• Title/Summary/Keyword: Message transmission

Search Result 615, Processing Time 0.029 seconds

Study of Implementation as Digital Twin Framework for Vertical Smart Farm (식물공장 적용 디지털 트윈 프레임워크 설계 연구)

  • Ko, Tae Hwan;Noe, Seok Bong;Noh, Dong Hee;Choi, Ju Hwan;Lim, Tae Beom
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.377-389
    • /
    • 2021
  • This paper presents a framework design of a digital twin system for a vertical smart farm. In this paper, a framework of digital twin systems establishes three factors: 1) Client 2) IoT gateway, and 3) Server. Especially, IoT gateway was developed using the Eclipse Ditto, which has been commonly used as the standard open hardware platform for digital twin. In particular, each factor is communicating with the client, IoT gateway, and server by defining the message sequence such as initialization and data transmission. In this paper, we describe the digital twin technology trend and major platform. The proposed design has been tested in a testbed of the lab-scale vertical smart-farm. The sensor data is received from 1 Jan to 31 Dec 2020. In this paper, a prototype digital twin system that collects environment and control data through a raspberry pi in a plant factory and visualizes it in a virtual environment was developed.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

A Robust Energy Saving Data Dissemination Protocol for IoT-WSNs

  • Kim, Moonseong;Park, Sooyeon;Lee, Woochan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5744-5764
    • /
    • 2018
  • In Wireless Sensor Networks (WSNs) for Internet of Things (IoT) environment, fault tolerance is a most fundamental issue due to strict energy constraint of sensor node. In this paper, a robust energy saving data dissemination protocol for IoT-WSNs is proposed. Minimized energy consumption and dissemination delay time based on signal strength play an important role in our scheme. The representative dissemination protocol SPIN (Sensor Protocols for Information via Negotiation) overcomes overlapped data problem of the classical Flooding scheme. However, SPIN never considers distance between nodes, thus the issue of dissemination energy consumption is becoming more important problem. In order to minimize the energy consumption, the shortest path between sensors should be considered to disseminate the data through the entire IoT-WSNs. SPMS (Shortest Path Mined SPIN) scheme creates routing tables using Bellman Ford method and forwards data through a multi-hop manner to optimize power consumption and delay time. Due to these properties, it is very hard to avoid heavy traffic when routing information is updated. Additionally, a node failure of SPMS would be caused by frequently using some sensors on the shortest path, thus network lifetime might be shortened quickly. In contrast, our scheme is resilient to these failures because it employs energy aware concept. The dissemination delay time of the proposed protocol without a routing table is similar to that of shortest path-based SPMS. In addition, our protocol does not require routing table, which needs a lot of control packets, thus it prevents excessive control message generation. Finally, the proposed scheme outperforms previous schemes in terms of data transmission success ratio, therefore our protocol could be appropriate for IoT-WSNs environment.

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

A Study on Analyzing the Impact Factors of Cell Broadcast Service Considering Socially Vulnerable Groups - Focus on Comparative Analysis between the Elderly and the General Population (사회적 취약계층을 고려한 재난방송문자 서비스 영향 요인 분석 - 고령자와 일반인 그룹의 비교분석을 중심으로)

  • Keunoh Park
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.383-394
    • /
    • 2023
  • Purpose : This study focuses on improvements in cell broadcast service(CBS) with consideration of socially vulnerable groups, and identifies service factors necessary for elderly people in particular. Method : Multiple regression analysis was applied to test overall satisfaction with cell broadcast service as the dependent variable and each of the service factors as the independent variable. Result : The results showed that fast delivery had the greatest effect on overall satisfaction with cell broadcast service in both groups, followed by the delivery of sufficient content for the elderly group and system quality for the non-elderly group. The results demonstrated that the elderly group cared more about information content, while the non-elderly group considered functions such as system quality and text message transmission criteria more important. Conclusion : Elderly people consider the delivery of sufficient information important as well as fast delivery, which suggests that it is necessary when sending cell broadcast service to give consideration to the characteristics of elderly people, as they tend to have weaker understanding and thinking abilities than the non-elderly.

Ashbery's Aesthetics of Difficulty: Information Theory and Hypertext

  • Ryoo, Gi Taek
    • Journal of English Language & Literature
    • /
    • v.58 no.6
    • /
    • pp.1001-1021
    • /
    • 2012
  • This paper is concerned with John Ashbery's poetics of difficulty, questioning in particular the nature of communication in his difficult poems. Ashbery has an idea of poetry as 'information' to be transmitted to the reader. Meaning, however, is to be created by a series of selections among equally probable choices. Ashbery's poetry has been characterized by resistance to the interpretive system of meaning. But the resistance itself, as I will argue, can be an effective medium of communication as the communicated message is not simply transmitted but 'selected' and thus created by the reader. In Ashbery's poetry, disruptive 'noise' elements can be processed as constructive information. What is normally considered a hindrance or noise can be reversed and added to the information. In Ashbery's poems, random ambiguities or noises can be effectively integrated into the final structure of meaning. Such a stochastic sense of information transfer has been embodied in Ashbery's idea of creating a network of verbal elements in his poetry, analogous to the interconnecting web of hypertext, the most dynamic medium 'information technology' has brought to us. John Ashbery, whose poems are simultaneously incomprehensible and intelligent, employs ambiguities or noise in his poetry, with an attempt to reach through linear language to express nonlinear realities. It is therefore my intention to examine Ashbery's poetics of difficulty, from a perspective of communication transmission, using the theories of information technology and the principles of hypertext theory. Ashbery's poetry raises precisely the problem confronted in the era of communication and information technology. The paper will also show how his aesthetics of difficulty reflects the culture of our uncertain times with overflowing information. With his difficult enigmatic poems, Ashbery was able to move ahead of the technological advances of his time to propose a new way of perceiving the world and life.

A Probability Model based on Counting Method to Improve Broadcast Reliability over VANET (차량이동통신용 브로드캐스트의 신뢰성 향상을 위한 확률 모델)

  • Virdaus, Irvanda Kurniadi;Kang, Moonsoo;Shin, Seokjoo;Lee, Chung Ghiu;Choi, Yonghoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.51-70
    • /
    • 2017
  • The reliability of broadcasting over vehicular ad hoc networks (VANETs) is one of the most critical factors for driving safety applications. There exists limitations to improve the reliability of broadcast transmissions in saturated VANETs where previous proposals in literature tackle the problem by heuristically adapting the size of the contention window (CW). This paper considers improving the reliability by proposing a new probability model based on the counting methods of permutations and combinations, which counts all the possible cases of broadcast failures in a single-hop broadcast transmission for a given CW. From the model, we calculate the best CW size given the number of contention nodes, which significantly improves the reliability and satisfying the timely dissemination of emergency broadcasting messages. Through extensive VANET simulations with varying densities, we show that our model maintains near 100 percent success rate for single-hop broadcast as well as multi-hop broadcast (e.g. 40 hops) and achieves minimal broadcast delay.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Interference-aware Resource Allocation Scheme for VHF Data Exchange-terrestrial in Maritime Communication (해상 통신에서 지상파 VHF 데이터 교환을 위한 간섭 인지 기반 자원 할당 기법)

  • Sol-Bee Lee;Jung-Hyok Kwon;Hwa-Jin Na;Kyung-Tae Kim;Hyung-Jin Moon;Bu-Young Kim;Woo-Seong Shim;Dongwan Kim;Eui-Jik Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.4
    • /
    • pp.109-115
    • /
    • 2024
  • This paper proposes an interference recognition-based resource allocation (IaRA) scheme for very high frequency (VHF) data exchange-terrestrial (VDE-TER) to ensure the reliability of automatic identification system (AIS) message transmission in a coastal environment with dense vessels. To this end, IaRA conducts channel selection and slot allocation based on scheduling information obtained through monitoring VHF data exchange system (VDES) channels. The simulation results show that IaRA achieved an 8.79% higher packet delivery ratio (PDR) and a 9.69% lower channel interference ratio (CIR) compared to the VDE-TER resource allocation scheme of the existing VDES standard.

Random access method for radio interface specification of IMT-2000 satellite component (IMT-2000 위성부문 무선인터페이스 표준을 위한 임의 접속 기법)

  • 임광재;김수영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11B
    • /
    • pp.1583-1594
    • /
    • 2001
  • In this paper, the transmission structure and procedure of a random access channel for the IMT-2000 satellite radio specification are presented. The proposed random access method has much commonality with that of the 3GPP FD specification which is a terrestrial radio interface of IMT-2000. The proposed method was designed by considering characteristics of satellite link as we71 as the commonality with the terrestrial component. A preamble consists of sub-preamble repetition and a message is transmitted along with the preamble successively. The propose method has fast indication of preamble acquisition by physical layer. The proposed method has been included in the SAT-CDMA which is a radio transmission technology Proposed by TTA, KOREA and approved as a satellite radio interface at ITU-R. Additionally, in this Paper the signaling delay for the proposed random access channel will be analyzed and it will be compared to that of the random access methods using a conventional ALOHA procedure and the 3GPP procedure in aspect of the signaling delay. When the SAT-CDMA satellite constellation at the height of about 1600 km is considered, the delay of the proposed method was estimated to 100 ms less than that of the conventional ALOHA. This delay difference increases with 7he number of retransmissions. The delay is reduced by 30 ms, compared with the 3GPP method.

  • PDF