• Title/Summary/Keyword: Information Exchange Requirements

Search Result 151, Processing Time 0.026 seconds

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Secure Distributed Cryptocurrency Transaction Model Through Personal Cold Wallet (개인용 보안장치를 통한 안전한 분산형 암호 화폐 거래 모델)

  • Lee, Chang Keun;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.187-194
    • /
    • 2019
  • Ever since the world's largest Bitcoin Echange, (Mt. Gox), was closed in March 2014 due to the series of hacking, still many other Exchages incl. recent Coinale in Korea have been attacked. Those hacking attempts never stopped and have caused significant threats to the overall industry of Crypto Currency and resulted in the loss of individual investors' asset. The DEX (Decentralized Exchange) has been proposed as a solution to fix the security problem at the Exchange, but still it is far away to resolve all issues. Therefore, this paper firstly analyzes security threats against existing Crypto Currency Exchanges and secondly derives security requirements for them. To do that it proposes a secure and distributed Crypto Currency Transaction Model through Personal Security devices as a solution. The paper also proves this new attempt by demonstrating its unique modelling; ultimately by adopting this modeling into Crypto Exchange is to avoid potential security threats.

Key Exchange md Key Recovery System in Wireless Communications using Key Escrow (위탁 방식을 이용한 무선 통신 상의 키 분배 및 키 복구 시스템)

  • Joo, Mi-Ri;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.665-670
    • /
    • 2002
  • Wireless communications require the cryptography system which satisfies a opposite purpose as safety and efficiency. In this paper we proposed the efficient key distribution system satisfying in wireless communication using escrow in order to satisfy the requirements. We supplemented the key recovery function to prevent side effects of cryptography and it is possible to check verification. Also, transmitted information is a little so that the system is efficient. The proposed key recovery method can be applicable to various application fields.

Design of a Hospice Referral System for Terminally Ill Cancer Patients Using a Standards-Based Health Information Exchange System

  • Lim, Kahyun;Kim, Jeong-Whun;Yoo, Sooyoung;Heo, Eunyoung;Ji, Hyerim;Kang, Beodeul
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.317-326
    • /
    • 2018
  • Objectives: The demand for hospice has been increasing among patients with cancer. This study examined the current hospice referral scenario for terminally ill cancer patients and created a data form to collect hospice information and a modified health information exchange (HIE) form for a more efficient referral system for terminally ill cancer patients. Methods: Surveys were conducted asking detailed information such as medical instruments and patient admission policies of hospices, and interviews were held to examine the current referral flow and any additional requirements. A task force team was organized to analyze the results of the interviews and surveys. Results: Six hospices completed the survey, and 3 physicians, 2 nurses, and 2 hospital staff from a tertiary hospital were interviewed. Seven categories were defined as essential for establishing hospice data. Ten categories and 40 data items were newly suggested for the existing HIE document form. An implementation guide for the Consolidated Clinical Document Architecture developed by Health Level 7 (HL7 CCDA) was also proposed. It is an international standard for interoperability that provides a framework for the exchange, integration, sharing, and retrieval of electronic health information. Based on these changes, a hospice referral scenario for terminally ill cancer patients was designed. Conclusions: Our findings show potential improvements that can be made to the current hospice referral system for terminally ill cancer patients. To make the referral system useful in practice, governmental efforts and investments are needed.

SRTP Key Exchange Scheme Using Split Transfer of Divided RSA Public Key (RSA 공개키 분할 전송을 이용한 SRTP 키 교환 기법)

  • Chae, Kang-Suk;Jung, Sou-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.147-156
    • /
    • 2009
  • This paper proposes a SRTP key exchange scheme using split transfer of divided RSA public key in SIP-based VoIP environment without PKI. The existing schemes are hard to apply to real VoIP environment, because they require a PKI and certificates in the end devices. But in case of ZRTP. which is one of existing schemes, it's able to exchange SRTP Key securely without PKI, but it is inconvenient since it needs user's involvement. To solve these problems, the proposed scheme will split RSA public key and transmit them to SIP signaling secession and media secession respectively. It can defend effectively possible Man-in-The-Middle attacks, and it is also able to exchange the SRTP key without the user's involvement. Besides, it meets the requirements for security of SRTP key exchange. Therefore, it's easy to apply to real VoIP environment that is not available to construct PKL.

Topology Aggregation for Hierarchical Wireless Tactical Networks

  • Pak, Woo-Guil;Choi, Young-June
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.344-358
    • /
    • 2011
  • Wireless tactical network (WTN) is the most important present-day technology enabling modern network centric warfare. It inherits many features from WMNs, since the WTN is based on existing wireless mesh networks (WMNs). However, it also has distinctive characteristics, such as hierarchical structures and tight QoS (Quality-of-Service) requirements. Little research has been conducted on hierarchical protocols to support various QoS in WMN. We require new protocols specifically optimized for WTNs. Control packets are generally required to find paths and reserve resources for QoS requirements, so data throughput is not degraded due to overhead. The fundamental solution is to adopt topology aggregation, in which a low tier node aggregates and simplifies the topology information and delivers it to a high tier node. The overhead from control packet exchange can be reduced greatly due to decreased information size. Although topology aggregation is effective for low overhead, it also causes the inaccuracy of topology information; thus, incurring low QoS support capability. Therefore, we need a new topology aggregation algorithm to achieve high accuracy. In this paper, we propose a new aggregation algorithm based on star topology. Noting the hierarchical characteristics in military and hierarchical networks, star topology aggregation can be used effectively. Our algorithm uses a limited number of bypasses to increase the exactness of the star topology aggregation. It adjusts topology parameters whenever it adds a bypass. Consequently, the result is highly accurate and has low computational complexity.

Evaluation of Handover Requirements of Construction Information for Efficient Facility Management (효율적인 자산관리를 위한 건설정보 이양요건 평가)

  • Lee, Ikhaeng;Jung, Youngsoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.4
    • /
    • pp.12-20
    • /
    • 2018
  • As facilities have become larger, more complex, and advanced, the importance of the facility management in the operation phase of the building is increasing. As a result, the scope of the facility management function is expanding, and the requirements of information are ever-increasing. However, inefficient exchange of information occurs due to duplicated tasks and lack of collaboration among the construction life cycle phases, resulting in cost loss. These low interoperability issues can be complemented by construction information management from a life cycle perspective. Efficient construction information management at each life-cycle stage is derived from the owner's will and is materialized through the construction information handover requirements by the owner. The purpose of this study is to develop an evaluation method of construction information handover requirements for facility management. In order to develop the method, facility management types and business functions are also classified and defined in this paper. Using the methodology proposed by this study, a case-study of evaluating the 'takeover items' submitted by contractors was performed for the purpose of research validation. The results of the case-study found that the most effective areas are in the order of 'legal informations', 'drawings', 'guides', etc. This study can be used as a reference data for deriving handover requirements for construction information at the early stage of the project.

A Study on the Prediction Method of Information Exchange Requirement in the Tactical Network (전술네트워크의 정보교환요구량 예측 방법에 관한 연구)

  • Pokki Park;Sangjun Park;Sunghwan Cho;Junseob Kim;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.95-105
    • /
    • 2022
  • The Army, Navy, and Air Force are making various efforts to develop a weapon system that incorporates the 4th industrial revolution technology so that it can be used in multi-domain operations. In order to effectively demonstrate the integrated combat power through the weapon system to which the new technology is applied, it is necessary to establish a network environment in which each weapon system can transmit and receive information smoothly. For this, it is essential to analyze the Information Exchange Requirement(IER) of each weapon system, but many IER analysis studies did not sufficiently reflect the various considerations of the actual tactical network. Therefore, this study closely analyzes the research methods and results of the existing information exchange requirements analysis studies. In IER analysis, the size of the message itself, the size of the network protocol header, the transmission/reception structure of the tactical network, the information distribution process, and the message occurrence frequency. In order to be able to use it for future IER prediction, we present a technique for calculating the information exchange requirement as a probability distribution using the Poisson distribution and the probability generating function. In order to prove the validity of this technique, the results of the probability distribution calculation using the message list and network topology samples are compared with the simulation results using Network Simulator 2.

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

Existing System Improvement and Expected Configuration based on Risk Control Options for Implementation of e-Navigation

  • Yoo, Yun-Ja
    • Journal of Navigation and Port Research
    • /
    • v.42 no.2
    • /
    • pp.79-86
    • /
    • 2018
  • Common Maritime Data Structure (CMDS) is commonly used by shore and ship users in e-Navigation data domain. In the overarching of e-Navigation architecture, IHO uses S-1XX, a digital exchange standard for next-generation marine information, as data exchange standard. The current CMDS has the advantage of intuitively recognizing the overall structure of e-Navigation. However, it has disadvantage in that it does not allow stakeholders to easily understand benefits that e-Navigation can provide when implementing e-Navigation. In this study, the direction of improving existing system for effective e-Navigation implementation was proposed considering RCOs (Risk Control Options) with expected composition of ship/ shore/ communication system by sector.