• Title/Summary/Keyword: Configuration protocol

Search Result 251, Processing Time 0.025 seconds

The Modified IPv6 NDP Mechanism for Preventing IP Spoofing (IP 스푸핑 방지를 위한 수정된 IPv6 NDP 메커니즘)

  • Kim Ji-Hong;Nah Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.95-103
    • /
    • 2006
  • IPv6 is a new version of the Internet protocol, designed as the successor to IPv4. Among the changes from IPv4 to IPv6, we focused on the stateless address auto-configuration mechanism. The address auto-configuration mechanism is used by nodes in an IPv6 network to learn the local topology. The current specifications suggest that IPsec AH may be used to secure the mechanism, but there is no security association during address auto-configuration process because it has no initial IP address. As there are so many suity threats, SEND protocol was designed to counter these threats. In this paper we analyzed the security problems in NDP and SEND protocol. So we proposed the Modified NDP mechanism using PKC and AC in order to solve these problems.

A Property-Based Data Sealing using the Weakest Precondition Concept (최소 전제조건 개념을 이용한 성질 기반 데이터 실링)

  • Park, Tae-Jin;Park, Jun-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.1-13
    • /
    • 2008
  • Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.

  • PDF

Study of Router Advertisement application plan in IPv6 router (IPv6 라우터에서의 Router Advertisement 적용 방안에 관한 연구)

  • Shin, Young-Soo;Yang, Mi-Jeong;Gang, Yu-Hwa;Kim, Tae-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.469-471
    • /
    • 2005
  • Paper searches Neighbor Discovery Protocol's IPv6 address AutoConfiguration function that is IPv6's point technology. Also, I study plan to apply Router Advertisement function to Router. Router is formed whole system by Routing Process Card that do manager and Line Card that take charge of Packet Forwarding. Present plan that embody Router Advertisement function to Line Card.

  • PDF

Experimental Performance Evaluation of BACnet MS/TP Protocol

  • Park, Tae-Jin;Song, Won-Seok;Hong, Seung-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.5
    • /
    • pp.584-593
    • /
    • 2007
  • BACnet is a standard data communication protocol especially designed for building automation and control networks. BACnet uses the Master-Slave/Token-Passing (MS/TP) protocol as one of its field-level networks. In this study, the performance of the BACnet MS/TP protocol is evaluated using an experimental model. The network performance is investigated and evaluated in terms of token rotation time and round trip time. The experimental results show that the performance of the MS/TP network is heavily influenced by the network traffic load, the assignment of MS/TP node address and the network configuration parameter called $N_{max_info-frames}$. Based on the experimental results, simple practical designing guidelines for BACnet MS/TP network systems are also proposed.

Energy Efficient Routing Protocol for Mobile Wireless Sensor Networks (모바일 WSN을 위한 에너지 효율적인 경로배정 프로토콜)

  • Yoo, Jinho;Choi, Sung-Gi
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.405-411
    • /
    • 2015
  • In this paper, we propose routing protocol for mobile wireless sensor networks with a mobile sink in cluster configuration. The proposed protocol extends LEACH-ME by introducing a mobile sink. The mobile sink moves to the cluster head with the highest number of member nodes to collect sensed data from cluster heads within its vicinity, which results in reducing energy consumption in forwarding packets to the sink. The simulation results show that the proposed protocol outperform LEACH-ME in terms of energy efficiency.

MDDI protocol implementation of Mobile system (모바일 시스템의 MDDI 프로토콜 구현)

  • Ban, Tae-Hac;Lee, Byeong-Gwon;Zhujiang, Zhujiang;Choi, Whe-Kyung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.689-691
    • /
    • 2012
  • In this study, a MDDI protocol packet generation method that is implemented in software is proposed. MDDI protocol is used widely for display device. In this study, MDDI protocol packets are generated by software within micro processor. This method needs minimum hardware configuration. For implementation of this method, we design a hardware platform with a high performance microprocessor and a FPGA. The packets generated by software within microprocessor is converted into LVDS signals, and transmitted by hardware within FPGA.

  • PDF

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.

DATA LINKS BETWEEN EMS AND SCADA SYSTEMS (EMS - SCADA 자료연계)

  • Lee, Kyung-Jae;Yu, Sung-Chul;Kim, Yeong-Han;Lee, Hyo-Sang
    • Proceedings of the KIEE Conference
    • /
    • 1987.11a
    • /
    • pp.109-113
    • /
    • 1987
  • This paper briefly introduces a strategy of data links between EMS and SCADA systems for the KEPCO's EMS project. For the data links, front end/communication processors are adopted that provide for protocol conversion and communication processing in parallel with EMS/SCADA processing. The data link configuration for a communication channel is point to point links. The EMS - hardware and software - has capability of handling links utilizing both bisync protocol and X.25 (Level 1 and 2)protocol for the data link protocol.

  • PDF

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Implementation of UHF Multi-band Multi-protocol u-ID Mobile Reader System (UHF 대역 멀티밴드 멀티프로토콜 ubiquitous-ID 휴대형 리더기 시스템 구현)

  • Ko, Dae-Soo;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.707-713
    • /
    • 2007
  • This paper implements a RFID multi-band multi-protocol reader platform, possible to select one of the UHF bands used in particular for distribution system in RFID, that is, from 860MHz to 960MHz, through programmable configuration. It also enables implemented platform in this paper to recognize many kinds of TAG protocol, such as EPC Class 1 GEN 1, Class 1 Gen2, ISO 18000-6A, B and C.