• Title/Summary/Keyword: Message Communication

Search Result 1,627, Processing Time 0.024 seconds

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF

Communication Effects of Sex-Appeal Fashion POP Advertising -Focused on Nudity Type and Discount Message Use- (섹스어필 패션 POP 광고의 커뮤니케이션 효과 -노출유형과 할인율 메시지 사용을 중심으로-)

  • Park, Hyun-Hee;Jeon, Jung-Ok
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.6
    • /
    • pp.929-937
    • /
    • 2009
  • This study was intended to identify the differences in communication effects according to nudity type and discount message use in the context of sex-appeal fashion POP advertising. For the experiment, 8 stimuli were developed as experimental stimuli for the 4 (nudity type (nude, semi-nude, body-consciousness, non nude)) $\times$ 2 (discount messages (available, not available)) factorial design. A total of 280 questionnaires allocating thirty-five students to each group were distributed. The results were as follows. First, there were significant differences in advertising affect, attitude toward advertising, and brand attitude according to nudity type of sex-appeal fashion POP advertising. Second, there was no significant difference in communication effects by discount message use. Third, there was interaction effect according to nudity type and discount message use on the aspect of advertising cognition.

Design and Implementation of DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP의 설계 및 구현에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.747-754
    • /
    • 2016
  • DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.

a study of expression of non-coded Message in Visual Image and Graphic User Interface (그래픽 유저 인터페이스와 비언어적 메시지 영상 표현의 관계)

  • Seo, Hyun-Seok;Kim, Hyun-Suk
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.281-285
    • /
    • 2008
  • In the digital media era, coded and non-coded communication are used to convey the message. As the computer interface has been adopted human communication methods, non-coded communication has bee used in the computer interface as well. The changes of message structure in the computer interface have an effect on shifting the way of user's message acceptance from passive to active. The recently developed computer user interfaces are for user to experience diverse visual effect The communication conveyed with this visual effects could be vague but user can conceive strong impact. This experience is understood not only through the visual experience from a monitor screen but also with a sense of tactile. The meaning of sensual and spectacle motion image could be ambiguous. However in the experience of using an interface, it plentifully expands the human sense by giving a visual experience on a whim. The sensually extemporaneous and splendid visual effect that has vague meaning has been very common happening in digital media environment.

  • PDF

Design and Implementation of Protocol to Transfer Secure Messages for PDA (PDA에서 운용 가능한 보안 메시지 전송 프로토콜 설계 및 구현)

  • Lee, Ki-Young;Lee, Jeong-Kyoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.181-187
    • /
    • 2005
  • This paper proposes and implements a service model to transfer messages safely for PDA on CDMA wireless network and a secure massage transfer protocol which considers characteristics of PDA. Proposed service uses SMS(Short Message Service) connect to a off-line client device with the wired network for data communication. After receiving SMS message, client device processes the SMS message and creates a data channel through RAS(Remote Access Service), then the data of the server can be pushed to clients. The implemented security protocol can provide safe data transmission on each communication line through two way channels(SMS and data). Also, by using security nonce table, this protocol can reduce a number of transmissions for exchanging a safe session key, so intensity of encryption can be increased.

The Implementation of Vital Sign Information Parsing Module using TMO(Time Triggered and Message Triggered Method) (TMO를 이용한 생체정보 수신모듈 구현)

  • Cho, Eui-Joo;Kim, Chun-Suk;Kim, Gwang-Gun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.247-253
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems.

  • PDF

A Design and Implementation of Message Processing Modules for MiTS Communication (MiTS 통신을 위한 메시지 처리 모듈의 설계 및 구현)

  • Kim, Tae-Jong;Hwang, Hun-Gyu;Seo, Jeong-Min;Yoon, Jin-Sik;Lee, Jang-Se;Jang, Kil-Woong;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.360-368
    • /
    • 2010
  • MiTS communication is a protocol for the exchange of various information among shipboard systems. It also specifies more than 30 specialized message formats for the information exchange. To build MiTS systems, therefore, the messages should be processed consistently. This paper proposes the design and implementation of such message processing modules. It also describes the test results of the implemented modules.

A Techniques for Information Hiding in the Steganography using LSB and Genetic Algorithm (유전적 알고리즘과 LSB를 이용한 스테가노그래피의 정보은닉 기법)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.277-282
    • /
    • 2018
  • The goal of the secret message communication on the internet is to maintain invisibility and confidentiality. Digital steganography is a technique in which a secret message is inserted in a cover medium and transmitted to a destination so that a third party can not perceive the existence of the message itself. Steganography is an efficient method for ensuring confidentiality and integrity together with encryption techniques. In order to insert a secret (Hangul) message, I propose a image steganography method that the secret character is separated and converted into binary code with reference to the encryption table, the cover image is divided into two areas, and the secret message and the right l-LSB information of the second area are encrypted and crossed, concealing the k-LSB of the first region. The experimental results of the proposed method show that the PSNR value is 52.62 and the acceptable image quality level.

Cell Based Emergency Message Broadcast Scheme for Inter-Vehicle Communication (차량간 통신을 위한 셀 기반의 응급 메시지 브로드캐스트 기법)

  • Joo, Heon-Sik;Kim, Jong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.41-47
    • /
    • 2010
  • The emergency between vehicles on the superhighway should be transmitted quickly to the following vehicles for safety of people. The message between them has been transmitted by broadcast method in an wireless environment of 802.11, so far. That causes the broadcast storm and a waste of the bandwidth of Wireless network owing to unnecessary process of sending messages to even vehicles that do not have to receive the information. The message collision is a main cause of the increase of message delay. In order to overcome the existing problem, this paper proposed a message broadcast scheme based on cell (MBC), which is the way to divide cars into different groups by cell unit and transmit messages to the members of the groups through the cell primary (cp) vehicles. This paper shows the proposed broadcast's performance in the same environment is much superior to other conventional broadcast schems for inter-vehicle communication, since the receiving ratio among the following vehicles is improved.

Safety Message Transmission Technology for the Elderly Pedestrians at the Conflict Area: Background and Technology Concept (상충지역에서 고령 보행자를 위한 안전메시지 전송기술 : 배경 및 기술 개념)

  • Cho, Woong;Jang, Jeong-Ah
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.3
    • /
    • pp.413-418
    • /
    • 2015
  • As the elderly are increasing, traffic accidents which are related to the elderly are one of major issues in aged society. In this paper, we analyze traffic accident statistics for the elderly. Based on the analyzed data, safety message transmission system for the elderly pedestrians is introduced. The proposed system is based on the P2V(Pedestrian-to-Vehicle) communication which combines ICT(Information and Communication Technology) with vehicles and pedestrians. We introduce the concept and principle of the proposed system and discuss implementation issues for realizing the proposed system.