• Title/Summary/Keyword: Communication message

Search Result 1,643, Processing Time 0.042 seconds

A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

  • Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.105-110
    • /
    • 2021
  • Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.

IoT notification system for marine emergencies

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2022
  • Minimization of human casualties in disaster situations is of paramount importance. In particular, if a marine disaster occurs, it can be directly connected to human casualties, so prompt action is needed. In the event of a marine disaster, the route and location of movement should be identified and life tubes should be used to float on the water. This paper designs and proposes an emergency IoT notification system that can quickly rescue drowning people. The maritime emergency IoT notification system consists of four main types. First, an emergency IoT device that detects the expansion of the life tube and delivers location and situation information to the emergency IoT notification server. Second, an emergency IoT web server that manages emergency information and provides notification. Third, a database server that stores and manages emergency IoT notification information. And finally, an emergency notification app that can receive and respond to emergency notification information. The emergency IoT device consists of a TPMS(Tube Pressure Monitoring System) device that checks the pressure value of the TPMS in real time and sends it to the IoT device, and an IoT device that sends the rescuer's voice information and emergency information to the emergency IoT server. Emergency information is delivered using the MQTT(Message Queuing Telemetry Transport) protocol, and voice information is delivered to the IoT server as HTTP FormData.

Exploring Pseudonymous based Schemes for Safegaurding Location Privacy in Vehicular Adhoc Network (VANET)

  • Arslan Akhtar Joyo;Fizza Abbas Alvi;Rafia Naz Memon;Irfana Memon;Sajida Parveen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.101-110
    • /
    • 2023
  • Vehicular Ad Hoc Network (VANET) is considered to be a subclass of Mobile Ad Hoc Networks (MANET). It has some challenges and issues of privacy which require to be solved before practical implementation of the system i.e., location preservation privacy. Many schemes have been proposed. The most prominent is pseudonym change based location preservation scheme. Safety message can be compromised when it sends via a wireless medium, consequently, an adversary can eavesdrop the communication to analyze and track targeted vehicle. The issue can be counter by use of pseudo identity instead of real and their change while communication proves to be a sufficient solution for such problems. In this context, a large amount of literature on pseudonym change strategies has been proposed to solve such problems in VANET. In this paper, we have given details on strategies proposed last two decades on pseudonym change based location preservation along with issues that they focus to resolve and try to give full understanding to readers.

Design and Implementation of the Document HTML System for Preserving Content Integrity

  • Hyun Cheon Hwang;Ji Su Park;Jin Gon Shon
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.334-346
    • /
    • 2023
  • An electronic document based on PDF has been widely used in customer communication between an enterprise and a customer to deliver personalized content. However, electronic documents based on PDF in the form of paper layouts are not suitable for mobile environments because of low readability and lack of interactive interaction. Even though HTML is an essential language in a mobile environment, electronic document based on PDF is still used as it has a content integrity verification feature with a digital signature. It means that a user is sacrificing user experience in a mobile environment for content integrity and using paper-layout electronic documents. In this research, we design the Document HTML specification by setting the Document HTML conformance, adding the extended meta tags, and signing the message digest with a digital signature based on public key infrastructure (PKI). Furthermore, we implemented the Document HTML system, which has REST API services to generate and verify the Document HTML, and did experimental verification of the theory. As a result, we have confirmed that the Document HTML has both content integrity and user experience on mobile. Furthermore, the Document HTML is expected to be an alternative document format to deliver personalized content from an enterprise to a customer in a mobile environment instead of the paper layout electronic document such as PDF.

Enhancing Data Protection in Digital Communication: A Novel Method of Combining Steganography and Encryption

  • Khaled H. Abuhmaidan;Marwan A. Al-Share;Abdallah M. Abualkishik;Ahmad Kayed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1619-1637
    • /
    • 2024
  • In today's highly digitized landscape, securing digital communication is paramount due to threats like hacking, unauthorized data access, and network policy violations. The response to these challenges has been the development of cryptography applications, though many existing techniques face issues of complexity, efficiency, and limitations. Notably, sophisticated intruders can easily discern encrypted data during transmission, casting doubt on overall security. In contrast to encryption, steganography offers the unique advantage of concealing data without easy detection, although it, too, grapples with challenges. The primary hurdles in image steganography revolve around the quality and payload capacity of the cover image, which are persistently compromised. This article introduces a pioneering approach that integrates image steganography and encryption, presenting the BitPatternStego method. This novel technique addresses prevalent issues in image steganography, such as stego-image quality and payload, by concealing secret data within image pixels with identical bit patterns as their characters. Consequently, concerns regarding the quality and payload capacity of steganographic images become obsolete. Moreover, the BitPatternStego method boasts the capability to generate millions of keys for the same secret message, offering a robust and versatile solution to the evolving landscape of digital security challenges.

CloudIoT-based Jukebox Platform: A Music Player for Mobile Users in Café

  • Byungseok Kang;Joohyun Lee;Ovidiu Bagdasar;Hyunseung Choo
    • Journal of Internet Technology
    • /
    • v.21 no.5
    • /
    • pp.1363-1374
    • /
    • 2020
  • Contents services have been provided to people in a variety of ways. Jukebox service is one of the contents streaming which provides an automated music-playing service. User inserts coin and presses a play button, the jukebox automatically selects and plays the record. The Disk Jockey (DJ) in Korean cafeteria (café) received contents desired of customer and played them through the speakers in the store. In this paper, we propose a service platform that reinvented the Korean café DJ in an integrated environment of IoT and cloud computing. The user in a store can request contents (music, video, and message) through the service platform. The contents are provided through the public screen and speaker in the store where the user is located. This allows people in the same location store to enjoy the contents together. The user information and the usage history are collected and managed in the cloud. Therefore, users can receive customized services regardless of stores. We compare our platform to exist services. As a result of the performance evaluation, the proposed platform shows that contents can be efficiently provided to users and adapts IoT-Cloud integrated environments.

A study on the hybrid communication system to remove the communication shadow area for controller system of navigational aids (전파 음영지역 해소를 위한 항로표지관리용 하이브리드 통신 시스템에 관한 연구)

  • Jeon, Joong Sung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.409-417
    • /
    • 2013
  • Mu-communication board supported by multi-communication is designed with Atxmega 128A1 which is a low power energy consuming of 8-bit microcontroller. ATxmega128A1 microcontroller consists of 8 UART(Universal asynchronous receiver/transmitter) ports which can be setting appropriate user interface having command line interpreter(CLI) program with each port, 2 kbytes EEPROM, 128 kbytes flash memory, 8 kbytes SRAM. 8 URAT ports are used for the multi communication modem, GPS module, etc. and EEPROM is used for saving a configuration for program running, and flash memory of 128 kbytes is used for storing a Firm Ware, and 8 kbytes SRAM is used for stack, storing memory of global variables while program running. If we uses the hybrid communication of path optimization of VHF, TRS and CDMA to remote control AtoN(aid to navigation), it is able to remove the communication shadow area. Even though there is a shadow area for individual communication method, we can select an optimum communication method. The compatibility of data has been enhanced as using of same data frame per communication devices. For the test, 8640 of data has been collected from the each buoy during 30 days in every 5 minutes and the receiving rate of the data has shown more than 99.4 %.

A Study on the Evaluation Model of IT Service Quality: concentrated on the Quality Components in Mobile Communication Service (IT서비스의 품질평가 모델 : 이동통신 서비스의 품질 구성요소를 중심으로)

  • Sim, Jong-Sub
    • Korean Business Review
    • /
    • v.17 no.2
    • /
    • pp.203-228
    • /
    • 2004
  • This dissertation investigated the evaluation model of IT Service quality: concentrated on the quality components in mobile communication service. Today, mobile communication service is changing dramatically. The first and second generation's mobile communication services were designed for voice and SMS(Short Message Service). However, while the mobile communication industry grows, the mobile technology made more services available for customers. Customers' changing needs brought a new opportunities to the market. Now, mobile communication service is facing a new era as multi-functioning, multimedia service, and high speed data transfer service are being introduced. There has been a lot of theoretical literature on service quality components of mobile communication, but most of the literature was focused on the voice service and SMS(1st and 2nd generation). As mobile communication service evolves, the components may have to be altered or rebuilt. To identify which service quality components ought to be utilized, prior studies on service quality components, service quality, and customer satisfaction were reviewed. Also, a survey was conducted on the various aspects of mobile communication service. This study suggests 6 components of service quality: those are supporting facilities, cellular phone(facilitating goods), quality of the voice service(explicit service), supplementary services, supporting services, and cost. Empirical results supported that all of these components are proven as the service quality components, but, with regards to customer satisfaction, only cellular phone(facilitating goods) and supplementary services are effective. As previously stated, the relationship between service quality and customer satisfaction is also proven. This study is a point of departure for the success of upcoming generation's mobile communication service. It identifies what is valuable from the customer's point of view. Furthermore, it suggests some ideas to prepare for future market opportunities.

  • PDF

Development of Vehicle LDW Application Service using AUTOSAR Platform on Multi-Core MCU (멀티코어 상의 AUTOSAR 플랫폼을 활용한 차량용 LDW 응용 서비스 개발)

  • Park, Mi-Ryong;Kim, Dongwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.113-120
    • /
    • 2014
  • In this paper, we examine Asymmetric Multi-Processing Environment to provide LDW service. Asymmetric Multi-Processing Environment consists of high-speed MCU to support rapid image processing and low-speed MCU for controlling with other ECU at the control domain. Also we designed rapid image process application and LDW application Software Component(SW-C) according to the development process rule of AUTOSAR. To communicate between two MCUs, timer based polling based IPC was designed. Also to communicate with other ECUs(Electronic Control Units), we designed CAN messages to provide alarm information and receiving CAN message to catch the Turn signal. We confirm the possibility of the various ADAS development using an Asymmetric Multi-Processing Environment and AUTOSAR platform. We also expect providing ISO 26262 functional safety.

Method of Motion Graphic Design Approach from Postmodern Point of View (포스트모던적 관점에서 본 모션그래픽 디자인 접근 방안)

  • Kim Gyo-Wan;Hong Su-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.124-131
    • /
    • 2006
  • Motion graphic is also developing into its own genre in graphic design by establishing individual industrial fields. images and graphics but also recognize even motions and sounds as communication elements delivering a message. Nevertheless, web communication designers have yet to experimentally test the visual motion priniciples or the audio sound expressions in terms of technology. If the dance are used, they may be new communication approaches in the age of multi-media, which allows for communication of visual and audio information or images. With such conceptions in mind, this study was aimed at reviewing the structural relationship between visual motion principles of the kinetic and the sound images to combine the audio and video effects. To this end, the basic structure of dance and music were substituted into the dance to determine their relevancy, and thereupon, examine the effective sound expression methods and techniques depending on movements of the objects in the monitor. Thus, this study, by inquiring into the uniqueness of choreography in motion graphic, presents the possibility of limitless expression of designer creation and inner world, and the ultimate goal lies in assuring the artistic value of motion graphic and its position as a synthetic art.

  • PDF