• Title/Summary/Keyword: Industrial Protocol

Search Result 686, Processing Time 0.214 seconds

Design of a Remote Distributed Embedded System Using Internet and CAN for multi-induction motor of Building and Industrial fields (산업용 유도전동기의 네트워크 운전을 위한 인터넷과 CAN을 이용한 원격분산 Embedded System 설계)

  • Hong, Won-Pyo;Kim, Jung-Gon
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2006.05a
    • /
    • pp.302-308
    • /
    • 2006
  • We introduce the concept of a remote distributed embedded system to integrated fieldbus based control systems in internet/Intranet. As a result fieldbus systems are opened up for remote monitoring, remote maintenance, and remote control applications using state of the art Web-technology. This paper addresses the design of a remote distributed embedded system using Internet and CAN for multi-Induction motor of Building and Industrial field. The fieldbus used the CAN based networked intelligent multi-motor control system using DSP2812 microprocessor. To build such a system, the TCP/IP-CAN Gateway which convert a CAN protocol to TCP/IP protocol and vice verse, was designed. A experimental simulation system consists of a TCP/IP-CAN Gateway in remote place and a command PC ti be connected ti Ethernet.

  • PDF

Security Method for Approval Process of Payment System (지불시스템의 승인단계에서 보안방안)

  • 임인채;위장현
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.59-65
    • /
    • 2002
  • Payment systems in EC need confidentiality, integrity, non-repudiation. All transactions between cardholders and merchants must be authorized by a payment gateway in SET protocol. RSA secret key operation which requires heavy computation takes the most part of the time for payment authorization. For the reason, a heavy traffic of payment authorization requests from merchants causes the payment gateway to execute excessive RSA secret key operations, which may cause the bottleneck of the whole system. To resolve this problem, One-Time Password technique is applied to payment authorization step of the SET protocol.

  • PDF

A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems (저전력 RFID 시스템을 위한 해시 체인 기반의 경량화 된 상호 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.560-566
    • /
    • 2009
  • A low-power Radio Frequency Identification (RFID) system is an auto-identification technology that reads and writes an information of things without physical contacts using radio frequency. It is unescapable against unlawful modification, eavesdropping, tracking, or privacy of individuals because RFID systems use the radio frequency and RFID tags. Therefore we create a key using hash chain between database and tag and this process can prevent above attacks. Also we support the efficiency of proposed protocol using hash function to abate computation.

A Design and Implementation of Information System Using Zigbee Technology (Zigbee 모바일단말 하드웨어 설계와 정보시스템 구축)

  • Ha, Kyeoung-Ju
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.44-49
    • /
    • 2009
  • We show the way how to design and develop the information system using Zigbee technology. First we set the protocol for zigbee tag and reader. And then we give the information system using designed system based on zigbee technology. In this paper, we use MG2455-F48 module as zigbee module.

Independent I/O Relay Class Design Using Modbus Protocol for Embedded Systems

  • Kim, Ki-Su;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.1-8
    • /
    • 2020
  • Communication between system modules is applied using the Modbus protocol in industrial sites including smart factories, industrial drones, building energy management systems, PLCs, ships, trains, and airplanes. The existing Modbus was used for serial communication, but the recent Modbus protocol is used for TCP/IP communication.The Modbus protocol supports RTU, TCP and ASCII, and implements and uses protocols in embedded systems. However, the transmission I/O devices for RTU, TCP, and ASCII-based protocols may differ. For example, RTU and ASCII communications transmit on a serial-based communication protocol, but in some cases, Ethernet TCP/IP transmission is required. In particular, since the C language (object-oriented) is used in embedded systems, the complexity of source code related to I/O registers increases. In this study, we designed software that can logically separate I/O functions from embedded devices, and designed the execution logic of each instance requiring I/O processing through a delegate class instance with Modbus RTU, TCP, and ASCII protocol generation. We designed and experimented with software that can separate communication I/O processing and logical execution logic for each instance.

Effect of Accession to OPRC-HNS Protocol on Korean Industry (OPRC-HNS 의정서 가입이 국내 산업계에 미치는 영향)

  • Choi, Jong-Wook;Lee, Seung-Hwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.4
    • /
    • pp.37-42
    • /
    • 2007
  • Since the OPRC-HNS Protocol entered into forced in the June of 2007, the potential effects on industrial circles are encouraged to be analyzed according to the obligatory regulations listed in the Protocols. This study was conducted on the quantitative analysis of the possible effect on the industrial circles if Korea accedes to OPRC-HNS Protocol. In spite of any burdens caused by keeping "accident emergency program memorandum" and performing "education and any training program for the crews", potential decrease of insurance fee is in possibility provided it follows. In addition, the oil refinery and petrochemical industries may also have burdens for potential costs for acquiring any materials including equipments and fees for education and training related to HNS. However, minimizing any costs by swift response against accidents would be big advantage that comes with paying of small amounts of expense by international convention related to HNS.

  • PDF

Intelligent Lighting Development having Auto-Address in DMX512 Protocol (DMX512 프로토콜에서 자동주소를 갖는 지능형 조명 단말기 개발)

  • Choi, Seong-Cheol;Lee, Won-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1233-1238
    • /
    • 2010
  • The lighting industry has become the bigger and more systemized using the semiconductor LED with each control R(Red), G(Green), B(Blue). The communication standard DMX512(ANSI E1.11) protocol of it basically needs the address which can be distinguished between the lighting terminals. The conventional method has to give the address of the lighting any methods like dip switch, EEROM and PROM. Then the lighting terminal can receive RGB data from DMX512 communication. According to electrical characteristics DMX512 protocol has to the splitter every 32 lighting terminals. If 512 lightings is all connected, maximum 16 splitters are needed. This paper is solved above weakness in DMX512 protocol using serial connection all lighting terminals. Also I developed the intelligent lighting terminal with auto-addressing. This was solved the inconvenience of the address assignment and the usage of the splitter. The developed products is applied and selled the semiconductor lighting terminals using ON-OFF control, dimming control, sequential control and rainbow control.

A Secure WPA-PSK Protocol Resistant to Dictionary Attack on Smartphone Communication Using Wi-Fi Channel (Wi-Fi를 이용한 스마트폰에서 사전 공격에 안전한 WPA-PSK 프로토콜)

  • Park, Geun-Duk;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1839-1848
    • /
    • 2012
  • Recently, smartphone communications using Wi-Fi channel are increasing rapidly to provide diverse internet services. The WPA security protocol was used for data protection between user and wireless AP. However, WPA-PSK protocol was known to be weak to the dictionary attack. In this paper, we proposed a secure WPA-PSK protocol to resist the dictionary attack. Since the proposed method was designed to generate a strong encryption key which is combined the Diffie-Hellman key agreement scheme with secrecy property of PSK(Pre-Shared Key), we can protect the Wi-Fi channel from Man-In-The-Middle attack and Rogue AP impersonation attack.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Direct-Sequence Spread-Spectrum Systems for Interference Signal Control (직접 대역 확산 시스템을 위한 간섭 신호 제어)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1976-1981
    • /
    • 2013
  • In this paper, we propose a frequency-domain interference cancellation algorithm for direct-sequence spread spectrum systems. In the previously proposed frequency-domain interference cancellation algorithms that protocol defines the rules concerning the collection of means of Transmission Control Protocol (TCP: Transmission Control Protocol) is the most widely used in the transport layer. Two-way traffic through the network path to the same end-to-end transfer of data in the opposite direction between pairs of nodes are infused with two or more TCP connection using the network traffic patterns from the exchanger and routers share results of approval. Per-flow input/output structure of matter using the LTS online reaction when evaluated as this is the most important factor. TCP-MT when the connection duration is one of the largest performance gains.