• Title/Summary/Keyword: Communication Protocol

Search Result 3,977, Processing Time 0.029 seconds

Performance Evaluation of a New Cooperative MAC Protocol with a Helper Node Selection Scheme in Ad Hoc Networks

  • Jang, Jaeshin
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.199-207
    • /
    • 2014
  • A new cooperative MAC protocol called the busy tone cooperative medium access control (BT-COMAC) protocol is proposed to overcome the drawbacks and maximize the advantages of existing schemes. This scheme uses a new metric called decibel power to decide an appropriate helper node. Using received power strength is more efficient in selecting an appropriate helper node, especially in a densely populated network, than the effective transmission rates used in conventional schemes. All communication nodes in a communication service area are assumed to move independently. Two performance metrics are used: System throughput and channel access delay. A performance evaluation of the BT-COMAC protocol is conducted using a computer simulation over a slow fading wireless channel, and its performance results are compared with those of four existing schemes. The numerical results show that the BT-COMAC protocol improves the system throughput by approximately 15% as compared to the best existing scheme.

A Protocol Conversion Algorithm for Monitoring of Industrial Communication Data (산업용 통신 데이터의 모니터링을 위한 프로그램 가능한 프로토콜 변환 알고리즘)

  • Eum, Sang-hee;Lee, Byong-hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.283-284
    • /
    • 2016
  • Recently, many industrial instruments face the problem of protocol compatibility with the external monitoring and control system. This paper implemented a protocol conversion algorithm for monitoring of industrial communication Data. This algorithm is supported programmable method by user. we experimented the protocol conversion by communication gateway module using implemented algorithm, and obtained good results.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Urgency-Aware Adaptive Routing Protocol for Energy-Harvesting Wireless Sensor Networks

  • Kang, Min-Seung;Park, Hyung-Kun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.25-33
    • /
    • 2021
  • Energy-harvesting wireless sensor networks(EH-WSNs) can collect energy from the environment and overcome the technical limitations of existing power. Since the transmission distance in a wireless sensor network is limited, the data are delivered to the destination node through multi-hop routing. In EH-WSNs, the routing protocol should consider the power situations of nodes, which is determined by the remaining power and energy-harvesting rate. In addition, in applications such as environmental monitoring, when there are urgent data, the routing protocol should be able to transmit it stably and quickly. This paper proposes an adaptive routing protocol that satisfies different requirements of normal and urgent data. To extend network lifetime, the proposed routing protocol reduces power imbalance for normal data and also minimizes transmission latency by controlling the transmission power for urgent data. Simulation results show that the proposed adaptive routing can improve network lifetime by mitigating the power imbalance and greatly reduce the transmission delay of urgent data.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Development of a Body Network System with GSEK/VDX Standards and CAN Protocol (OSEK/VDX 표준과 CAN 프로토콜을 사용한 차체 네트웍 시스템 개발)

  • 신민석;이우택;선우명호;한석영
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.10 no.4
    • /
    • pp.175-180
    • /
    • 2002
  • In order to satisfy the requirements of time reduction and cost saving for development of electronic control systems(ECU) in automotive industry, the applications of a standardized real-time operating system(RTOS) and a communication protocol to ECUs are increased. In this study, a body control module(BCM) that employs OSEK/VDX(open system and corresponding interfaces for automotive electronics/vehicle distributed executive) OS tour the RTOS and a controller area network(CAN) fur the communication protocol is designed, and the performances of the system are evaluated. The BCM controls doors, mirrors, and windows of the vehicle through the in-vehicle network. To identify all the transmitted and received control messages, a PC connected with the CAN communication protocol behaves as a CAN bus emulator. The control system based upon in-vehicle network improves the system stability and reduces the number of wiring harness. Furthermore it is easy to maintain and simple to add new features because the system is designed based on the standards of RTOS and communication protocol.

A New Data Link Protocol for Railway Signaling Systems

  • Hwang, Jong-Gyu;Lee, Jae-Ho;Park, Yong-Jin;Park, Gwi-Tae
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.3B no.4
    • /
    • pp.195-201
    • /
    • 2003
  • In accordance with the computerization of railway signaling systems, the interface link between signaling equipment has been replaced by a digital communication channel and the importance of this communication link has become increasingly significant. However, there are some problems with the present state of railway signaling. First, different communication protocol is applied to interfaces between signaling although they have the same functions. Next, the communication protocols currently used in the railway fields contain various illogical components such as structure, byte formation, error correction scheme and so on. To solve these matters, a new data link protocol for railway signaling systems is designed. In this paper, the structure of protocol and the results of performance analyses are presented. It will be expected to increase the safety, reliability and efficiency of maintenance of signaling systems by using the designed communication protocol for railway signaling in Korea.

Timestamp based Key Exchange Protocol for Satellite Access Network (위성환경에서의 Timestamp 기반 키 교환 프로토콜)

  • Song, In-A;Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.2
    • /
    • pp.162-170
    • /
    • 2016
  • The key exchange protocols are very important to provide the secure communication in broadband satellite access network. However key exchange protocol of ETSI(European Telecommunications Standards Institute) is vulnerable to man-in-the-middle-attack by using Diffie-Hellman algorithm. And the key exchange protocol using certification is not useful in satellite environment. We propose the key exchange protocol using Timestamp which have the resistant to man-in-the-middle-attack. Proposed protocol is able to prevent the man-in-the-middle-attack by calculated time value. Also showing experiment results, we prove that proposed protocol improve memory usage, communication amount and calculation amount than other protocols.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.