• 제목/요약/키워드: International protocol

검색결과 639건 처리시간 0.023초

원격검침용 전자석 전력량계 통신 프로토콜 개발에 관한 연구 (A Study on the Development of Communication Protocol of Electric Power Meter for Remote Reading)

  • 장문종;유인협;현덕화;이재희
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 춘계학술대회 논문집 전기기기 및 에너지변환시스템부문
    • /
    • pp.69-71
    • /
    • 2001
  • In this paper, we propose a new communication protocol for remote metering in electric power meters, also define necessary functions for it. The new protocol is based on the international metering protocol. IEC 1107, 62056, DNP 3.0. This protocol has 4-layered architecture, which has physical. data link, lower application, and upper application layers. For each layer, definitions and detailed functions are introduced. The protocol will be used for communication between the meters and the metering computer(or AMR system). KEPCO (Korea Electric Power Corporation) plans to adopt this protocol as a part of a new metering standard for electric power meters.

  • PDF

A Secure On-line Lottery Using Bank as a Notary

  • Wooseok Ham;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.121-124
    • /
    • 2002
  • In this paper, we present a secure on-line lottery protocol which consists of three entities: the players, the lottery provider and the bank. We utilize blind signature and hash chain technique as basic building blocks. Our protocol faithfully satisfies the general security requirements to deal with electronic transactions in safe. The proposed protocol reduces the number of communications and all transactions are executed through the Internet(On-line). By using bank as a notary and bulletin board managed by the lottery provider, we can easily settle down potential disputes which frequently occur during commercial transactions.

  • PDF

A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network

  • Alattas, Khalid A
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.207-213
    • /
    • 2021
  • Networks in Mobile ad hoc contain distribution and do not have a predefined structure which practically means that network modes can play the role of being clients or servers. The routing protocols used in mobile Ad-hoc networks (MANETs) are characterized by limited bandwidth, mobility, limited power supply, and routing protocols. Hybrid routing protocols solve the delay problem of reactive routing protocols and the routing overhead of proactive routing protocols. The Ant Colony Optimization (ACO) algorithm is used to solve other real-life problems such as the travelling salesman problem, capacity planning, and the vehicle routing challenge. Bio-inspired methods have probed lethal in helping to solve the problem domains in these networks. Hybrid routing protocols combine the distance vector routing protocol (DVRP) and the link-state routing protocol (LSRP) to solve the routing problem.

Fuzzy Based Multi-Hop Broadcasting in High-Mobility VANETs

  • Basha, S. Karimulla;Shankar, T.N.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.165-171
    • /
    • 2021
  • Vehicular Ad hoc Network (VANET) is an extension paradigm of moving vehicles to communicate with wireless transmission devices within a certain geographical limit without any fixed infrastructure. The vehicles have most important participation in this model is usually positioned quite dimly within the certain radio range. Fuzzy based multi-hop broadcast protocol is better than conventional message dissemination techniques in high-mobility VANETs, is proposed in this research work. Generally, in a transmission range the existing number of nodes is obstacle for rebroadcasting that can be improved by reducing number of intermediate forwarding points. The proposed protocol stresses on transmission of emergency message projection by utilization subset of surrounding nodes with consideration of three metrics: inter-vehicle distance, node density and signal strength. The proposed protocol is fuzzy MHB. The method assessment is accomplished in OMNeT++, SUMO and MATLAB environment to prove the efficiency of it.

DDoS attacks prevention in cloud computing through Transport Control protocol TCP using Round-Trip-Time RTT

  • Alibrahim, Thikra S;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.276-282
    • /
    • 2022
  • One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).

A systemic review of literature in clinical practice research for nursing students

  • Kim, Jungae
    • International Journal of Advanced Culture Technology
    • /
    • 제10권3호
    • /
    • pp.39-46
    • /
    • 2022
  • This study is an attempted content analysis study to analyze recent studies on clinical practice of nursing college students to identify problems with clinical practice and provide evidence for desirable clinical practice. For data collection, a total of 14 papers published in academic journals between 2017 and 2021 were selected. The analysis method was performed according to the systematic review reporting guidelines presented by Cochrane Collaboration and the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) group. As a result of the analysis, two themes, Four sub-themes, and seventeen concepts were derived, and the clinical practice study of nursing college students showed the necessity of standardized clinical practice protocol regulations for nursing college students and respect for patient human rights. Based on the above research results, it is proposed to prepare a nursing and clinical practice protocol that can clearly present the role of nursing college students during clinical practice.

A Beeline Routing Protocol for Heterogeneous WSN for IoT-Based Environmental Monitoring

  • Sahitya, G.;Balaji, N.;Naidu, C.D.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.67-72
    • /
    • 2022
  • A wireless sensor network (WSN), with its constrained sensor node energy supply, needs an energy-efficient routing technique that maximises overall system performance. When rumours are routed using a random-walk routing algorithm, which is not highly scalable, spiral pathways may appear. Because humans think a straight line is the quickest route between two sites and two straight lines in a plane are likely to intersect, straight-line routing (SLR) constructs a straight path without the aid of geographic information. This protocol was developed for WSNs. As a result, sensor nodes in WSNs use less energy when using SLR. Using comprehensive simulation data, we show that our upgraded SLR systems outperform rumour routing in terms of performance and energy conservation.

A New Route Optimization Scheme for Network Mobility: Combining ORC Protocol with RRH and Using Quota Mechanism

  • Kong, Ruoshan;Feng, Jing;Gao, Ren;Zhou, Huaibei
    • Journal of Communications and Networks
    • /
    • 제14권1호
    • /
    • pp.91-103
    • /
    • 2012
  • Network mobility (NEMO) based on mobile IP version 6 has been proposed for networks that move as a whole. Route optimization is one of the most important topics in the field of NEMO. The current NEMO basic support protocol defines only the basic working mode for NEMO, and the route optimization problem is not mentioned. Some optimization schemes have been proposed in recent years, but they have limitations. A new NEMO route optimization scheme-involving a combination of the optimized route cache protocol (ORC) and reverse routing header (RRH) and the use of a quota mechanism for optimized sessions (OwR)-is proposed. This scheme focuses on balanced performance in different aspects. It combines the ORC and RRH schemes, and some improvements are made in the session selection mechanism to avoid blindness during route optimization. Simulation results for OwR show great similarity with those for ORC and RRH. Generally speaking, the OwR's performance is at least as good as that of the RRH, and besides, the OwR scheme is capable of setting up optimal routing for a certain number of sessions, so the performance can be improved and the cost of optimal routing in nested NEMO can be decreased.

Improved Ad Hoc On-demand Distance Vector Routing(AODV) Protocol Based on Blockchain Node Detection in Ad Hoc Networks

  • Yan, Shuailing;Chung, Yeongjee
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권3호
    • /
    • pp.46-55
    • /
    • 2020
  • Ad Hoc network is a special wireless network, mainly because the nodes are no control center, the topology is flexible, and the networking could be established quickly, which results the transmission stability is lower than other types of networks. In order to guarantee the transmission of data packets in the network effectively, an improved Queue Ad Hoc On-demand Distance Vector Routing protocol (Q-AODV) for node detection by using blockchain technology is proposed. In the route search process. Firstly, according to the node's daily communication record the cluster is formed by the source node using the smart contract and gradually extends to the path detection. Then the best optional path nodes are chained in the form of Merkle tree. Finally, the best path is chosen on the blockchain. Simulation experiments show that the stability of Q-AODV protocol is higher than the AODV protocol or the Dynamic Source Routing (DSR) protocol.

LEACH Protocol based WSN Protocol using Fuzzy

  • Kwon, Oh Seok;Jung, Kye-Dong;Lee, Jong-Yong
    • International journal of advanced smart convergence
    • /
    • 제6권3호
    • /
    • pp.59-64
    • /
    • 2017
  • A wireless sensor network is a network in which nodes equipped with sensors capable of collecting data from the real world are configured wirelessly. Because the sensor nodes are configured wirelessly, they have limited power such as batteries. If the battery of the sensor node is exhausted, the node is no longer usable. If more than a certain number of nodes die, the network will not function. There are many wireless sensor network protocols to improve energy efficiency, among which LEACH Protocol is a typical example. The LEACH protocol is a cluster-based protocol that divides sensor space into clusters and transmits and receives data between nodes. Therefore, depending on how the cluster is structured, the shape of the energy cow may decrease or increase. We compare the network lifetimes of the existing LEACH protocols and the three types of protocols that have been improved using fuzzy methods for cluster selection.