• Title/Summary/Keyword: Message Communication

Search Result 1,627, Processing Time 0.028 seconds

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.

A Study of Communication Factor in Lunyu (『논어(論語)』의 커뮤니케이션 속성고(屬性考))

  • Lee, Bum-Soo
    • (The)Study of the Eastern Classic
    • /
    • no.36
    • /
    • pp.85-104
    • /
    • 2009
  • This study examines a study of communication factor in Lunyu, as a communication text, in terms of communicator, audience, message, communication factor, communication text, interdisciplinary research. In many respects, it is generally accepted that Lunyu have been the generic references of the Oriental culture. Lunyu consider ethics, logic, and practicability as the qualifying requirement of communicator, asserting that communicator should speak true language, like a "chuntzu"(君子) does, and should also put their language into practice. The audience's attitude and method as contained in Lunyu are that hearers should have sharp ears for language, hear selectively the right language, and use the language suitable to the situation. It is also emphasized that the Hearer should actively lead in the situation of transactional communications. In Lunyu, one property of message is that language, which determines the rise and fall of a nation and is also the basis of judgement for other people, should comply with ethics and reasons and sould also be put into practice. In other words, credible message, as the practice of language, is the practical requirement of ethics and the qualification of a "chuntzu"(君子, superior man) in ruling the nation or conducting one's life.

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network

  • Hsu, Chien-Lung;Lin, Han-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2928-2940
    • /
    • 2013
  • Key exposure is a major threat to secure cryptosystems. To mitigate the impact caused by key-compromise attacks, a key-insulated cryptographic mechanism is a better alternative. For securing the large message communication in peer-to-peer networks, in this paper, we propose the first novel identity-based key-insulated encryption (IB-KIE) scheme with message linkages. Our scheme has the properties of unbounded time periods and random-access key-updates. In the proposed scheme, each client can periodically update his private key while the corresponding public one remains unchanged. The essential security assumption of our proposed scheme is based on the well-known bilinear Diffie-Hellman problem (BDHP). To ensure the practical feasibility, we also formally prove that the proposed scheme achieves the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) in the random oracle model.

The Effects of Self-Construal and Message Orientation on Value Advocacy Advertising (자기 해석과 메시지 지향성이 가치 주장 광고 효과에 미치는 영향)

  • Lee, Guiohk;Park, Jowon;Choi, Myung-Il
    • Korean Management Science Review
    • /
    • v.31 no.4
    • /
    • pp.15-28
    • /
    • 2014
  • The present study examined the effects of self-construal and message orientation on value advocacy advertising. An experiment of college students was conducted to investigate relationship between the attitude toward advocacy advertisements and the purchase intention. The results showed that people with interdependent self-construal have more positive attitude toward the advocacy advertisements than people with independent self-construal. The interaction effects between self-construal and message orientation on the value advocacy advertisements were not found significant. However, it was found that even people with independent self-construal showed more positive attitude toward the advocacy advertisement with others-orientation messages than the advertisement with self-orientation messages in value advocacy advertising. Based on the findings, theoretical and managerial implications for value advocacy advertising were discussed.

Development of real-time embedded systems for reducing the transmission delay latency in IEC 61850 communication (IEC 61850 통신에서의 전송 지연시간 개선을 위한 실시간 임베디드 시스템 개발)

  • Cho, Chang-Doo;Kang, Seung-Hwa;Kang, Sang-Hee;Nam, Soon-Ryul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.11
    • /
    • pp.1590-1594
    • /
    • 2012
  • Depend on delay latency rule for message transmission defined in IEC 61850 standard, the fastest message has to be transferred within 3us. This paper suggests how to structure the real time message transmit test environment of IEC 61850 and develope how to securing IEC 61850 communication performance based on IEC 61850 by measuring delay latency of message transfer on embeded linux system.

Priority-based Message Scheduling for Multi-agent System in Ubiquitous Environment (유비쿼터스 환경에서 멀티 에이전트 시스템을 위한 우선순위 기반 메시지 스케줄링 기법)

  • Yoon, Yang-Seok;Youn, Hee-Yong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.137-143
    • /
    • 2008
  • In ubiquitous environment the multi-agent system is effective for providing intelligent services. In this paper we introduce a new scheduling service model for improving the communication performance in the multi-agent system. It is achieved by assigning a priority to the message according to the weight of formalized ACL message and the number of messages exchanged between the agents. An experiment reveals that the proposed approach allows smaller processing time per message and turnaround time than the scheduling with the existing JADE platform. Moreover, the proposed scheme allows a scalable messaging system.

  • PDF

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

Analysis of Response Characteristics of CAN-Based Feedback Control System Considering Message lime Delays (메시지 지연시간을 고려한 CAN 기반 피드백 제어시스템의 응답특성 분석)

  • Jeon, Jong-Man;Kim, Dae-Won
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.5
    • /
    • pp.190-196
    • /
    • 2002
  • In this paper, the response characteristics of CAN-based feedback control system are analyzed when message time delays through the network are considered. The message time delays are composed of computation time delay and communication time delay. The application layer of CAN communication is modeled mathematically to analyze two time delays, and the communication time delay is redefined under several assumption conditions. The CAN-based feedback control system is proposed as a target system that is the machining system with the three axes. The response characteristics of time delays in the proposed system are analyzed through computer simulations, and can be improved by the compensation using the PID tuning method to satisfy the design specifications of the system.

Reducing Overhead of Distributed Checkpointing with Group Communication

  • Ahn, Jinho
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.83-90
    • /
    • 2020
  • A protocol HMNR, was proposed to utilize control information of every other process piggybacked on each sent message for minimizing the number of forced checkpoints. Then, an improved protocol, called Lazy-HMNR, was presented to lower the possibility of taking forced checkpoints incurred by the asymmetry between checkpointing frequencies of processes. Despite these two different minimization techniques, if the high message interaction traffic occurs, Lazy-HMNR may considerably lower the probability of knowing whether there occurs no Z-cycle due to its shortcomings. Also, we recognize that no previous work has smart procedures to be able to utilize network infrastructures for highly decreasing the number of forced checkpoints with dependency information carried on every application message. We introduce a novel Lazy-HMNR protocol for group communication-based distributed computing systems to cut back the number of forced checkpoints in a more effective manner. Our simulation outcomes showed that the proposed protocol may highly lessen the frequency of forced checkpoints by comparison to Lazy-HMNR.

A Study on the Comparison of Reliability Between MQTT and CoAP (Confirmative Message) (MQTT와 CoAP(Confirmative message) 신뢰성 비교)

  • Ryu, Kuem-gang;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.485-487
    • /
    • 2017
  • With the growth of the IoT, security is a growing concern. Things the risk of IoT security has been constantly raised, and there have been many cases of hacking. As a result, there is a growing concern and scale about security, but there is a lack of interest and research on the message protocols between Iot devices. With the development of the IoT, the importance of low-power, lightweight and accurate message delivery will become more important and more advanced message protocols will be needed. In this paper, it is aimed to construct the system for communication between client and server of MQTT and CoAP with Confirmative option, which are most used among IoT message protocols and compare the message reliability of each communication protocol to check efficiency.

  • PDF