• 제목/요약/키워드: Data protocol

Search Result 3,906, Processing Time 0.038 seconds

ECDH based authentication protocol for the Apple Bonjour protocol (애플 Bonjour 프로토콜을 위한 ECDH 기반 인증 프로토콜)

  • Kwon, Soonhong;Lee, Jong-Hyouk
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.9-16
    • /
    • 2019
  • Apple provides its own protocol, the Bonjour protocol, for convenient file transmission and reception between device. Airdrop is a Bonjour-based, representative service that is widely used as a simple data transmission/reception protocol for Apple's desktops, laptops and smartphones. However, it was demonstrated in Black Hat, a hacking security conference in 2016, that it is possible to commence a Man-in-the-Middle attack by exploiting the Bonjour protocol's weak points. In this paper, we explain the Bonjour protocol's such vulnerability for secure file transmission/reception between devices and propose an ECDH (Elliptic Curve Diffie-Hellman) based authentication protocol to enhance the protocol's security. The proposed protocol is described along with detailed operational procedures, demonstrating that it is possible to reduce the possibility of Man-in-the-Middle attack and its masquerade variant.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Equipment Management Information System Using Wireless Application Protocol (Wireless Application Protocol을 이용한 기자재 관리 정보시스템)

  • 임영문;최영두;김홍기
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.3
    • /
    • pp.129-140
    • /
    • 2000
  • Nowadays the role of information systems is getting more and more increased according to the development of information technology. In order to manage complex, various and huge data, it is vital to construct efficient information system. For this effective information system, data have properly to be stored, encoded and represented when needed. This paper presents equipment management information system using wireless application protocol. This system enables us to have remote control of data searching and data management. Also, through the technique of data mining, database resulted from this system can be utilized into expectation and analysis about life-cycle, characteristic, and failure time of equipment, pattern recognition of users, and state of movement, etc.

  • PDF

Implementation and Performance Evaluation of the Smart Meter Concentrator Control Protocol for Advanced Metering Infrastructure (차세대 검침 기반구조를 위한 스마트 미터 집중기 제어 프로토콜의 구현과 성능분석)

  • Jang, Soon-Gun;Choi, In-Ji;Park, Byoung-Seok;Kim, Young-Hyun;Yoon, Chong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.3
    • /
    • pp.41-49
    • /
    • 2011
  • In this paper, we propose an open protocol to be employed between a smart meter concentrator and a metering data collection server, and also evaluate its performance. Legacy concentrators performs the connection establishment and data gathering operations with DLMS/COSEM protocol standards. However, we note that there are no standardized protocols between the concentrator and the collection server, which inevitably conduces each commercial smart metering system to have its own proprietary protocol. In order to solve this problem, we propose an open protocol - Smart Meter Concentrator Control Protocol(SMCCP) by extending the existing standard protocol(DLMS/COSEM). The SMCCP can provide the proxy mode to enable efficient transmission between the concentrator and the data collection server. It also can support the relay mode to enable a direct communication between the data collection server and each far end smart meter. We also implement an emulator system and a protocol analyzer to provide its operation. In addition, we evaluate the session holding time and the link usage ratio in both relay and proxy modes with OMNET++ simulator.

차세대인터넷 IPv6 Address 표준화 동향

  • Lee, Hyeok-Ro;Kim, Dong-Gyun
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.9
    • /
    • pp.52-59
    • /
    • 2002
  • 현재 우리가 사용하고 있는 Internet Protocol인 TCP/IP(Transmission Control Protocol/Internet Protocol)중 어드레스 IPv4 10진수 체계가 16진수 체계로 변화된 것이 바로 IPv6 Address이다. IPv6 Address특징으로서는 기하 급수적으로 늘어나는 Internet Address를 감당해낼 수 있고, Multi-Media Data 처리가 능숙한 데다 보안성까지 갖추고 있어 앞으로 이용에 대한 장래성이 기대되는 프로토콜이다.

  • PDF

Feasibility study of wireless motion control (Wireless 모션제어의 가능성 연구)

  • Lee, Don-Jin;Ahn, Jung-Hwan
    • Proceedings of the KSME Conference
    • /
    • 2001.06b
    • /
    • pp.82-86
    • /
    • 2001
  • This papers deals with feasibility study of wireless motion control. Wireless telecommunication advances with development of IT technology and extends more and more areas. So we selected Bluetooth out of the technologies(Bluetooth, SWAP(SharedWireless Access Protocol), IrDA(Infra Red Data Association), WLAN(Wireless Local Area Network)) which was developed for local data communication and set up simple experimental system for wireless data transfer and server and client program for wireless data transfer was wrote. We successfully transferred some data wirelessly with this program.

  • PDF

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

Development of TDMA-Based Protocol for Safety Networks in Nuclear Power Plants (원전 안전통신망을 위한 TDMA 기반의 프로토콜 개발)

  • Kim, Dong-Hoon;Park, Sung-Woo;Kim, Jung-Hun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.7
    • /
    • pp.303-312
    • /
    • 2006
  • This paper proposes the architecture and protocol of a data communication network for the safety system in nuclear power plants. First, we establish four design criteria with respect to determinability, reliability, separation and isolation, and verification/validation. Next we construct the architecture of the safety network for the following systems: PPS (Plant Protection System), ESF-CCS (Engineered Safety Features-Component Control System) and CPCS (Core Protection Calculator System). The safety network consists of 12 sub-networks and takes the form of a hierarchical star. Among 163 communication nodes are about 1600 origin-destination (OD) pairs created on their traffic demands. The OD pairs are allowed to exchange data only during the pre-assigned time slots. Finally, the communication protocol is designed in consideration of design factors for the safety network. The design factors include a network topology of star, fiber-optic transmission media, synchronous data transfer mode, point-to-point link configuration, and a periodic transmission schedule etc. The resulting protocol is the modification of IEEE 802.15.4 (LR-WPAN) MAC combined with IEEE 802.3 (Fast Ethernet) PHY. The MAC layer of IEEE 802.15.4 is simplified by eliminating some unnecessary (unctions. Most importantly, the optional TDMA-like scheme called the guaranteed time slot (GTS) is changed to be mandatory to guarantee the periodic data transfer. The proposed protocol is formally specified using the SDL. By performing simulations and validations using Telelogic Tau SDL Suite, we find that the proposed safety protocol fits well with the characteristics and the requirements of the safety system in nuclear power plants.

A Proactive Dissemination Protocol using Residual Energy and Signal Strength for WSNs (무선 센서 네트워크에서 에너지 잔량과 신호세기를 이용한 데이터 전송 프로토콜)

  • Park, Soo-Yeon;Kim, Moon-Seong;Jeong, Eui-Hoon;Bang, Young-Cheo
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2010
  • In this paper, a data dissemination protocol that transmits data collected for Wireless Sensor Networks (WSNs) is newly proposed, and the proposed proactive protocol takes into account energy consumption minimized and delay time disseminated. The well-known SPMS (Shortest Path Mined SPIN) forms the shortest path-based routing table obtained by Bellman Ford Algorithm (BFA) and disseminates data using a multi-hop path in order to minimize energy consumption. The mentioned properties of SPMS cause memory burden to create and maintain the routing tables. In addition, whenever BFA is executed, it is necessary to suffer from the energy consumption and traffic occurred. In order to overcome this problem, a proactive dissemination protocol using Residual Energy and Signal Strength, called RESS, is proposed in this paper. Simulation results show that RESS outperforms SPMS up to 84% in terms of the number of traffic messages and the transmitted delay time of RESS is similar to that of SPMS using the shortest path.

Routing Protocol for Wireless Sensor Network Considering Data Transmission Stability and Load Quantity (선형적 데이터 전달의 안정성과 부하량을 고려한 무선 센서 네트워크 라우팅 프로토콜)

  • Hwang, Min;Cheon, Seung-Hwan;You, Jin-Ho;Kien, Nguyen Trung;Lee, Guee-Sang
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.111-119
    • /
    • 2007
  • Sensor networks are needed for special purposes such as collecting or transmitting information by using sensor devices, for which various routing protocols have been proposed. Among existing protocols, the modified PEGASIS routing technique is known to be effective when applied to cases with directional transmissions of data. However it does not consider recovery from errors or guaranteeing stability in data transmission, while sensor devices performing repetitive relays and controls are prone to errors. In this paper, a double relay routing protocol for Zigbee based sensor networks where data are transfered reliably with a linear direction. The proposed protocol is effective in the sense that it secures the relaible transmission of data with minimal energy consumption based on a directional data transfer. A streetlight control system has been presented as an application of the proposed protocol.