• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.023 seconds

Access Method Improve Study for UDDI on Web Service (웹 서비스에서 UDDI 접근 방식의 개선 방안)

  • 최유순;소경영;박종구
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2003
  • Information searched in UDDI transfer web service user. Then web service user require interface to web service publisher. In this paper, we abbreviate procedure it. UDDI require WSDL document to web service publisher. For this reason, UDDI transfer XML form message to publisher. Message include user's location information and UDDI required document transfer from publisher to user. Message using SOAP protocol of XML format.

Spatial Query Processing Based on Minimum Bounding in Wireless Sensor Networks

  • Yang, Sun-Ok;Kim, Sung-Suk
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.229-236
    • /
    • 2009
  • Sensors are deployed to gather physical, environmental data in sensor networks. Depending on scenarios, it is often assumed that it is difficult for batteries to be recharged or exchanged in sensors. Thus, sensors should be able to process users' queries in an energy-efficient manner. This paper proposes a spatial query processing scheme- Minimum Bounding Area Based Scheme. This scheme has a purpose to decrease the number of outgoing messages during query processing. To do that, each sensor has to maintain some partial information locally about the locations of descendent nodes. In the initial setup phase, the routing path is established. Each child node delivers to its parent node the location information including itself and all of its descendent nodes. A parent node has to maintain several minimum bounding boxes per child node. This scheme can reduce unnecessary message propagations for query processing. Finally, the experimental results show the effectiveness of the proposed scheme.

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.4
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.

Reducing Overhead of Distributed Checkpointing with Group Communication

  • Ahn, Jinho
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.83-90
    • /
    • 2020
  • A protocol HMNR, was proposed to utilize control information of every other process piggybacked on each sent message for minimizing the number of forced checkpoints. Then, an improved protocol, called Lazy-HMNR, was presented to lower the possibility of taking forced checkpoints incurred by the asymmetry between checkpointing frequencies of processes. Despite these two different minimization techniques, if the high message interaction traffic occurs, Lazy-HMNR may considerably lower the probability of knowing whether there occurs no Z-cycle due to its shortcomings. Also, we recognize that no previous work has smart procedures to be able to utilize network infrastructures for highly decreasing the number of forced checkpoints with dependency information carried on every application message. We introduce a novel Lazy-HMNR protocol for group communication-based distributed computing systems to cut back the number of forced checkpoints in a more effective manner. Our simulation outcomes showed that the proposed protocol may highly lessen the frequency of forced checkpoints by comparison to Lazy-HMNR.

Design and Implementation of DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP의 설계 및 구현에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.747-754
    • /
    • 2016
  • DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.

Neighbor-Based Probabilistic Rebroadcast Routing Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

  • Harum, Norharyati;Hamid, Erman;Bahaman, Nazrulazhar;Ariff, Nor Azman Mat;Mas'ud, Mohd Zaki
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.1-8
    • /
    • 2021
  • In Mobile Ad-Hoc Network (MANET) Application, routing protocol is essential to ensure successful data transmission to all nodes. Ad-hoc On-demand Distance Vector (AODV) Protocol is a reactive routing protocol that is mostly used in MANET applications. However, the protocol causes Route Request (RREQ) message flooding issue due to the broadcasting method at the route request stage to find a path to a particular destination, where the RREQ will be rebroadcast if no Request Response (RREP) message is received. A scalable neighbor-based routing (SNBR) protocol was then proposed to overcome the issue. In the SNBR protocol, the RREQ message is only rebroadcast if the number of neighbor nodes less than a certain fix number, known as drop factor. However, since a network always have a dynamic characteristic with a dynamic number of neighbor nodes, the fix drop factor in SNBR protocol could not provide an optimal flooding problem solution in a low dense network environment, where the RREQ message is continuously rebroadcast RREQ message until reach the fix drop factor. To overcome this problem, a new broadcasting method as Dynamic SNBR (DSNBR) is proposed, where the drop factor is determined based on current number of neighbor nodes. This method rebroadcast the extra RREQ messages based on the determined dynamic drop factor. The performance of the proposed DSNBR is evaluated using NS2 and compared with the performance of the existing protocol; AODV and SNBR. Simulation results show that the new routing protocol reduces the routing request overhead, energy consumption, MAC Collision and enhances end-to-end delay, network coverage ratio as a result of reducing the extra route request messages.

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

Cryptanalysis of an Identity-Based Message Authentication Scheme in VANETs (신원기반의 차량통신망 메시지 인증 스킴에 대한 안전성 분석)

  • Ryu, Eun-Kyung;Lee, Sung-Woon;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.167-172
    • /
    • 2013
  • In a paper recently published in the International Journal of Parallel, Emergent and Distributed Systems, Biswas et al. proposed a VANET message authentication scheme which uses an identity-based proxy signature mechanism as an underlying primitive. The authors claimed that their scheme supports various security features including the security of proxy-key, the security against message forgery and the security against replay attack, with non-repudiation and resistance to proxy-key compromise. Here, we show how an active attacker, who has no knowledge of an original message sender's private key, can compute the proxy-signature key of the corresponding message sender, meaning that the scheme is completely insecure. We also suggest an enhanced version of the protocol capable of solving such serious security holes.

OSEK OS Based Gateway for Interconnecting WAVE and CAN (WAVE와 CAN 연동을 위한 OSEK OS기반 게이트웨이)

  • Kim, Ju-Young;Seo, Hyun-Soo;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.2
    • /
    • pp.133-141
    • /
    • 2014
  • Recently, various services are provided by using WAVE protocol for communication among neighboring vehicles. And in order to operate stable system, the gateway for interconnecting in and out vehicle networks is required. In this paper, we propose gateway interconnecting WAVE and CAN protocol. The proposed gateway based on OSEK OS consists of a communication layer, a message translator layer and a message management layer. In the communication layer, WAVE communication part and CAN communication part are designed to communicate with WAVE and CAN. And in the message management layer, message management layer functions to store the received messages and check errors with the message. Based on these functions, experiment was conducted to analyze performance of the gateway with two scenarios such as transmitting periodically BSM as a message structure for safety services in vehicle-to-vehicle communications and responding to road side equipments requiring in-vehicle information. As a result of test, we verify our gateway performance by analyzing measured time in test scenarios.