• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.027 seconds

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

Study on Crisis Conflict Culture Communication : Focusing on Information Specificity in SNS (위기갈등문화에 대한 소통방식 연구 :SNS 메시지 구체성을 중심으로)

  • Li, Xiao-Fan;Kim, Jung Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.251-256
    • /
    • 2020
  • Based on the development of SNS in Mobile and Internet, crisis management is regarded as an important issue that determines the rise and fall of businesses. This study aims to contribute to more efficient implementation of crisis management messages by examining the relationship between the strategy of crisis management communication and the level of specificity of the message. The study found that consumers evaluated the crisis-hit company's acceptance communication strategy to show a higher level of integrity, reliability and appropriateness than the defensive strategy. However, this main effect is mediated by the specificity (high specificity vs. low). Specifically, consumers' assessment of crisis management messages and information-seeking behavior were found to be most favorable when used in a mixture of acceptance strategies and high specificity. Conversely, the lowest effect was the combination of defense strategy and high specificity. Based on these results, the theoretical discussions is described for crisis management practitioners of enterprises and organizations.

A Study on Priority Allocation Algorithm According to Air Traffic in Aeronautical Communication Environment (항공이동통신환경에서 항공교통량에 따른 우선순위 할당 알고리즘에 관한 연구)

  • Jo, Yun-Hyun;Kim, Yong-Kyun;Kim, Sang-Uk;Park, Hyo-Dal
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.91-100
    • /
    • 2010
  • According to the recent increase in air traffic a more efficient air traffic flow control is required. This paper proposes the algorithm for efficient air traffic flow control. Aeronautical communication environment is different from the common communication environment since it needs a direct communication between stations (or airplanes) and requires a strict priority for safety message. Moreover, the wide area for basic service causes high propagation delay. In this paper, by using existing CSMA/CA Media Access Control (MAC) protocol, we set the message priorities according to air traffic condition (congestion airport area, approach control area, En route area, and ocean area). This prioritization scheme enables the data transmission with higher access probability. Simulation results confirm that our protocol shows better performance in terms of channel efficiency and success probability compared to exisiting CSMA/CA protocol.

A Survey of IEEE 1588 Time Synchronization Performance (IEEE 1588 시간 동기화 성능에 대한 조사)

  • Jahja, Rico Hartono;Jeon, Seong-Yong;Shin, Seok-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.2
    • /
    • pp.165-176
    • /
    • 2015
  • Clock or time synchronization protocol is one of the crucial factors that could determine the quality of the communication. With the rapid development of the network technology, more robust clock synchronization algorithm is required. IEEE 1588 is one of the possible solutions for a robust clock synchronization algorithm; however, there are still some challenges that need to be concerned in IEEE 1588 in term of reducing and stabilizing the PDV value. This survey paper shows several solutions that could improve the performance of IEEE 1588, including modifying the PTP message transmission, optimizing PTP method, filtering techniques, and using the hardware timestamp instead of application layer timestamp, and so on. Despite the improvement that is created with these techniques, the clock synchronization algorithm is still an open issue in the network communication.

Error Time Message Broadcast Method to Prevent Deadlock in Dynamic Reconfiguration Environment (동적 재구성 환경에서 교착상태를 예방하기 위한 오차 시간 메시지 브로드캐스트 기법 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2131-2136
    • /
    • 2016
  • Before Industry 4.0, a purpose of manufacturing processes is simply overcoming the weakness of product line. However, Industry 4.0 should determine its method of work of facilities' own accord. Manufacturing processes such as FMS, AMS, MAS have been developed in these procedures, but there are possibilities of deadlock that can be happened for the reason of machine, agent or resource sharing. There were many studies to solve this problem. However, studies about prevention of deadlock happened in the situation that manufacturing processes are reconfigured dinamically because of human's intervention are incomplete. This paper proposes the model of the situation reconfigured dinamically and the method to prevent the deadlock in this situation. The proposed method adjusts production and manufacturing time by broadcasting time error messages to machines around when the manufacturing time of machine intervened by human is changed. Through this, it is anticipated to prevent the deadlock if conditions of the product line are changed.

Design of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인기의 TM/TC 데이터 프로토콜 설계)

  • Hong, Su-woon;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.506-512
    • /
    • 2018
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. Among these, the Division UAV is designed to transmit fixed size TM/TC data repeatedly and the Corps UAV is designed to transmit aperiodic TM/TC data to the variable length of the message-based. In this paper, we analyze the TM/TC data protocol of existing military UAV systems and present data protocol design method which is considered to be more efficient in wireless communication environment applied to equipment under development. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

Message Encryption Methods for DDS Security Performance Improvement (DDS Security 성능 향상을 위한 메시지 암호화 기법 연구)

  • Han, Jae-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1554-1561
    • /
    • 2018
  • This paper surveys the DDS, a real - time communication middleware, and proposes ways to improve the DDS secure communication performance. DDS is a communication middleware standard by the OMG. The OMG has released the DDS Security standard to resolve the security issues. The security performance of DDS can be considered into transmission speed and confidentiality. In terms of confidentiality, AES-GCM, currently the encryption algorithm specified by DDS Security, is a very strong encryption algorithm, but there are well known weaknesses associated with authentication. In terms of speed, The computational load for the security function is a restriction to use DDS in systems which requires real-time performance. Therefore, in order to improve the DDS security, algorithms that are faster than AES-GCM and strong in encryption strength are needed. In this paper, we propose a DDS message encryption method applying AES-OCB algorithm to meet these requirements and Compared with the existing DDS, the transmission performance is improved by up to 12%.

Performance Enhancement Scheme for RR Protocol in MIPv6 (MIPv6에서 RR프로토콜 성능개선 방안)

  • 이달원;황일선;손승원;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.49-56
    • /
    • 2004
  • An Internet draft, named RR(Return Routability) protocol, proposed to IETF mobileip WG, in order to establish an optimal path to MN(Mobile Node) by securely sending the BU(Binding Update) message to CN(Correspondent Node). However, it has some problems with initiating the protocol by the MN: it causes to increases in communication load in the home network, to increases communication delay between MN and CN, and increases in communication load due to unnecessary message exchanges. To resolve the problems, this paper proposes an alternative scheme for the RR protocol in MIPv6. The proposed scheme is devised to start the protocol by HA on receiving the first packet from CN. It decreases the route optimization overhead by reducing the number of BU messages as well as the communication time. Beside these advantages, this scheme provides the same security grade as the original RR protocol.

Heterogeneous message conversion for remote buried utility management system IoT(Internet of Things) gateway (원격 매설 유틸리티 관리 시스템을 위한 이기종 간의 메시지 변환 IoT(Internet of Things) 게이트웨이)

  • Kim, InSung;Pak, JuGeon;Park, KeeHyun
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.10
    • /
    • pp.25-32
    • /
    • 2018
  • Recently, the complexity of underground utilities has increased and it has became more difficult to identify and manage information about all underground utilities due to changes such as road extension or building relocation. As a result, number of accidents related to underground utilities caused by excavation works or disasters are in rise, and naturally damages as well are increasing due to the accidents. Therefore, there is a need for a management system capable of easily registering or retrieving information of underground utilities from a remote place. In our previous work, we have developed a utility labelling system based on NFC (Near Field Communication) tag and a utility management system based on IoT (Internet of Things). However, in general, there are diverse communication devices and protocols in IoT environment. Therefore, in this paper, we propose management system and IoT gateway that enables smooth communication even in different types of devices based on the previous our work.

A Virtual Address Mapping Method for Interconnection between Terrestrial Communication Network and Underwater Acoustic Communication Network (지상 통신 네트워크와 수중음파 통신 네트워크의 상호연결을 위한 가상 주소 매핑 방법)

  • Kim, Changhwa
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.4
    • /
    • pp.27-45
    • /
    • 2018
  • The terrestrial communication network and the underwater acoustic communication network have very different communication characteristics each other in operational environments, communication media, propagation delay, frequency bandwidth, transmission speed, bit error rate, and so on. These different characteristics cause some different address schemes and different maximum transmission units and, as a result, these differences must form certainly obstacles to the intercommunication between a terrestrial communication network and an underwater acoustic communication network. In this paper, we presents a method to use the virtual addresses to resolve the interconnection problem caused by different address schemes between a terrestrial communication network and an underwater acoustic communication network, and, through a mathematical modeling, we analyze the performance on the message transceiving delay time in the underwater environment.