• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.027 seconds

Adaptive Inter-Agent Communication Protocol for Large-Scale Mobile Agent Systems (대규모 이동 에이전트 시스템을 위한 적응적 에이전트간 통신 프로토콜)

  • Ahn Jin-Ho
    • The KIPS Transactions:PartA
    • /
    • v.13A no.4 s.101
    • /
    • pp.351-362
    • /
    • 2006
  • This paper proposes an adaptive inter-agent communication protocol to considerably reduce the amount of agent location information maintained by each service node and the message delivery time while avoiding the dependency of the home node of a mobile agent. To satisfy this goal, the protocol enables each mobile agent to autonomously leave its location information only on some few of its visiting nodes. Also, it may significantly reduce the agent cache updating frequency of each service node by keeping the identifier of the location manager of each agent in the smart agent location cache of the node. Simulation results show that the proposed protocol reduces about $76%{\sim}80%$ of message delivery overhead and about $76%{\sim}79%$ of the amount of agent location information each service node should maintain compared with the traditional one.

A Study on Message authentication scheme based on efficient Group signature in VANET (VANET환경에서의 효율적인 그룹서명기반 메시지 인증 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.239-248
    • /
    • 2012
  • VANET (Vehicular Ad-hoc Network) is a type of MANET (Mobile Ad-hoc Network) which is the next-generation networking technology to provide communication between vehicles or between vehicle and RSU (Road Side Unit) using wireless communication. In VANET system, a vehicle accident is likely to cause awful disaster. Therefore, in VANET environment, authentication techniques for the privacy protection and message are needed. In order to provide them privacy, authentication, and conditional, non-repudiation features of the group signature scheme using a variety of security technologies are being studied. In this paper, and withdrawal of group members to avoid frequent VANET environment is suitable for vehicles produced by the group administrator for a private signing key to solve the key escrow problem of a group signature scheme is proposed. We proposed a message batch verification scheme using Bloom Filter that can verify multiple messages efficiently even for multiple communications with many vehicles.

Selective Shuffling for Hiding Hangul Messages in Steganography (스테가노그래피에서 한글 메시지 은닉을 위한 선택적 셔플링)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.3
    • /
    • pp.211-216
    • /
    • 2022
  • Steganography technology protects the existence of hidden information by embedding a secret message in a specific location on the cover medium. Security and resistance are strengthened by applying various hybrid methods based on encryption and steganography. In particular, techniques to increase chaos and randomness are needed to improve security. In fact, the case where the shuffling method is applied based on the discrete cosine transform(DCT) and the least significant bit(LSB) is an area that needs to be studied. I propose a new approach to hide the bit information of Hangul messages by integrating the selective shuffling method that can add the complexity of message hiding and applying the spatial domain technique to steganography. Inverse shuffling is applied when extracting messages. In this paper, the Hangul message to be inserted is decomposed into the choseong, jungseong and jongseong. It improves security and chaos by applying a selective shuffling process based on the corresponding information. The correlation coefficient and PSNR were used to confirm the performance of the proposed method. It was confirmed that the PSNR value of the proposed method was appropriate when compared with the reference value.

The Transmission Performance Analysis and Security Policy in Tactical Communication Environment (전술통신 환경에서 전송 성능 분석 및 보안 정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.303-309
    • /
    • 2013
  • This paper analyzed about operation environment and policy for US military tactical communication, and security policy and transmission performance of tactical link. It is presented operation communication message and framework, which is supported semi automated force, SINCGARS specification of link layer in operation environment, and analyzed COMSEC policy and application layer security in tactical security policy. Also it analyzed in respect to transmission performance and crypto synchronization detection. Security policy of tactical link and COMSEC is analyzed in respect of crypto device such as AFKDMS, AKMS, RBECS, KIV-7/HSB.

Conformance Test Technique for the Electric Power IT Protocol based on TTCN-3 (TTCN-3를 이용한 전력 IT Protocol Conformance Test 기법)

  • Song, Byeong-Kwon;Jang, Yong-Gi;Jeong, Tae-Eui;Kim, Gun-Woong;Kim, Jin-Chul;Kim, Young-Eok
    • Proceedings of the KIEE Conference
    • /
    • 2008.11a
    • /
    • pp.373-375
    • /
    • 2008
  • TTCN-3(Testing & Test Control Notation Version 3) defined in EISI(2001) are the standardized test specification and test implementation language of applicable for all kinds of black-box testing for reactive and distributed system, telecom systems, Mobile system, Internet, CORBA based system, java, XML, etc. This paper using the TTCN-3 on an Electric Power IT Protocol DLMS(Device Language Message Specification) standards for the implementation of the device equipment test the suitability of the protocol.

  • PDF

An Agent Communication Language Using XML and RDF

  • Park, Jangwon;Kim, Yeongho;Kang, Suk-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.61-64
    • /
    • 2001
  • We propose a message-based communication protocol for software agents. An emphasis is placed on the problems of sharing and exchanging information through agent communication. We adopt the Resource Description Framework (RDF) schema for information modelling in business domain. The eXtensible Markup Language (XML) serialization is used to generate messages for agent communication. The use of XML and RDF enables software agents to understand the contents of messages correctly and consistently. We believe that the approach can provide a promising way to the automation of business processes through seamless communication among the partners.

  • PDF

Synchronization of Chaotic Secure Communication Systems with Interval Time-varying Delays (구간 시변 지연이 존재하는 카오스 보안 통신시스템의 동기화)

  • Kwon, Oh-Min;Park, Ju-Hyun;Lee, Sang-Moon;Park, Myeong-Jin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.6
    • /
    • pp.1215-1222
    • /
    • 2009
  • In this paper, a method of designing a controller which ensures the synchronization between the transmission and the reception ends of chaotic secure communication systems with interval time-varying delays is proposed. To increase communication security, the transmitted message is encrypted with the techniques of N-shift cipher and public key. And to reduce the conservatism of the stabilization criterion for error dynamic system obtained from the transmitter and receiver, a new Lyapunov-functional and bounding technique are proposed. Through a numerical example, the effectiveness of the proposed method is shown in the chaotic secure communication system.

Formal Specification Methods for Distributed Object-Oriented Systems (분산 객체지향 시스템을 위한 정형 명세 방법에 관한 연구)

  • Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5
    • /
    • pp.1426-1433
    • /
    • 2000
  • As distributed computing systems become popular, many modeling techniques and methods have been developed in specify the specification formally and verify the distributed/concurrent sytems. In spite of importance of communication in distributed object-oriented systems, specifying of communication method generally has not been emphasized in the design phase. One reason is due to the system designer misunderstanding, that is, a specification needs to be independent on the implementation. However, since defining communication pattern indistributed object-oriented systems is more serious than the required message passing method in the design phase. specifying the communication pattern is necessary instead of postponing until the implementation. In this paper, two formal specification techniques, temporal logic method and Petri nets method, for the communication in distributed systems are discussed. One is based on the temporal logic, which specifies the different patterns of primitive predicates. This method enable to define the underlying mechanism which can be interpreted as constraints. The Petri net method helps to specify the dynamic behavior of communicational patterns using the properties of Petri nets.

  • PDF

A Hierarchical Autonomous System Based Topology Control Algorithm in Space Information Network

  • Zhang, Wei;Zhang, Gengxin;Gou, Liang;Kong, Bo;Bian, Dongming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3572-3593
    • /
    • 2015
  • This article investigates the topology control problem in the space information network (SIN) using a hierarchical autonomous system (AS) approach. We propose an AS network topology control (AS-TC) algorithm to minimize the time delay in the SIN. Compared with most existing approaches for SIN where either the purely centralized or the purely distributed control method is adopted, the proposed algorithm is a hybrid control method. In order to reduce the cost of control, the control message exchange is constrained among neighboring sub-AS networks. We prove that the proposed algorithm achieve logical k-connectivity on the condition that the original physical topology is k-connectivity. Simulation results validate the theoretic analysis and effectiveness of the AS-TC algorithm.

An Implementation of communication protocol between control centers (전력제어센터간의 ICCP에 구현에 관한 연구)

  • Hahn, Kyung-Duk;Shin, Dong-Ryeol
    • Proceedings of the KIEE Conference
    • /
    • 1998.11a
    • /
    • pp.226-228
    • /
    • 1998
  • Current power systems are integrated and operated in the form of EMS/SCADA with the development of computer and communication. With this EMS/SCADA system, the production, transmission and distribution of power are effectively operated. But if the communication protocol are different from each other, it is difficult to integrate the whole system. To solve this problem, Electric Power Research Institute (EPRI) issued new standard communication protocol between control centers named Inter-Control Center Protocol (ICCP). ICCP specifies the use of Manufacturing Message Specification(MMS) for the messaging services needed by ICCP in layer 7 and support the communication between heterogeneous control centers. This study deals the characteristics of ICCP, relation between ICCP and MMS and also implements the data exchange between control centers using ICCP.

  • PDF