• Title/Summary/Keyword: Handshake

Search Result 89, Processing Time 0.029 seconds

Research on Performance Improvement for Wireless CCN (무선 CCN을 위한 성능향상에 대한 연구)

  • Lee, Seung-Jin;Bae, Hong-Min;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.71-76
    • /
    • 2015
  • To resolve inefficient content delivery mechanism in conventional internet-based networks, Content-Centric Networks (CCN) has been proposed for wired and wireless networks. One of issues in wireless CCN-based networks is overhead to achieve reliability on content delivery because CCN uses end-to-end two-way handshake with Interest/content packets. In this paper, a novel protocol to reduce overhead and achieve reliability is proposed. The protocol allows Interest packet to request multiple data packets and multiple data packets to be sent in a row without a Interest packets. The protocol is evaluated through the simulations and the performance improvement is proved.

A Low Power Asynchronous MSP430 Processor for Ubiquitous Sensor Network (편재형 센서네트워크 노드를 위한 저전력 비동기 MSP430 프로세서)

  • Shin, Chi-Hoon;Shang, Belong;Oh, Myeong-Hoon;Kim, Young-Woo;Kim, Sung-Nam;Yakovlev, Alex;Kim, Sung-Woon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.451-453
    • /
    • 2007
  • This paper describes the design of an asynchronous implementation of a sensor network processor. The main purpose of this work is the reduction of power consumption in sensor network node processors and the research presented here tries to explore the suitability of asynchronous circuits for this purpose. The Handshake Solutions toolkit is used to implement an asynchronous version of a sensor processor. The design is made compact, trading area and leakage power savings with dynamic power costs, targeting the typical sparse operating characteristics of sensor node processors. It is then compared with a synchronous version of the same processor. Both versions are then compared with existing commercial processors in terms of power consumption.

  • PDF

Interworking between PPP CHAP and RADIUS Authentication Server on GPRS Network (GPRS 망에서 PPP CHAP과 RADIUS 인증 서버 연계 방안)

  • 박정현;이상호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.567-577
    • /
    • 2003
  • We usually applied PPP CHAP (Point-to-Point Protocol Challenge Handshake Authentication Protocol) when the visited ISP subscriber accesses to authentication server in own home ISP network and IP Assignment for remote Internet service. But PPP CHAP doesn't support in case of visited ISP subscriber in GPRS network accesses to authentication server in own home ISP network for wireless Internet service. We suggest solution this problem with PPP CHAP improvement. For this we propose the modified PPP CHAP message format, PCO Message format at MT, and interworking message and format between GGSN and RADIUS in home ISP network for wireless internet service of mobile ISP subscriber at GPRS network in this paper. We also show authentication results when visited mobile ISP subscriber via PPP CHAP at GPRS network accesses the RADIUS server in home ISP network.

Improvement of Dynamic Characteristics of OIS System using Improved Band Notch and Analysis of Images (노치 대역을 개선한 이미지 흔들림 보정 장치의 동특성 향상과 이미지 분석)

  • Son, Dong-Hun;Park, No-Cheol;Park, Young-Pil;Park, Kyoung-Su
    • Transactions of the Society of Information Storage Systems
    • /
    • v.7 no.2
    • /
    • pp.70-74
    • /
    • 2011
  • The mobile camera module is a device to be inserted in the digital device for camera feature. The mobile camera module is being shaken by vibrations such as handshake during the exposure time. The clarity is compromised by these vibrations, thus the vibration is considered as an external disturbance. Moreover the use of mobile camera module has been being expanded for automotive vibration should be considered. These external disturbances can cause image blurring, thus optical image stabilization should be applied for image compensation. The compensator is fulfilled mechanically by movable lens group or image sensor that adjusts the optical path to the camera movement. Open loop control is useful for well-defined systems like compliant mechanism. Notch filter and lead compensator are designed and applied to improve the stability and bandwidth. The final level of image compensating is confirmed by image processing with MATLAB and CODE V to verify the better performance.

Proposal for Optical One-time Password Authentication Using Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.6
    • /
    • pp.722-732
    • /
    • 2016
  • A new optical one-time password (OTP) authentication method using digital holography is proposed, which enhances security strength in the authentication system. A challenge-response optical OTP algorithm based on two-factor authentication is presented using two-step phase-shifting digital holography, and two-way authentication is also performed using challenge-response handshake in both directions. Identification (ID), password (PW), and OTP are encrypted with a shared key by applying phase-shifting digital holography, and these encrypted pieces of information are verified by each party by means of the shared key. The encrypted digital holograms are obtained by Fourier-transform holography and are recorded on a CCD with 256 quantized gray-level intensities. Because the intensity pattern of such an encrypted digital hologram is distributed randomly, it guards against a replay attack and results in higher security level. The proposed method has advantages, in that it does not require a time-synchronized OTP, and can be applied to various authentication applications. Computer experiments show that the proposed method is feasible for high-security OTP authentication.

A study on the hardware development for handshake recognition using electric potential signal form human body (인체전자기장 신호를 응용하여 손동작 인식을 위한 하드웨어 구현에 대한 연구)

  • Cheon, Woo Young;Lee, Suk Hyun;Kim, Young Chul
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.49-53
    • /
    • 2016
  • Related researches are progressing that method of non-contact method using the electromagnetic field on the human body by detecting the motion recognition signal is the limitations of time and space, so less than the existing systems. In this paper, we designed the circuit system that can implement the hardware that can detect the electric field signal of the human body non-contact method to increase the recognition rate to screen this digital waveform. The PCB design Used to automatically increase of composition of the circuit and the linkage of the comparator digital waveform with circuit simulation of the system. At same time for evaluate the characteristics of the whole circuit system.

Study on Providing Anonymity of HTTPS Web Site Blocking (HTTPS 웹 사이트 차단의 익명성 제공 방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • As the number of harmful sites increases, many social problems are occurring. Therefore, in order to solve this problem, the government is carrying out activities to block access to web sites to harmful sites based on the law. However, due to the change from HTTP to HTTPS protocol, it has become difficult to block the harmful sites in the existing method. In the existing HTTP protocol, a method of blocking the site corresponding to the harmful site domain list by utilizing the DNS information was used. However, due to the generalization of HTTPS, it is difficult to block the harmful sites in the existing method. Therefore, the ISP uses the method of blocking the website using the SNI field in the TLS (Transport Layer Security) Handshake protocol used for HTTPS. However, since the method using SNI field raises the concern of monitoring Internet users or exposing information about connected sites, in this paper, we proposed method which can support anonymity to Internet users while blocking harmful sites. The suggested method also can support integrity and source authentication to the transmitted data.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

Analysis the Overhead of IEEE 802.11 RTS/CTS Handshake in Ad-hoc Networks Based Multipath Routing (다중경로 라우팅 기반 Ad-hoc Networks에서 IEEE 802.11 RTS/CTS 핸드세이크 오버헤드 분석)

  • Kim, Hyun-Chang;Lee, Jai-Yong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.33-44
    • /
    • 2008
  • Multipath routing protocols with load balance, fault tolerance, aggregated bandwidth in Ad-hoc Networks provide improved throughput and reliable route as compared with singlepath routing protocols. However, multipath routing protocols have not been explored thoroughly in the domain of overhead in Ad-hoc Networks. In this paper, we analyze and compare on-demand singlepath and multipath routing with IEEE 802.11 DCF in terms of Routing overhead and MAC overhead. The results reveals that in comparison with singlepath routing protocol, multipath routing mechanism creates more overheads but provides better performance in congestion and capacity provided that the route length is within a certain upper bound which is derivable. The analytical results are further confirmed by simulation.

Train Topology Discovery Protocol(TTDP) over Dual-Band WLAN-Based Train Communication Network (이중 무선랜 기반 차량 통신망에서의 열차 토폴러지 구성 프로토콜(TTDP))

  • Kang, Shinkwang;Park, Jaehyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1102-1109
    • /
    • 2017
  • In Train Control Network(TCN), to support advanced services beyond control applications, it was revised to support high speed ethernet as IEC 61375-2-5(ETB) and IEC 61375-3-4(ECN). And Train Topology Discovery Protocol(TTDP) was included by which train-consist can be automatically configured. Meanwhile, to adopt wireless LAN as an next onboard network, TTDP need to be modified to reflect the characteristics of WLAN. This paper proposed a TTDP for WLAN using transmission power control and the number of HELLO-ACK handshake. And it determined whether the TTDP executed using the two WLAN interfaces having different bandwidths is correct or not. The proposed TTDP can allow to reduce interference from other nodes. For evaluation of performance of TTDP, NS-2 was used. The evaluation result shows the high reliability of the TTDP in wireless environment.