and Seoul City. Based on the previous studies, only $CO_2$ was chosen as GHG sink by vegetation. $NO_2$ and $SO_2$ were chosen as AP sink by vegetation, while isoprene, monoterpene, other VOC (OVOC) and NH3 were chosen as AP emission from vegetation. Estimation methodology and sink/emission factors were gathered from reports and published literatures. Estimated GHG sink by vegetation during year 2010 was 12,987,173 $tonCO_{2eq}$, of which approximately 1/4 was from pure vegetation and the remaining 3/4 from vegetation soil. AP sink and emission were estimated to be 23,309 tonAP and 2,629,797 tonAP, respectively. The analysis by administrative districts in Seoul revealed that among 25 districts, Seocho-gu, Nowon-gu, Eunpyeong-gu, Gwanak-gu and Gangbuk-gu were the major districts in GHG and AP sink/emission inventories for vegetation sector. Environmental value of vegetation as a function of GHG and AP sink, was estimated as 800 billion won, corresponding to 5% of the total cost of the forest land in Korea evaluated as a public function.

Rate Control Scheme for Improving Quality of Experience in the CoAP-based Streaming Environment (CoAP 기반의 스트리밍 환경에서 사용자 체감품질 향상을 위한 전송량 조절 기법)

  • Kang, Hyunsoo;Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.44 no.12
    • /
    • pp.1296-1306
    • /
    • 2017
  • Recently, as the number of Internet of Things users has increased, IETF (Internet Engineering Task Force) has released the CoAP (Constrained Application Protocol). So Internet of Things have been researched actively. However, existing studies are difficult to adapt to streaming service due to low transmission rate that result from buffer underflow. In other words, one block is transmitted one block to client's one request according to the internet environment of limited resources. The proposed scheme adaptively adjusts the rate of CON(Confirmable) message among all messages for predicting the exact network condition. Based on this, the number of blocks is determined by using buffer occupancy rate and content download rate. Therefore it improves the quality of user experience by mitigating playback interruption. Experimental results show that the proposed scheme solves the buffer underflow problem in Internet of Things streaming environment by controlling transmission rate according to the network condition.

Design and Implementation of Zigbee-CoAP-based Standby Power Saving System (Zigbee-CoAP 기반 대기전력 절감 시스템 설계 및 구현)

  • Jang, Young-Hwan;Lee, Sang-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.616-622
    • /
    • 2020
  • Recently, as the interest in power saving increases with the development of IoT technology, research on power saving of smart devices, which are being miniaturized, is being actively conducted. In particular, due to the diversification of IoT-based smart devices and the increase in personal penetration rate, the issue of standby power even when not in use is increasing. However, there is a drawback of physically unplugging the outlet or turning off the power in order to substantially reduce standby power. Since Zigbee is used instead of the existing IP, it is necessary to change to the IoT standard protocol based on the Internet network. Therefore, this paper designed and implemented the standby power saving system applying CoAP, the IoT standard protocol, to the existing Zigbee technology. Existing systems and evaluations confirmed that the average standby power of about 8.4Wh was reduced.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.