• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.024 seconds

An Efficient Multiparty Consensus Algorithm (효율적인 다중 일치 알고리즘)

  • 김수진;류재철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.71-80
    • /
    • 1992
  • 본 논문에서는 시스템내의 모든 site들에게 분산되어 있는 정보들을 수렴하여 일치를 이루고, 그 결과를 모든 site들이 알도록 하는 다중 일치 알고리즘을 위한 효과적인 통신 방법을 제안하고자 한다. 분산 시스템에 참여하는computer또는 site들의 수를 N이라 할 때, O($N_2$)의 message를 필요로 하면서 한round안에 일치를 이룰 수 있는 알고리즘은 message의 수가 너무 많다는 것이 단점이다. 이에 본 논문에서는 Finite Projective Planes를 이용하여 message의 수를 줄이면서 두 round안에 일치를 이룰 수 있는 통신 방법을 제안한다. 이때, 각round마다 필요한 message의 수는 O(N√N)이다. 또한, 이 통신 방법에서 이용되는 Finite Projective Planes을 구축하는 알고리즘을 제안하고자 한다.

  • PDF

Design and evaluation of an alert message dissemination algorithm using fuzzy logic for VANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.4
    • /
    • pp.783-793
    • /
    • 2010
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybrid algorithm that uses broadcast protocol together with token protocol according to traffic density. The performance of the proposed algorithm is evaluated through simulation and compared with that of other alert message dissemination algorithms.

A Display Method of Image Information and URL Using the Message Structures of Emergency Alert Broadcasts for 5G Cellular Communications (5G 이동통신 용 재난경보 방송의 메시지 구조를 이용한 이미지 정보 및 URL 표출기법)

  • Chang, Sekchin
    • Journal of Broadcast Engineering
    • /
    • v.26 no.5
    • /
    • pp.592-598
    • /
    • 2021
  • Current cellular systems rely on a CBS protocol for emergency alert broadcast services. However, the CBS protocol just specifies the delivery of a limited text message. Therefore, foreigners, who are unfamiliar with local characters, may have some difficulties in understanding the received CBS text message. The CBS protocol also reveals a distinct restriction in delivering abundant information because of a limited number of text characters. In order to overcome the weak points of the current CBS protocol, we propose a display method of image information and URL on the screens of mobile terminals for the received CBS text message in this paper. The presented approach effectively utilizes the message structure of CBS for 5G cellular systems.

A Standardized Design Method of Weapon Information Exchange for Interoperability with Several Kinds of Command and Control System (이기종 지휘통제체계 연동을 위한 무장정보 처리 표준화 설계 방안)

  • Shin, JinBeom;Bae, JungIl;Lee, DongGowan;Koh, Hye-Seung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.771-778
    • /
    • 2015
  • In this paper, we have proposed a design method for standardization of weapon information exchange between a weapon control computer of guided missile system and a high echelon command and control system. Because the weapon control computer based on diverse combat platforms is operated with several kinds of a high echelon system, it is necessary to provide a standardized design method for weapon information exchange between mutual system. In fact, it is possible to standardize a interface design specification of weapon information message because weapon information message is closely related to standard tactical data link message. It is essential that the interface design specification of weapon information is submitted to that of tactical data link information. It seems that this interface design specification is very useful in development process of the future weapon system.

A Study on the Performance Improvement of Message Transmission over MVB(Multifunction Vehicle Bus)

  • Choi, Myung-Ho;Park, Jae-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2198-2202
    • /
    • 2003
  • The data transmission of MVB(Multifunction Vehicle Bus) of TCN(Train Network Communication) is divided into the periodic transmission phase and the sporadic transmission phase. TCN standard defines the event-polling method for the message transfer in the sporadic phase. However, since the event-polling method does not use pre-scheduling to the priority of the messages to be transmitted, it is inefficient for the real-time systems. To schedule message transmission, a master node should know the priority of message to be transmitted by a slave node prior to the scheduling the sporadic phase, but the existing TCN standard does not support any protocol for this. This paper proposes the slave frame bit-stuffing algorithm, with which a master node gets the necessary information for transmission scheduling and includes the simulation results of the event-polling method and the proposed algorithm.

  • PDF

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.

A Delivery Scheme for Hybrid Ferry-Mobile Node Messages in DTNs (DTN에서 페리와 이동노드 기반 계층적 메시지 전달 기법)

  • Kim, Byung-Soon;Lee, Bong-Kyu
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.137-142
    • /
    • 2009
  • In traditional message ferrying schemes, only ferries carry messages between partitioned networks. In this paper, we propose a new approach to make both ferries and mobile nodes carry messages so that we reduce message delivery delay in disruption tolerant networks. We evaluate our scheme against conventional message ferrying in terms of message delivery delay, throughput, ferry buffer usage and mobile nodes buffer usage.

CMS: Application Layer Cooperative Congestion Control for Safety Messages in Vehicular Networks

  • Lee, Kyu-haeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1152-1167
    • /
    • 2018
  • In this paper, I propose an application layer cooperative congestion control scheme for safety message broadcast in vehicular networks, called CMS, that adaptively controls a vehicle's safety message rate and transmit timing based on the channel congestion state. Motivated by the fact that all vehicles should transmit and receive an application layer safety message in a periodic manner, I directly exploit the message itself as a means of estimating the channel congestion state. In particular, vehicles can determine wider network conditions by appending their local channel estimation result onto safety message transmissions and sharing them with each other. In result CMS realizes cooperative congestion control without any modification of the existing MAC protocol. I present extensive NS-3 simulation results which show that CMS outperforms conventional congestion control schemes in terms of the packet collision rate and throughput, especially in a high-density traffic environment.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.