• Title/Summary/Keyword: Message Communication

Search Result 1,627, Processing Time 0.03 seconds

The Gaurantee of Real-Time Vital Sign Information Service Message of Patient Monitoring System in Distributed Network Systems (분산 네트워크 시스템에서 환자 모니터링 시스템의 실시간 생체정보 서비스 메시지 보장)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.2
    • /
    • pp.162-167
    • /
    • 2009
  • In this paper, we present a patient real-time vital sign information transmission system to effectively support developing real-time communication service by using a real-time object model named TMO (Time-Triggered Message-Triggered Object). Also, we describes the application environment as the PMS(Patient Monitoing System) to guarantee real-time service message with TMO structure in distributed network systems. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of PMS. Vital sign informations of central monitor is composed of the raw data of several bedsite patient monitors. We are willing to maintain vital sign information of real time and continuity that is generated from the bedsite patient monitor. In the real time simulation techniques based on TMO object modeling, we have observed several advantages to the TMO structuring scheme. TMO object modeling has a strong traceability between requirement specification and design.

  • PDF

Energy-Efficient Routing for Data Collection in Sensor Networks (센서 네트워크에서의 데이타 수집을 위한 라우팅 기법)

  • Song, In-Chul;Roh, Yo-Han;Hyun, Dong-Joon;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.2
    • /
    • pp.188-200
    • /
    • 2006
  • Once a continuous query, which is commonly used in sensor networks, is issued, the query is executed many times with a certain interval and the results of those query executions are collected to the base station. Since this comes many communication messages continuously, it is important to reduce communication cost for collecting data to the base station. In sensor networks, in-network processing reduces the number of message transmissions by partially aggregating results of an aggregate query in intermediate nodes, or merging the results in one message, resulting in reduction of communication cost. In this paper, we propose a routing tree for sensor nodes that qualify the given query predicate, called the query specific routing tree(QSRT). The idea of the QSRT is to maximize in-network processing opportunity. A QSRT is created seperately for each query during dissemination of the query. It is constructed in such a way that during the collection of query results partial aggregation and packet merging of intermediate results can be fully utilized. Our experimental results show that our proposed method can reduce message transmissions more than 18% compared to the existing one.

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices (스마트 IoT 디바이스를 위한 경량 암호기반 종단간 메시지 보안 프로토콜)

  • Kim, Hee-jeong;Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1309-1317
    • /
    • 2018
  • Although the IoT market is steadily growing, there is still a lack of consideration for increasing security threats in the IoT environment. In particular, it is difficult to apply existing IP security technology to resource-constrained devices. Therefore, there is a demand for reliable end-to-end communication security measures to cope with security threats such as information tampering and leakage that may occur during communication between heterogeneous networks do. In this paper, we propose an end-to-end message security protocol based on lightweight cipher that increases security and lowers security overhead in resource-constrained IoT device communication. Through simulation of processing time, we verified that the proposed protocol has better performance than the existing AES-based protocol.

A Traffic Hazard Prediction Algorithm for Vehicle Safety Communications on a highway (고속도로에서 차량 안전 통신을 위한 교통사고 위험 예측 알고리즘)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.319-324
    • /
    • 2012
  • Vehicle safety communications is one among the important technologies in order to protect a car accident. For this, many protocols forwarding a safe message have studied to protect a chain-reaction collision when a car accident occurs. most of these protocols assume that the time of generating a safe message is the same as an accident's. If a node predicts some traffic hazard and forwards a safe message, a driver can response some action quickly. So, In this paper, we proposes a traffic hazard prediction algorithm using the communication technique. As a result, we show that the frame reception success rate of using our algorithm to the previous protocol improved about 4~5%.

An Opportunistic Routing Scheme Based on Social Relations in Delay-Tolerant Networks (지연 감내 네트워크에서 사회관계기반 기회적 라우팅 기법)

  • Kim, Chan-Myung;Kang, In-Seok;Oh, Young-Jun;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.15-22
    • /
    • 2014
  • Delay-Tolerant Network employs message forwarding based on a Store, Carry and Forward method to conquer no guarantee of continue connectivity. For this reason, a lot of DTN routing scheme have been proposed recently. message forwarding is an important research issue in delay-tolerant network and In this paper, we propose a efficiency DTN routing scheme using node's social relation and expanded Ego-network betweenness centrality. Our simulation results show that it is more efficient to message delivery cost than Epidemic routing, Friendship routing while it has a little performance degradation of message delivery ratio.

Proposal on an Idle Service for Efficiently Managemental Short Message Service (효율적인 SMS 관리를 위한 대기 화면 서비스 제안)

  • Jeon, Hye-Kyoung;Chung, Soo-Jin;Han, Seung-Jin;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.74-80
    • /
    • 2008
  • Various mobile contents have been developed with the spread of cellular phones. Above all things, nowadays, an idle application services are developed through competition in mobile phone manufacturers and mobile communication companies. In this paper, we propose that the idle application with text message service is easy to receive and edit. It is complement to function of SMS in use and can be effective information managing method, for example, it arrays messages and uses diary feature to set permissions when it send and receive standardized text message. We expect that proposed service will be adopted without additional cost in wireless units.

A Study on the Ordered Multicast Protocols with Flow Control (흐름제어를 이용한 순서화 멀티캐스트 프로토콜에 관한 연구)

  • 박판우;이기현;조국현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.10
    • /
    • pp.1117-1130
    • /
    • 1992
  • In this study, we propose a protocol for the communication between process groups required during message transfers. This is accomplished by an efficient process management of distributed systems connected by computer networks. For a single process group, a multicast protocol was proposed, which can control message flows while maintaining the order of messages sent or delivered. Through use of membership-related services, a member composing a process group may leave and join the current a membership anytime during execution. Moreover, message delivery can be delayed by using a logical vector time stamp. The functionality of the message delivery includes a virtual synchronization in response to a change in membership.

  • PDF

XMPP/SIP Presence Service System using Efficient Message Control Method (효율적 메시지 제어방식을 사용한 XMPP/SIP 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2678-2684
    • /
    • 2014
  • In this paper a new message control method that can reduce server load and network traffic in XMPP/SIP presence service system has been proposed. This presence service system can process both XMPP(Extensible Massaging and Presence Protocol) based presence information and SIP(Session Initiation Protocol) based presence information. A new XMPP stanza architecture with added elements for presence stanza and IQ stanza has been designed, and a new presence information data processing method which can reduce size of SIP notification message and SIP PUBLISH message has been suggested. Furthermore a messages exchanging procedure that can transfer presence information between XMPP domain and SIP domain has been also suggested. The performance of the proposed system has been analysed by simulation.

Personalized Message Syndication As a Smart Media (스마트 미디어로서의 개인화된 메시지 신디케이션)

  • Lee, Seo-Young;Kim, Nam-Yun;Lee, Bong-Gyou
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Since the increasing use of smart devices such as smartphone and tablet PC improves the quality of convergence of broadcasting and telecommunication, many new media have been created. This smart device can provide personal environments based on user's profile (age, gender, and job) and current location. In addition, it can be regarded as a media platform with two-way communication. This paper proposes personalized message syndication, called PMS, based on smart devices and then analyzes its business and technical issues. The PMS service as a smart media provides consumers customized information and can be used for producer's marketing tools which can lead consumers' heart and participation.