• Title/Summary/Keyword: Communication Protocol

Search Result 3,986, Processing Time 0.035 seconds

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Backhaul Resource Allocation Protocol for Underwater Cellular Communication Networks (수중 셀룰러 통신 네트워크에서 백홀 자원분배 프로토콜에 관한 연구)

  • Yun, Changho;Park, Jong-Won;Choi, Suhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.393-402
    • /
    • 2017
  • Just like terrestrial cellular networks, underwater cellular communication networks, which can manage the overall network resource by adaptively allocating backhaul resource for each base station according to its ingress traffic, are necessary. In this paper, a new resource allocation protocol is proposed for the underwater cellular communication network, allocating backhaul resource of a base station proportional to its ingress traffic to the base station. This protocol is classified into two types dependent upon allocation period: the resource allocation protocol with adaptive period and that with fixed period. In order to determine a proper resource allocation protocol, the performance of the two protocols, in terms of reception rate, message overhead, and latency is compared and investigated via simulation. As a result, the resource protocol with adaptive period outperforms that with fixed period; the resource allocation protocol with fixed period results in a maximum of $10^2$ order longer queueing delay as well as $10^2$ order greater message overhead than that with adaptive period.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Modified LEACH Protocol improving the Time of Topology Reconfiguration in Container Environment (컨테이너 환경에서 토플로지 재구성 시간을 개선한 변형 LEACH 프로토콜)

  • Lee, Yang-Min;Yi, Ki-One;Kwark, Gwang-Hoon;Lee, Jae-Kee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.311-320
    • /
    • 2008
  • In general, routing algorithms that were applied to ad-hoc networks are not suitable for the environment with many nodes over several thousands. To solve this problem, hierarchical management to these nodes and clustering-based protocols for the stable maintenance of topology are used. In this paper, we propose the clustering-based modified LEACH protocol that can applied to an environment which moves around metal containers within communication nodes. In proposed protocol, we implemented a module for detecting the movement of nodes on the clustering-based LEACH protocol and improved the defect of LEACH in an environment with movable nodes. And we showed the possibility of the effective communication by adjusting the configuration method of multi-hop. We also compared the proposed protocol with LEACH in four points of view, which are a gradual network composition time, a reconfiguration time of a topology, a success ratio of communication on an containers environment, and routing overheads. And to conclude, we verified that the proposed protocol is better than original LEACH protocol in the metal containers environment within communication of nodes.

A study on the MAC protocol for an aeronautical mobile data communication (항공용 이동 무선 데이터 통신에 적합한 매체접속제어 프로토콜에 관한 연구)

  • 이은주;박효달
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2604-2612
    • /
    • 1997
  • Media access control(MAC) protocol that is used between aircraft and ground station now is non-persistent CSMA protocol, but this protocol hs defects to apply in the wireless mobile radio communication environment. In this paper, to solve this Problems, the modified ICMA/CD protocol which ban be applied in the wireless environment was proposed and analyzed. In the modified ICMA/CD protocol, instead of usig special control channel, control signal was inserted into the uplink message. After the analysis, simulation was performed to approve the analysis resutls. As a results, modified ICMA/CD protocol can solve the hidden termined effect of CSMA protocol and packet detection delay time problem of ICMA/CD protocol and acquired the same channel throughput as CSMA/CD protocol. This results shows the modified ICMA/CD protocol can be used in the aeronauical telecommunication.

  • PDF

Improvement of IS-IS Protocol for TICN Tactical Backbone (TICN 전술백본망을 위한 IS-IS 프로토콜 성능 개선)

  • Kwon, Tae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.996-1002
    • /
    • 2011
  • Recently Korea Army are developing the TICN(Tactical Information Communication Network) which is the next army tactical communication system. The TICN tactical backbone's ability is very important. So analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, previous paper analysed routing protocol efficiency index and compared to superiority of the OSPF and IS-IS protocols in the tactical environment. Conclusively IS-IS protocol was more suitable for TICN backbone routing protocol. As follow-up study of previous paper, this paper try to find the proper parameters of IS-IS protocol in order to improve the performance of IS-IS protocol as a TICN tactical backbone protocol under the tactical environments. Finally it selected four time-parameters of IS-IS protocol, those can improve performance of the protocol.

A Combining Scheme to Reduce Power Consumption in Cooperation and Cyclic Code for Wireless Sensor Networks (협력-순환 부호를 이용한 무선 센서 네트워크에서의 전력 소모 감소를 위한 결합기법에 관한 연구)

  • Kong, Hyung Yun;Hwang, Yun Kyeong;Hong, Seong Wook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.63-69
    • /
    • 2008
  • In this paper, our goal is to find a power-effective protocol that improves the accuracy of transmission in sensor networks. Therefore we propose a cooperative communication protocol based on MRC(Maximal Ratio Combining) and cyclic code. In our proposal, one sensor node assists two others to communicate with a clusterhead that can get diversity effect and MRC can improve diversity effect also. The proposed protocol with cyclic code can correct error up to 3-bit and reduce decoding complexity compared with convolutional code. Simulation results reveal proposed protocol can save the network energy up to 6dB over single-hop protocol at BER(Bit Error Rate) of $10^{-2}$.

  • PDF

The AODV Routing Protocol based on Location Information for Inter-Vehicle Communication (차량간 통신을 위한 위치 정보 기반의 AODV 라우팅 프로토콜)

  • Lee, Eun-Ju;Lee, Kwoun-Ig;Jwa, Jeong-Woo;Yang, Doo-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.47-54
    • /
    • 2008
  • In order to realize Intelligent Transport System (ITS) without any road facilities support, Inter-vehicle Communication (IVC) is increased attention. IVC makes it possible to exchange real-time information among vehicles without centralized infrastructure. The IVC systems use multi-hop broadcast to disseminate information. In this paper, we propose the improved AODV routing protocol based on location information. The proposed AODV routing protocol transmits Hello packet with location information to calculate the distance between nodes. Then it achieves fast link recovery. We confirm the throughput performance of the proposed AODV routing protocol compared with the AODV routing protocol using Qualnet ver.3.8 simulator.

Educational Software Development of Bluetooth Protocol for Protocol Monitoring and Emulation (프로토콜 모니터링 및 에뮬레이션 기능을 제공하는 블루투스 프로토콜의 교육용 소프트웨어)

  • 정중수
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.1-7
    • /
    • 2004
  • In addition to wired communication technology, wireless communication technology has been driving communication revolution nowadays. Bluetooth technology carries out data/voice communication making pico-net and the various application services are supported by access network connected to public network. This paper presents educational software development of bluetooth protocol stack including HCI, L2CAP, RFCOMM, SDP and profiles including GAP, SPP, GEOP, FTP. This software which supports programming environment of these protocol monitoring and emulation is implemented basically step by step for education based on H connected to the bluetooth device through RS-232-C, UART or USB cable. Application program coded by Visual C is operated over the firmware loaded on the bluetooth device connected to the PC. Additionally ftp and chatting function are developed to enhance educational efficiency.

  • PDF

A Study on the Failure code of the MVB Protocol when the Electric locomotive(8200 series) New Auxiliary Power Supply is applied (전기기관차(8200호대) 신규 보조전원장치 적용 시 MVB 통신프로토콜 중 고장코드에 관한 연구)

  • Bae, Young-Kyu;Shin, Hwa-Song;Jeong, Hwi-Seob;Son, Ki-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.377-382
    • /
    • 2018
  • In order to partially localize the electric locomotive(8200 series) currently being operated, analysis of the inter-device MVB protocol in the electric locomotive should be performed first. Especially, it is necessary to analyze the operation when a newly developed auxiliary power supply is applied. In this paper, when a new auxiliary power supply applied to a conventional electric locomotive through a newly developed communication control unit using the analyzed protocol, a protocol for a failure codes was analyzed.