• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.026 seconds

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.3
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

Advanced Unified Communication Service System (차세대 통합 커뮤니케이션 서비스 제공 시스템)

  • Shin, Young-Mee;Bae, Hyun-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.962-970
    • /
    • 2011
  • This paper describes an advanced unified communication system. The advanced unified communications mean a service that integrates basic communications such as call, SMS, email, and chatting with social networking service considered as a new communication channel, presenting a unified user interface. The advanced unified communication system is composed of advanced UC(Unified Communications) applications, open UC service platform, and UC back-end servers. The advanced UC applications consist of web-based application and smart phone application. The open UC service platform provides a variety of service components that enable the third party applications to access basic communications and social network services within an enterprise. The UC back-end servers provide server functionalities for call, SMS, email, and chatting.

A Distributed Communication Model and Performance Evaluation for Information Transfer in a Security Policy-based Intrusion Detection System (보안정책 기반 침입탐지시스템에서 정보 전달을 위한 분산 통신 모델과 성능 평가)

  • Jang Jung Sook;Jeon Yong Hee;Jang Jong Soo;Sohn Seung Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1707-1721
    • /
    • 2004
  • In this paper, we propose a distributed communication model of intrusion detection system(IDS) in which integrated security management at networks level is possible, model it at a security node and distributed system levels, design and implement a simulator. At the node level, we evaluate the transfer capability of alert message based on the analysis of giga-bit security node architecture which performs hardware-based intrusion detection. At the distributed system level, we perform the evaluation of transfer capability of detection and alert informations between components of distributed IDS. In the proposed model, we carry out the performance evaluation considering decision factors of communication mechanism and present the results in order to gain some quantitative understanding of the system.

A Scheme to Handle Out-of-Order Packets in Route Optimization for Proxy Mobile IPv6 (Proxy Mobile IPv6 에 대한 라우트 최적화에서 불규칙 패킷을 다루기 위한 기법)

  • Anh, Khuong;Yeoum, Sanggil;Kim, Dongsoo;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.190-191
    • /
    • 2014
  • Out-of-Order Packet ($O^3P$) problem is an issue that significantly impacts to the QoS of service and network. Route optimization (RO) in PMIPv6 is proposed by P.Loureiro and M. Liebsch to reduce the load of LMAs and transmission delay. In RO scheme, at the time the optimal path is established, there exist two paths: optimal path and old path as non-optimal path for transmitting data between MN1 and MN2 that is the cause of $O^3P$ occurring. This paper proposes a scheme to prevent $O^3P$ problem by using packet buffering technique and a new mobility message, named End Traffic Marker (ETM) to mark the end of packet delivery through the old path.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

The Traffic Performance Test Effects of Short Data Service Message Length in D-TRS (D-TRS환경에서 Short Data Service 메시지 크기에 따른 트레픽 성능평가)

  • Kim, Sai-Byuck;Song, Byeong-Kwon;Hwang, Gyu-Bin;Jeong, Tae-Eui;Kim, Jin-chul;Kim, Young-eok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1106-1108
    • /
    • 2009
  • TETRA(Terrestrial Trunked Radio)는 ETSI(European Telecommunications Standards Institute)에서 지정한 유럽 이동 무선 통신 기반의 표준이다. 본 논문은 TETRA 네트워크에서 트래픽에 따른 모뎀 성능 테스트와 그 결과 분석을 다룬다. TETRA 네트워크에서는 전송 방식에 따라 SDS(Short Data Service)와 PDS(Packet Data Service)로 나뉘게 되는데 본 논문에서는 PEI(Peripheral Equipment Interface)를 이용하여 SDS 전송 방식의 성능측정및 평가를 하였다. 본 측정에서는 최대 140바이트가 전송 가능한 SDS-Type 4가 사용 되었다. 성능 측정은 SDS메시지 데이터의 길이의 차이와 전송간격에 차이를 두어 측정하였다. 전송길이는 10에서 140바이트로 매 10바이트 단위씩 증가하였다. 전송 간격은 각각 0.5초, 1.0초, 1.5초씩 차이를 두어 측정하였고, 전송횟수는 각각 1000번씩 전송하였다. 테스트에 사용된 TETRA 모뎀은 UNIMO 사의 MU-1000MD이 사용되었다.

Learning Model for Avoiding Drowsy Driving with MoveNet and Dense Neural Network

  • Jinmo Yang;Janghwan Kim;R. Young Chul Kim;Kidu Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.142-148
    • /
    • 2023
  • In Modern days, Self-driving for modern people is an absolute necessity for transportation and many other reasons. Additionally, after the outbreak of COVID-19, driving by oneself is preferred over other means of transportation for the prevention of infection. However, due to the constant exposure to stressful situations and chronic fatigue one experiences from the work or the traffic to and from it, modern drivers often drive under drowsiness which can lead to serious accidents and fatality. To address this problem, we propose a drowsy driving prevention learning model which detects a driver's state of drowsiness. Furthermore, a method to sound a warning message after drowsiness detection is also presented. This is to use MoveNet to quickly and accurately extract the keypoints of the body of the driver and Dense Neural Network(DNN) to train on real-time driving behaviors, which then immediately warns if an abnormal drowsy posture is detected. With this method, we expect reduction in traffic accident and enhancement in overall traffic safety.

Best Practice on Automatic Toon Image Creation from JSON File of Message Sequence Diagram via Natural Language based Requirement Specifications

  • Hyuntae Kim;Ji Hoon Kong;Hyun Seung Son;R. Young Chul Kim
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.99-107
    • /
    • 2024
  • In AI image generation tools, most general users must use an effective prompt to craft queries or statements to elicit the desired response (image, result) from the AI model. But we are software engineers who focus on software processes. At the process's early stage, we use informal and formal requirement specifications. At this time, we adapt the natural language approach into requirement engineering and toon engineering. Most Generative AI tools do not produce the same image in the same query. The reason is that the same data asset is not used for the same query. To solve this problem, we intend to use informal requirement engineering and linguistics to create a toon. Therefore, we propose a sequence diagram and image generation mechanism by analyzing and applying key objects and attributes as an informal natural language requirement analysis. Identify morpheme and semantic roles by analyzing natural language through linguistic methods. Based on the analysis results, a sequence diagram and an image are generated through the diagram. We expect consistent image generation using the same image element asset through the proposed mechanism.

An Enhanced Data Communication Protocol based on HF Radios for supporting Naval Operations (해상작전 지원을 위한 HF 무전기 기반 개선된 데이터 통신 프로토콜)

  • Lee, Seung Gu;Kang, Seung Nam;Lee, Soon Bok;So, Eul-Deuk;Lim, Jae Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1990-1998
    • /
    • 2017
  • The success of naval operation prioritizes the implementation of a robust communication network that delivers accurate and prompt communications to one another. The satellite, which is the main communication network of the military, is required to construct a preliminary communication network because of the enemy radio disturbance and weak point of fixed antenna. The military operational communication network has been in transition from voice-centered wireless communication network to text message-based communication network. In this paper we suggest an enhanced communication method built on Roll Call, the main communication method of ROK Navy operating tactical data link called Link-11. Simulation results display that the proposed method reduces the transmission time per unit frame by 4.3 times compared to the Roll Call and 6.3 times compared with the Round Robin & Broadcasting; it is also proved that the higher the direct reception rate, the shorter the transmission time required by 1.6 times maximum.

Asynchronous Message Delivery among Mobile Sensor Nodes in Stationary Sensor Node based Real-Time Location Systems (고정형 센서 노드 기준 위치인식 시스템에서 이동형 센서 노드 간 비동기 메시지 전송방법)

  • Kim, Woo-Jung;Jeong, Seol-Young;Kim, Tae-Hyon;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.148-158
    • /
    • 2011
  • Stationary nodes and mobile nodes co-exist wireless sensor network(WSN) can provide variety of new services. The stationary sensor node acts not only the gathering the environmental sensing data but also a access point to bidirectional communication with numerous mobile sensor nodes(mobile node), and the mobile sensor nodes are installed inside mobile objects and identify the location in real-time and monitor the internal status of the object. However, only using the legacy WSN protocol, it is impossible to set up the stable network due to the several reasons caused by the free-mobility of the mobile nodes. In this paper, we suggest three methods to increase the hit-ratio of the asynchronous message delivery(AMD) among mobile nodes. We verified the performance of the suggested methods under the stationary-mobile co-existed WSN testbed.