• Title/Summary/Keyword: Exchanging protocol

Search Result 101, Processing Time 0.023 seconds

Key Exchange Protocol using Password on CDN (CDN에서 패스워드를 이용한 키 교환 프로토콜)

  • Shin Seung-Soo;Han Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.133-141
    • /
    • 2005
  • Digital contents can be distributed via internet without qualify defect and this will bring a great loss to the contents provider. Therefore, it is necessary to investigate on the key exchanging protocol to protect the digital contents effectively. In this study we propose the key exchanging protocol based on password to send the digital contents efficiently. The stability suggested here is based on the difficulty of the discrete algebra and Diffie-Hellman problem and also it provides a secure safety against various attacks such as a guess attack on the password.

  • PDF

Performance Analysis of Web Service Middleware based on SOAP/RESTFUL (SOAP/RESTFUL 기반 웹 서비스 미들웨어 성능분석)

  • Song, Byung-Kwen
    • Journal of IKEEE
    • /
    • v.18 no.1
    • /
    • pp.146-151
    • /
    • 2014
  • The Smart Grid provide a lot of additional service between ICT(Information Communication Technology) and fusion service. The smart grid using various protocol need to use independent middleware system for exchanging information data. The application system of Smart Grid is exchanging information on the almost All-IP system. The current All-IP middleware system consist of SOAP and RESTful. This paper analysis SOAP and RESTful. This result make use of building Smart Grid System.

Design of Interoperable DTD Architecture supporting Interoperability of Digital Documents for B2B, B2G Environments (B2B, B2G 환경에서 전자문서의 상호운용을 지원하는 DTD 상호운용 구조의 설계)

  • Park, Sang-Yun
    • Management & Information Systems Review
    • /
    • v.21
    • /
    • pp.99-114
    • /
    • 2007
  • According as Internet based EC(Electronic Commerce) has been activated, More requirements for exchanging digital documents are being proposed in B2B(Business to Business) and B2G(Business to Government) environments. However, the documents can not be processed automatically, because the structures of documents in each site(companies, central/local governments) do not match. Therefore, W3C(World Wide Web Consortium) has proposed XML(eXtensible Markup Language) DTD(Document Type Declaration) technology to support structuring documents. The XML DTD technology can support interoperability between EC sites. And, XML DTD based documents can be processed automatically in every sites. They will improve efficiency of services in B2B and B2G environments. In this paper, we propose interoperable DTD architecture and IDEP(Interoperable DTD Exchange Protocol) protocol which supports searching DTDs and exchanging DTDs. This technology can popularize DTDs and digital documents.

  • PDF

Query Efficiency Evaluation of the Metadata Exchanging Protocol for Metadata Registries (메타데이터 레지스트리를 위한 메타데이터 교환 프로토콜의 질의 효율성 평가)

  • Jeong, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.2
    • /
    • pp.73-81
    • /
    • 2005
  • 이 논문에서는 메타데이터 레지스트리간의 메타데이터 교환을 위해 제안된 교환 프로토콜의 장점을 명시적으로 보이기 위한 시뮬레이션 결과에 대하여 기술한다. 기존 접근 방법들은 교환 메커니즘의 높은 복잡도, 지역 메타데이터 관리 시스템으로의 종속성, 새로운 메타데이터 관리 시스템의 추가를 위한 높은 비용 등의 문제점을 지닌다. 이를 해결하기 메타데이터 교환 프로토콜이 제안되었다. 그러나 지금까지의 연구에서는 정성적으로만 그 장점을 보였다. 이 논문의 목적은 정략적 관점에서 제안된 프로토콜의 장점을 기술하고자 함에 있다. 특히 이 논문에서는 질의 효율이 가장 중요한 문제로서 다른 요인에 의한 결과에도 영향을 주기 때문에 질의 효율성 문제에 초점을 둔다. 이를 위해 평가 항목과 평가 모델에 대해 정의한다. 질의 효율성 평가를 위한 요인 중에서 대상 메타데이터의 개수, 각 메타데이터를 구성하는 컴포넌트의 개수 및 각 컴포넌트들을 구성하는 속성들의 개수를 주 파라미터로 이용하였다. 이에 따라 시뮬레이션은 크게 세 가지 유형을 지니게 된다 정량적 평가를 통해 교환 프로토콜이 요구되는 이유와 그 정당성을 명시적으로 보인다.

  • PDF

A Design of Web based GEM Using Single Object Access Protocol

  • Kang W. Joon;Park, H. Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.57.5-57
    • /
    • 2001
  • This paper presents an enhanced web-based distributed system with Single Access Object Protocol(SOAP), which uses HTTP as a communication protocol and XML as a data presentation. The suggested system is applied into a Generic Equipment Model (GEM) for exchanging specified messages(SECS-II), which are encoded into XML presentation, between Equipment and Host via the web sorrel. In this paper, the designed system architecture and its soap components are presented.

  • PDF

Automatic import system of NE MIB for network management at NMS based on SNMP (SNMP 기반 NMS에서 네트웍 관리를 위한 NE MIB의 자동 Import System 설계)

  • 강광석;김영진;박상대;정성현;조종신
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.109-112
    • /
    • 2002
  • SNMP is generally used protocol for network management. SNMP need MIB for exchanging management information But, method for sharing MIB is not automatic. General MIB sharing architecture is done by network management operator by manually. In this paper we describe exchanging MIB automatically using meta-MIB. We will formalize SMI as MIB structure. This meta MIB represent information about MIB of NE Agent. Meta MIB has Information of object in the MIB, Structure and index information fur columnar object, meaning of subtype at INTEGER syntax. Also, trap related information is represented too. In this paper, MIB information is represented as instance of meta MIB. This architecture will provide a method for automatic MIB exchanging

  • PDF

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

Cooperative Incumbent System Protection MAC Protocol for Multi-channel Ad-hoc Cognitive Radio Networks

  • Yi, Ke;Hao, Nan;Yoo, Sang-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1976-1996
    • /
    • 2011
  • Cognitive radio (CR) MAC protocol provides access control of unused spectrum resources without causing interference to primary users. To achieve this goal, in this paper a TDMA based cooperative multi-channel cognitive radio MAC (MCR-MAC) protocol is proposed for wireless ad hoc networks to provide reliable protection for primary users by achieving cooperative detection of incumbent system signals around the communication pair. Each CR node maintains transmission opportunity schedules and a list of available channels that is employed in the neighbor discovery period. To avoid possible signal collision between incumbent systems and cognitive radio ad hoc users, we propose a simple but efficient emergency notification message exchanging mechanism between neighbor CR nodes with little overhead. Our simulation results show that the proposed MCR-MAC can greatly reduce interference with primary users and remarkably improve the network throughput.

An Energy Efficient Time Synchronization Technique Based on WUSB over WBAN Protocol for Wearable Computer Systems (웨어러블 컴퓨터 시스템을 위한 WUSB over WBAN 프로토콜의 에너지 효율적인 시간 동기 기술)

  • Hur, Kyeong;Sohn, Won-Sung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.879-884
    • /
    • 2012
  • In this Paper, we propose an Energy Efficient Time Synchronization technique based on WUSB (Wireless USB) over WBAN (Wireless Body Area Networks) protocol required for Wearable Computer systems. For this purpose, the proposed Time Synchronization algorithm minimizes power consumption and estimates time information with accuracy. It is executed on the basis of WUSB over WBAN protocol at each sensor node comprising peripherals of a wearable computer system. It minimizes power consumption by exchanging time stamp packets and forming a hierarchical structure.