• Title/Summary/Keyword: MAP protocol

Search Result 147, Processing Time 0.029 seconds

Certificateless Non-Interactive Key Exchange Protocol with Forward Secrecy (전방향 안전성을 만족하며 인증서 기반이 아닌 비대화형 키 교환 프로토콜)

  • Lee, Young Kyung;Eom, Ji Eun;Seo, Seung-Hyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.531-546
    • /
    • 2015
  • A non-interactive key exchange protocol provides an efficiency of overall system by eliminating additional communication. However, traditional non-interactive key exchange protocols without updating a private key fail to provide forward secrecy, since there is no usage of ephemeral key for randomness of session key. In 2012, Sang et al. proposed a certificateless non-interactive key exchange(CL-NIKE) protocol, but they do not prove the security of the protocol and it does not provide forward secrecy. In this paper, we propose a new CL-NIKE protocol and it's security model. Then we prove the proposed protocol is secure under the security model based on DBDH(Decision Bilinear Diffie-Hellman) assumption. Moreover, we propose a CL-NIKE protocol with forward secrecy which updates user's private key by using multilinear map and prove it's security.

FDDI Throughput and Application Analysis of MAP Network Construction in Manufactruing Environment (제조 환경에서 MAP 네트워크 체제의 FDDI 효율과 적용 해석)

  • Kim, Jeong-Ho;Lee, Min-Nam;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.1
    • /
    • pp.95-105
    • /
    • 1995
  • An appendix to the MAP 3.0 specification notes that there are primary advantages to use of fiber optics : noise immunity, ability to run in difficult electrical environments, safety and high data rates. All of these may be quite useful in various manufacturing environments. In this paper, we study on construction schmes for a fiber-based 802.4 MAP system including the use of both bus and star topologies. We suggest passive star network and FDDI network for manufacturing environment. And then, we propose the FDDI protocol including the use a dual ring topology running at 100 Mbps to physical and datalink layer of MAT specification and analysis it's protocol and topology for abilities in manufacturing environments, We evaluate about applications service, time-critical processing and topology of two models in manufacturing environment.

  • PDF

A study on the implementation and applications of Mini-MAP network (Mini-MAP 네트워크의 구현 및 응용에 관한 연구)

  • 권욱현;김덕우;정범진;안상철;박정우;김면집;김용호;박홍성;박승출
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.755-760
    • /
    • 1990
  • In this paper, the Mini-MAP network interface units are implemented for the IBM PC, general purpose, PLC, and robot respectively. The token bus controller, MC68824 is used to realize the IEEE 802.4. A protocol for the message exchanges between some automated devices called MMS is implemented where 76 services of total 86 MMS services are included.

  • PDF

Development of Standards Knowledge Management System (정보통신 표준화 지식관리 시스템(SKMS)의 구현)

  • Lee, Jun-Seob;Song, Gi-Pyeung;Koo, Kyung-Cheol;Sohn, Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.528-531
    • /
    • 2001
  • We live in the inundation of information. Information of telecommunication standardization is also overflowing. Accordingly it is not easy to search information front web sites scattered all over the world and to find information which we want to use from the result of searching. For instance, none the less most of standardization organization provides their own search facilities on specification, it is difficult to find specification without information about the specification such as number or title of that specification. In this paper, we introduce Standards Knowledge Management System(SKMS) which provide the easy way of finding information using knowledge map. The SKMS collects information from the standardization-related web sites and categorizes information according to keyword. And users can easily find information with the pre-defined knowledge map.

  • PDF

Design of an RFID Authentication Protocol Using Nonlinear Tent-Map (비선형 Tent-Map을 이용한 RFID 인증 프로토콜 설계)

  • Han, Kyu-Kwang;Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.10
    • /
    • pp.1145-1152
    • /
    • 2014
  • The RFID (Radio-Frequency Identification) system is a technology to discern things by radio and an epoch-making new method to improve product management such as distribution, transport, mobilization, inventory control. However, RFID, which uses radio, is at risk for information leakage and falsification due to the vulnerability of security of the communication section. We designed the new authentication protocol by applying the tent map, which is the representative complex systems, to the RFID communication system. A more solid and simple authentication system was designed by applying the initial value sensitivity and irregularity, which are the representative characteristics of the complex system, to the reader and tag of RFID. The purpose of this paper is to verify the usability of the RFID authentication protocol design that uses the nonlinear system shown in this thesis by the new system differentiated from the authentication system that depends on the existing hash function or random numbers.

Distributed MIMO Systems Based on Quantize-Map-and-Forward (QMF) Relaying (양자화 전송 중계 기반 분산 다중 안테나 통신 시스템)

  • Hong, Bi;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.404-412
    • /
    • 2014
  • Exploiting multiple antennas at mobile devices is difficult due to limited size and power. In this paper, a distributed MIMO protocol achieving the capacity of conventinal MIMO systems is proposed and analyzed. For exploiting distributed MIMO features, Quantize-Map-and-Forward (QMF) scheme shows improved performance than Amplify-and-Forward (AF) scheme. Also, the protocol based on multiple access channel (MAC) is proposed to improve the multiplexing gain. We showed that sufficient condition of the number of slave nodes to achieve the gain of a MAC based protocol. Because the base station can support multiple clusters operating in distributed MIMO, the total cellular capacity can be extremely enhanced in proportional to the number of clusters.

MAP : A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks

  • Azim, Mohamed Mostafa A.
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.295-306
    • /
    • 2010
  • Network lifetime is a critical issue in Wireless Sensor Networks (WSNs). In which, a large number of sensor nodes communicate together to perform a predetermined sensing task. In such networks, the network life time depends mainly on the lifetime of the sensor nodes constituting the network. Therefore, it is essential to balance the energy consumption among all sensor nodes to ensure the network connectivity. In this paper, we propose an energy-efficient data routing protocol for wireless sensor networks. Contrary to the protocol proposed in [6], that always selects the path with minimum hop count to the base station, our proposed routing protocol may choose a longer path that will provide better distribution of the energy consumption among the sensor nodes. Simulation results indicate clearly that compared to the routing protocol proposed in [6], our proposed protocol evenly distributes the energy consumption among the network nodes thus maximizing the network life time.

A Performance Enhancement Scheme of Hierarchical Mobility Management in IPv6 Networks (IPv6 네트워크에서 계층적 이동성 관리의 성능향상 방안)

  • Seo, Jae-Kwon;Lee, Kyug-Geun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.119-126
    • /
    • 2007
  • Recently, the mobility of users and mobile communication technologies have developed rapidly. The users in this state also want to connect their devices and to receive services anywhere, anytime. Hierarchical Mobile IPv6 (HMIPv6) has been proposed by the Internet Engineering Task Force (IETF) to compensate for such problems as handover latency and signaling overhead when employing Mobile IPv6 (MIPv6). HMIPv6 supports micro-mobility within a domain and introduces a new entity, namely Mobility Anchor Point (MAP) as a local home agent. However, HMIPv6 has been found to cause longer handover latency when the inter-domain handover occurs. This is because a Mobile Node (MN) has to generate two addresses and register them to Home Agent (HA) a MAP, respectively. In order to solve such problems, we propose a scheme that an MN generates one address and registers it to HA for supporting fast handover during the inter-domain handover process. In the proposed scheme, the load of MAP and MAP domain is reduced because the number of MNs which are managed by MAP is decreased and the MAP does not perform proxy Neighbor Discovery Protocol (NDP) to intercept packets destined to MNs. We evaluate the performance of proposed scheme in comparison to HMIPv6 through the simulation and numerical analysis.

Identity-Based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design

  • Shen, Jian;Moh, Sangman;Chung, Ilyong
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.682-691
    • /
    • 2012
  • Key agreement protocol is a fundamental protocol in cryptography whereby two or more participants can agree on a common conference key in order to communicate securely among themselves. In this situation, the participants can securely send and receive messages with each other. An adversary not having access to the conference key will not be able to decrypt the messages. In this paper, we propose a novel identity-based authenticated multi user key agreement protocol employing a symmetric balanced incomplete block design. Our protocol is built on elliptic curve cryptography and takes advantage of a kind of bilinear map called Weil pairing. The protocol presented can provide an identification (ID)-based authentication service and resist different key attacks. Furthermore, our protocol is efficient and needs only two rounds for generating a common conference key. It is worth noting that the communication cost for generating a conference key in our protocol is only O($\sqrt{n}$) and the computation cost is only O($nm^2$), where $n$ implies the number of participants and m denotes the extension degree of the finite field $F_{p^m}$. In addition, in order to resist the different key attack from malicious participants, our protocol can be further extended to provide the fault tolerant property.

A Study on the MMS Protocol for Factory Automation Network (생산자동화 네트워크를 위한 MMS 프로토콜에 관한 연구)

  • 강문식;고우곤;박민용;이상배
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.28A no.10
    • /
    • pp.774-781
    • /
    • 1991
  • A communication network protocol among programable devices built-i manufacturing field, MAP (Manufacturing Automation Protocol), has to provide the job transfer service carrying out a lot of jobs distributively, and the MMS( manufacturing message specification) defines the above application layer protocol. In this paper user software required in job transfer was implemented. So as to provide each service with compatibility and extension, each module was designed according to the functions. A method is selected in double-assigning their domain and program applicable even in complex process, which loads and proceeds several programs sequentially. In order to confirm the logical validity of the designed protocol, local applying test is accomplished for the application layer of response station. Modelling the job flow process, each serice module is verified with the I/O primitives.

  • PDF