• Title/Summary/Keyword: Industrial Protocol

검색결과 686건 처리시간 0.024초

CFP Scheduling for Real-Time Service and Energy Efficiency in the Industrial Applications of IEEE 802.15.4

  • Ding, Yuemin;Hong, Seung Ho
    • Journal of Communications and Networks
    • /
    • 제15권1호
    • /
    • pp.87-101
    • /
    • 2013
  • In industrial applications, sensor networks have to satisfy specified time requirements of exchanged messages. IEEE 802.15.4 defines the communication protocol of the physical and medium access control layers for wireless sensor networks, which support real-time transmission through guaranteed time slots (GTSs). In order to improve the performance of IEEE 802.15.4 in industrial applications, this paper proposes a new traffic scheduling algorithm for GTS. This algorithm concentrates on time-critical industrial periodic messages and determines the values of network and node parameters for GTS. It guarantees real-time requirements of periodic messages for industrial automation systems up to the order of tens to hundreds of milliseconds depending on the traffic condition of the network system. A series of simulation results are obtained to examine the validity of the scheduling algorithm proposed in this study. The simulation results show that this scheduling algorithm not only guarantees real-time requirements for periodic message but also improves the scalability, bandwidth utilization, and energy efficiency of the network with a slight modification of the existing IEEE 802.15.4 protocol.

TPM 명령어 인가 프로토콜에 대한 내부자 공격 취약점 분석 및 대응책 (Vulnerability Analysis of Insider Attack on TPM Command Authorization Protocol and Its Countermeasure)

  • 오두환;최두식;김기현;오수현;하재철
    • 한국산학기술학회논문지
    • /
    • 제12권3호
    • /
    • pp.1356-1366
    • /
    • 2011
  • TPM(Trusted Platform Module)은 신뢰된 컴퓨팅 환경을 구성하기 위해 플랫폼 내부에 부착된 하드웨어 칩이다. TPM의 핵심 명령어들 중에서 정당한 사용자만이 TPM을 사용할 수 있도록 명령어에 대한 인가(authorization)가 선행되어야 한다. 즉, 사용자는 TPM 칩에게 명령어 인가를 받기 위해 OIAP(Object-Independent Authorization Protocol)이나 OSAP(Object-Specific Authorization Protocol) 프로토콜을 사용한다. 그러나 최근 Chen과 Ryan은 단일 플랫폼 내의 멀티유저 환경에서 내부 공격자가 TPM으로 위장하는 공격에 취약함을 밝히고 그 대응책으로 SKAP(Session Key Authorization Protocol) 프로토콜을 이론적으로 제안하였다. 본 논문에서는 실제 PC에 TPM 칩을 장착한 상태에서 OSAP에 대한 내부자 공격이 실제로 가능함을 인가 프로토콜 실험을 통해 확인하였다. 또한 이전의 대응 방법인 SKAP에서 명령어 구조 변경 및 대칭 키 암호 연산이 필요했던 점을 개선하여 보다 효과적인 내부자 공격 대응책을 제안하였다. 제안 프로토콜에서는 OSAP 명령어 체계만 간단히 수정하고 사용자 및 TPM 칩에서 각각 RSA 암 복호 연산 한번만 추가하면 내부자 공격을 막을 수 있다.

IEEE 802.11 무선랜의 성능 향상을 위한 하이브리드 MAC 프로토콜 (Hybrid MAC Protocol for Improving Performance of IEEE 802.11 Wireless LANs)

  • 최우용
    • 대한산업공학회지
    • /
    • 제41권2호
    • /
    • pp.220-224
    • /
    • 2015
  • The DCF (Dcistributed Coordination Function) and PCF (Point Coordination Function) are the basic MAC (Medium Access Control) protocols of IEEE 802.11 wireless LANs. According to the DCF, each node performs the exponential backoff algorithm before the transmission of its data frame. Each node doubles the backoff waiting time before the transmission of its data frame whenever it detects the transmission collision with other nodes. Therefore, as the number of the active nodes having the data frames to transmit increases, the overall MAC performance of the DCF decreases. On the other hand, according to the PCF, each node is granted the transmission opportunity by which the PCF transmission is possible without the collision with other nodes. Therefore, as the number of the active nodes increases, the MAC performance of the PCF increases, In this paper, considering the tradeoff of MAC performance between the DCF and PCF, a hybrid MAC protocol is proposed to enhance the performance of IEEE 802.11 wireless LANs.

A study on BEMS-linked Indoor Air Quality Monitoring Server using Industrial IoT

  • Park, Taejoon;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제10권4호
    • /
    • pp.65-69
    • /
    • 2018
  • In this paper, we propose an interworking architecture for building indoor air quality monitoring server (BEMS) using IIoT (Industrial Internet of Things). The proposed monitoring server adopts IIoT-based standard protocol so that interaction with BEMS installed in existing buildings can be performed easily. It can effectively communicate with indoor air quality measurement sensor installed in the building based on IIoT, Indoor air quality monitoring is possible. We implemented a proposed monitoring server, and confirmed the availability and monitoring of data from sensors in the building.

IEC 61850용 IED의 시각 동기 방안 연구 (A Study on Time Synchronization Method for IED Using IEC 61850)

  • 안용호;김병헌;장병태;송인준;김영돈;장수형;김경호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.277-279
    • /
    • 2008
  • 현재 많은 전력계통용 보호제어 벤더들은 변전소 자동화 국제표준 프로토콜인 IEC 61850을 적용한 전력 장비들을 개발하여 변전소에 적용하고 있다. 이러한 많은 장비들은 표준화된 IEC 61850 프로토콜을 적용하여 상호 호환성을 유지하였으며, 기존에 적용되고 있는 표준화된 기술들을 채택하고 있다. 변전소 장비들은 정밀한 시간 동기를 위해서 표준화된 시각 동기 프로토콜인 SNTP(Simple Network Time Protocol)나 NTP(Network Time Protocol)를 사용하고 있다. 본 연구에서는 IEC 61850 프로토콜을 적용한 IED가 시각 동기 장치로부터 시간 동기화되는 방안에 대해 연구하였다.

  • PDF

An Optimization Algorithm for Minimum Connected Dominating Set Problem in Wireless Sensor Network

  • Ahn, Nam-Su;Park, Sung-Soo
    • Industrial Engineering and Management Systems
    • /
    • 제10권3호
    • /
    • pp.221-231
    • /
    • 2011
  • One of the critical issues in wireless sensor network is the design of a proper routing protocol. One possible approach is utilizing a virtual infrastructure, which is a subset of sensors to connect all the sensors in the network. Among the many virtual infrastructures, the connected dominating set is widely used. Since a small connected dominating set can help to decrease the protocol overhead and energy consumption, it is preferable to find a small sized connected dominating set. Although many algorithms have been suggested to construct a minimum connected dominating set, there have been few exact approaches. In this paper, we suggest an improved optimal algorithm for the minimum connected dominating set problem, and extensive computational results showed that our algorithm outperformed the previous exact algorithms. Also, we suggest a new heuristic algorithm to find the connected dominating set and computational results show that our algorithm is capable of finding good quality solutions quite fast.

Infrastructure Mode IEEE 802.11 무선랜 시스템에서 단말간의 다중 직접 통신을 위한 효율적인 폴링 방식 (Efficient Polling Scheme for Multiple Direct Link Communication Between STAs in Infrastructure Mode IEEE 802.11 Wireless LANs)

  • 최우용
    • 대한산업공학회지
    • /
    • 제33권2호
    • /
    • pp.237-245
    • /
    • 2007
  • In this paper, a modified PCF (Point Coordination Function) MAC (Medium Access Control) Protocol is proposed to support the multiple direct link communication between STAs (STAtions) in infrastructure mode IEEE 802.11 wireless LANs. By the proposed MAC protocol, the direct link communication between STAs, which are located within the communication range of each other, is allowed without the use of AP (Access Point) as a relay. Moreover, when multiple direct data communication between STAs can be simultaneously performed with a sufficiently small interference, multiple simultaneous direct link communication is allowed for the efficient use of radio bandwidth. AP polls STAs to grant the transmission opportunities using the direct link communication by transmitting the polling frames to STAs. An efficient polling method for granting the transmission opportunities to STAs is proposed to reduce the number of the polling frame transmissions and enhance the PCF MAC performance.

국제환경 규제에 따른 산업영향과 정부의 환경정책방안 (A study on die Industrial impact and the government countermeasures for international environment regulation)

  • 정경희;조재립
    • 한국품질경영학회:학술대회논문집
    • /
    • 한국품질경영학회 2009년도 추계학술대회
    • /
    • pp.245-251
    • /
    • 2009
  • After the Kyoto Protocol has been ratitied in Feb. 16 2005, the developed countries which is involved in Annex-1 have tried to mitigate GHG to the reduction objective. To accomplish this objective, EU developed EU-ETS, CDM project, and so on. Korea has faced pressure to be a member of Annex-1, because Korea and Mexico are only non-Annex-1 countries in the OECD nations. This study is intended to examine unfolding transition on negotiations of Conference of Parties(COP), the Kyoto Mechanism referred as a cost-effective tool to meet a targeted level of greenhouse gas decrease, and trends in responses of developed countries to the Kyoto Protocol, and finally suggests legal and politic counterplans responding to the United Nations Framework Convention on Climate Change(hereafter, UNFCCC).

  • PDF

RFID/USN 보안을 위한 프로토콜 설계 (Design of protocol for RFID/USN security)

  • 박상현;박상민;신승호
    • 대한안전경영과학회지
    • /
    • 제9권3호
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

초기 슬로우 스타트 구간에서 웹 객체의 평균 전송 시간 추정을 위한 수학적 모델 (Mathematical Model for Mean Transfer Delay of Web Object in Initial Slow Start Phase)

  • 이용진
    • 대한공업교육학회지
    • /
    • 제33권2호
    • /
    • pp.248-258
    • /
    • 2008
  • 현재 인터넷은 응용계층에서 HTTP를 사용하고 트랜스포트 계층에서는 TCP를 사용하여 서비스를 제공하고 있다. 새롭게 제안된 전송 계층 프로토콜인 SCTP(Stream Control Transmission Protocol)는 슬로우 스타트 기간 동안에 초기 윈도우의 값 등을 제외하고는 TCP와 유사한 혼잡 제어 메커니즘을 사용한다. 본 논문에서는 이 점에 주목하여 슬로우 스타트 기간 동안에 HTTP over SCTP의 평균 전송 시간을 구하는 수학적 모델을 제시하고 이를 기존의 HTTP over TCP와 비교한다. 비교 결과는 HTTP over SCTP의 평균 전송 시간이 HTTP over TCP의 그것보다 평균 11 % 우수함을 보여준다.