• Title/Summary/Keyword: Communication message

Search Result 1,633, Processing Time 0.028 seconds

A remote vehicle diagnosis and control system based on mobile cellular network (이동 통신망 기반의 차량 원격 진단 및 제어 시스템)

  • Choi Yong-Wun;Hong Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.69-76
    • /
    • 2006
  • Telematics, which is a compound word of a telecommunication and informatics, provides drivers with useful driving information such as driving path guidance, accident or robbery detection, traffic conditions and other valuable data at real time. This paper proposes and implements how to build a telematics terminal equipped with CDMA and GPS running embedded Linux, to check a vehicle's state through communication between telematics server and vehicle terminals using a cellular phone and to control a vehicle using SMS as shown in Figure 1. In order to do this, we use the SK-VM platform which is mobile terminal platform based on JAVA to design, implement and evaluate it.

  • PDF

Implementation of Node Mapping-based FlexRay-CAN Gateway for In-vehicle Networking System (차량 네트워크 시스템을 위한 노드 매핑 기반 FlexRay-CAN 게이트웨이 구현)

  • Bae, Yong-Gyung;Kim, Man-Ho;Lee, Suk;Lee, Kyung-Chang
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.6
    • /
    • pp.37-45
    • /
    • 2011
  • As vehicles become more intelligent, in-vehicle networking (IVN) systems such as controller area network (CAN) or FlexRay are essential for convenience and safety of drivers. To expand the applicability of IVN systems, attention is currently being focused on the communication between heterogeneous networks such as body networking and chassis networking systems. A gateway based on message mapping method was developed to interconnect FlexRay and CAN networks. However, this type of gateways has the following shortcomings. First, when a message ID was changed, the gateway must be reloaded with a new mapping table reflecting the change. Second, if the number of messages to be transferred between two networks increase, software complexity of gateway increases very rapidly. In order to overcome these disadvantages, this paper presents FlexRay-CAN gateway based on node mapping method. More specifically, this paper presents a node mapping based FlexRay-CAN gateway operation algorithm along with the experimental evaluation for ID change.

Mobile Web Service Architecture Using Context-store

  • Oh, Sang-Yoon;Aktas, Mehmet;Fox, Geoffrey C.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.836-858
    • /
    • 2010
  • Web Services allow a user to integrate applications from different platforms and languages. Since mobile applications often run on heterogeneous platforms and conditions, Web Service becomes a popular solution for integrating with server applications. However, because of its verbosity, XML based SOAP messaging gives the possible overhead to the less powerful mobile devices. Based on the mobile client's behavior that it usually exchanges messages with Web Service continuously in a session, we design the Handheld Flexible Representation architecture. Our proposed architecture consists of three main components: optimizing message representation by using a data format language (Simple_DFDL), streaming communication channel to reduce latency and the Context-store to store context information of a session as well as redundant parts of the messages. In this paper, we focus on the Context-store and describe the architecture with the Context-store for improving the performance of mobile Web Service messaging. We verify our approach by conducting various evaluations and investigate the performance and scalability of the proposed architecture. The empirical results show that we save 40% of transit time between a client and a service by reducing the message size. In contrast to solutions for a single problem such as the compression or binarization, our architecture addresses the problem at a system level. Thus, by using the Context-store, we expect reliable recovery from the fault condition and enhancing interoperability as well as improving the messaging performance.

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

  • Zhou, Jing-xian;Yan, Jian-hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6243-6259
    • /
    • 2019
  • As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.

Secure Keypad with Encrypted Input Message (입력 메시지 암호화를 통한 보안 키패드의 설계와 구현)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2899-2910
    • /
    • 2014
  • In this paper, we present method that verifies the validity of inputted message rather than showing last character on virtual keyboard. This encrypts password and valid input only can receive right feedback. This is implemented on Android phone and tested. This shows higher security than former method by 68.23% and accuracy shows 100%. This secure keypad is practical and secure so this can replace current input keypad without difficulty.

Design and experiment of the protocol using ASM2.0 : focusing on marine officers' mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 프로토콜 설계 및 실험 : 항해사의 의무보고 사항을 중심으로)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.43-44
    • /
    • 2015
  • AIS-ASM is a one of the study to provide a variety of maritime safety information as well as ship's position and navigational information that is their own function since 2004. This study aims to reduce the marine officer's workload through automating marine officer's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and experimented of the ASM2.0 protocol through analyzing a domestic regulation about passenger flight and AIS-ASM message.

  • PDF

Broadcasting Message Reduction Methods in VANET

  • Makhmadiyarov, Davron;Hur, Soojung;Park, Yongwan
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.1
    • /
    • pp.42-49
    • /
    • 2009
  • Most Vehicular Ad hoc Network (VANET) applications rely heavily on broadcast transmission of traffic related information to all reachable nodes within a certain geographical area. Among various broadcast approaches, flooding is the first broadcasting technique. Each node rebroadcasts the received message exactly once, which results in broadcast storm problems. Some mechanisms have been proposed to improve flooding in Mobile Ad hoc Networks (MANET), but they are not effective for VANET and only a few studies have addressed this issue. We propose two distance-based and timer-based broadcast suppression techniques: 15P(15percent) and slotted 15P. In the first (distance based) scheme, node's transmission range is divided into three ranges (80%,15%and5%). Only nodes within 15% range will rebroadcast received packet. Specific packet retransmission range (15%) is introduced to reduce the number of messages reforwarding nodes that will mitigate the broadcaststorm. In the second (timer-based) scheme, waiting time allocation for nodes within 15% range isused to significantly reduce the broadcaststorm. The proposed schemes are distributed and reliedon GPS information and do not requireany other prior knowledge about network topology. To analyze the performance of proposed schemes, statistics such as link load and the number of retransmitted nodes are presented. Our simulation results show that the proposed schemes can significantly reduce link load at high node densities up to 90 percent compared to a simple broadcast flooding technique.

  • PDF

Discrete-Time Gaussian Interfere-Relay Channel

  • Moon, Kiryang;Yoo, Do-Sik;Oh, Seong-Jun
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.299-310
    • /
    • 2016
  • In practical wireless relay communication systems, non-destination nodes are assumed to be idle not receiving signals while the relay sends messages to a particular destination node, which results in reduced bandwidth efficiency. To improve the bandwidth efficiency, we relax the idle assumption of non-destination nodes and assume that non-destination nodes may receive signals from sources. We note that the message relayed to a particular node in such a system gives rise to interference to other nodes. To study such a more general relay system, we consider, in this paper, a relay system in which the relay first listens to the source, then routes the source message to the destination, and finally produces interference to the destination in sending messages for other systems. We obtain capacity upper and lower bounds and study the optimal method to deal with the interference as well as the optimal routing schemes. From analytic results obtained, we find the conditions on which the direct transmission provides higher transmission rate. Next, we find the conditions, by numerical evaluation of the theoretical results, on which it is better for the destination to cancel and decode the interference. Also we find the optimal source power allocation scheme that achieves the lower bound depending on various channel conditions. We believe that the results provided in this paper will provide useful insights to system designers in strategically choosing the optimal routing algorithms depending on the channel conditions.

Implementation of Picture Surveillance System using xHTML (xHTML을 이용한 화상 감시 시스템 구현)

  • 정경택;송병만;마석주;전용일;정동수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1421-1426
    • /
    • 2003
  • In this paper, we implement a picture surveillance system using IBM-compatible PC with web camera. The reflex RGB data captured from WebCam is stored to HDD through USB port at every 5 seconds intervals. Also, if strangers are detected through Motion Detection routine, warning voice message is broadcasted and invasion message is transmitted by e-mail and transmit the e-mail title to mobile phone through WAP(Wireless Application Protocol) push. The detected image is stored to hard-disk in ‘month-day-hour-minute-second. jpg’ data type. And the image data is transmitted to web server through FTP(File Transfer Protocol) because invader can deletes or destroys the image data on hard-disk We implement a surveillance system which is able to utilize through internet regardless of time and space.

Implementation of Real-Time Communication in CAN for a Humanoid Robot (CAN 기반 휴머노이드 로봇의 실시간 데이터 통신 구현)

  • Kwon Sun-Ku;Kim Byung-Yoon;Kim Jin-Hwan;Huh Uk-Youl
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay In order to eliminate this jitter, stuff bits must be controlled to minimize the response time and to reduce the variation of data transmission time. This paper proposes the method to reduce the stuff bits by restriction of available identifier and bit mask using exclusive OR operation. This da manipulation method are pretty useful to the real-time control strategy with respect to performance. However, the CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO(Inha Semvung Humanoid Robot).