• Title/Summary/Keyword: Internet Protocol

Search Result 2,426, Processing Time 0.037 seconds

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

Internet-based Distributed Control Networks. (인터넷을 이용한 분산제어 구현을 위한 네트워킹)

  • 송기원;최기상;최기흥
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.582-585
    • /
    • 2001
  • Requirements for device networks differ greatly from those of data(business) networks. Consequently, any control network technology which uses a fieldbus protocol is, in general, different from IP network protocol TCP/IP. One needs to integrate fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. This paper suggests a basic concept that can be applied to distributed control over IP network or internet. Specifically, LonWorks technology that uses LonTalk protocol is reviewed as device network. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. It is also addressed that many hardwired PLCs can be replaced by LonWorks devices. Connecting these remote LonWorks networks to the Internet can provide a powerful, integrated, distributed control system.

  • PDF

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

A Credit Card based Payment Protocol Assuring End-to-End Security in Wireless Internet (무선인터넷에서의 종단간 보안을 제공하는 신용카드 기반의 지불 프로토콜)

  • 임수철;강상승;이병래;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.645-653
    • /
    • 2002
  • The WPP payment protocol uses the WAP protocol to enable credit card payment on the wireless internet. Since the security of the WAP protocol is based on the WTLS security protocol, there exists an end-to-end security weakness for the WPP payment protocol. This paper is suggesting a payment protocol, which is making use of the Public-Key Cryptosystem and the Mobile Gateway, so assuring end-to-end security independently of specific protocols. As the on-line certification authority is participating on the authentication process of the payment protocol, the suggested payment protocol enables wireless devices to get services from service providers on other domains.

The Study on Internet Voice Conference using MGCP and IP-Multicast (MGCP와 IP-Multicast를 이용한 Internet Voice Conference에 관한 연구)

  • Lee, Song-Ho;Choe, Gyeong-Sam;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.130-133
    • /
    • 2001
  • VoIP(voice over internet protocol) technology is based on IP protocol. The IP protocol can be involved in two types of communication: unicasting and multicasting. Unicasting is the communication between one sender and one receiver. It is one-to-one communication. Multicasting is one-to-many communication. So that, many receivers can get same data from one sender simultaneously. and, the different protocol are proposed for VoIP; H.323, SIP and MGCP. MGCP is perfect server-client protocol, so MGCP is very attractive VoIP protocol to ISP. This paper uses MGCP and offers modified MGCP for conference call. So that, Modified MGCP is compatible to MGCP, and supports conference call using IP-multicast.

  • PDF

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

A Design of Multi-hop Network Protocol based on LoRaWAN Gateway

  • Kim, Minyoung;Jang, Jongwook
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.109-115
    • /
    • 2019
  • Currently, LPWA(Low Power Wide Area) communication technology is widely used due to the development of IoT(Internet of Things) technology. Among the LPWA technologies, LoRaWAN(Long Range Wide Area Network) is widely used in many fields due to its wide coverage, stable communication speed, and low-cost modem module prices. In particular, LoRa(Long Range) can easily construct LoRaWAN with a dedicated gateway. So many organizations are building their own LoRaWAN-based networks. The LoRaWAN Gateway receives the LoRa packet transmitted from an End-device installed in the adjacent location, converts it into the Internet protocol, and sends the packet to the final destination server. Current LoRa Gateway uses a single-hop method, and each gateway must include a communication network capable of the Internet. If it is the mobile communication(i.e., WCDMA, LTE, etc.) network, it is required to pay the internet usage fee which is installed in each gateway. If the LoRa communication is frequent, the user has to spend a lot of money. We propose an idea on how to design a multi-hop protocol which enables packet routing between gateways by analyzing the LoRaWAN communication method implemented in its existing single-hop way in this paper. For this purpose, this paper provides an analysis of the standard specification of LoRaWAN and explains what was considered when such protocol was designed. In this paper, two gateways have been placed based on the functional role so as to make the multi-hop protocol realized: (i) hopping gateway which receives packets from the end-device and forwards them to another gateway; and (ii) main gateway which finally transmits packets forwarded from the hopping gateway to the server via internet. Moreover, taking into account that LoRaWAN is wireless mobile communication, a level-based routing method is also included. If the protocol proposed by this paper is applied to the LoRaWAN network, the monthly internet fee incurred for the gateway will be reduced and the reliability of data transmission will be increased.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Performance Evaluation of the Internet Phone based on Resource Reservation Protocol (자원 예약 프로토콜에 기반한 인터넷 폰의 성능분석)

  • 조재만
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1998.03a
    • /
    • pp.27-31
    • /
    • 1998
  • The growing usage of multimedia communication applications with specific bandwidth and real-time delivery requirements has created the needs for quality of service(QoS). In response to the growing demand for an integrated services, the Reservation Protocol(RSVP) has been designed to exchange resource reservation among routers in the internet. RSVP protocol provides the quality of service for real-time applications but the network efficiency is reduced because of the limited bandwidth. In order to use network resources efficiently. We compare the resource efficiency of traditional reservation methods with that of the proposed method and evaluate the performance of the internet phone.

  • PDF

A Study of the Interworking Method between H.323 and SIP (H.323과 SIP간의 상호 연동 방법 관한 연구)

  • 김정석;김철규;김정호
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.342-347
    • /
    • 2004
  • The VoIP(Voice over Internet Protocol) technology which is able to use a voice service through internet is more cheaper then existing telephone charges, and is easily accept the various of multimedia services from internet. Previous connection method of VoIP used H.323 protocol, but it is very complex to connection establishment. so, the SIP(Session Initiation Protocol) protocol that propose in SIP-Working Group Is in use recently. Therefore, we need new interworking methodology between H.323 and SW products. In this thesis, the progress interworking method between H.323 and SIP are propose, then interpret unnecessary packet delay for call setup and improved feature of message exchange.

  • PDF