• Title/Summary/Keyword: Open Protocol

Search Result 473, Processing Time 0.027 seconds

A Transaction Analysis Model for OpenADR 2.0b Payload (OpenADR 2.0b 페이로드 트랜잭션 분석 모델 연구)

  • Choi, Min-Young;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.23-30
    • /
    • 2017
  • OpenADR is a national standard communication protocol of demand response service. OpenADR uses XML message, called a payload, to support logical transaction of demand response service. For this purpose, OpenADR defines a XML element as transaction identifier which is called requestID. Unfortunately, OpenADR 2.0b profile specification describes some information about requestID but, it is not enough for understanding properly. Ambiguous definition of payload transaction makes vulnerabilities of implementing VEN & VTN and confuses mapping OpenADR 2.0b protocol into other smart grid protocols. Therefore, this paper redefines payload transaction to solve an ambiguous information of OpenADR 2.0b profile specification, proposes a model of analyzing payload transaction, and shows how to detect a payload transaction vulnerability in real-world.

The Construction of AHU Control Network by Power Line Communication (전력선 통신에 의한 공기조화설비 제어네트워크 구축)

  • Kim, Myungho;Ahn, Kyochol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.7-11
    • /
    • 2008
  • In order to enhance standardization and interoperability of local level systems, AHU control network was designed with basement(8 point) and basis story(15 point) and then the network was constructed by power line communication. Each devices of AHU system were programed with neuron C of $L_{ON}W_{ORKS}$ as an open protocol. As a result of a study, each devices of the network were controlled with self dispersion process by $L_{ON}W_{ORKS}$ protocol and wiring could be reduced by power line communication.

  • PDF

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.

Web-based Building Automation System using Embedded Linux (임베디드 리눅스를 이용한 웹 기반 빌딩자동화시스템)

  • 신은철;이수영;최병욱
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.4
    • /
    • pp.334-340
    • /
    • 2004
  • In this paper, a Web-based management system for the building network is described. A multi-protocol converter based on SoC and embedded Linux is designed. The open source licensing, reliability, and broad hardware support are key reasons for use of embedded Linux in embedded industry. The multi-protocol converter integrates control network of RS-485 and LonWorks devices through TCP/IP protocol for a client with Java applet. The system consists of three-tier architecture, such as a client, a server that is performed on a multi-protocol converter, and control devices. The developed system includes the inverter motor control system with modbus protocol for the RS-485 network. The experiment results show that the multi-protocol converter using embedded Linux is a flexible and effective way to builda Web -based monitoring and control system.

Session Control Mechanism for Peer-to-Peer IPTV Services (P2P IPTV 서비스를 위한 세션 제어 메카니즘)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.87-92
    • /
    • 2008
  • This paper proposes a session control model for the P2P(Peer to Peer) IPTV(Internet Protocol Television) services and presents the IPTV session control procedures based on the proposed model. Since, while public IPTV traffic is usually processed via a separate network, P2P IPTV traffic is processed together with the conventional Internet access traffic, the P2P IPTV control mechanism needs to provide multi-stream processing for the constituent TPS(Triple Play Service) traffic and corresponding QoS(Quality of Service) control functions. Besides, P2P IPTV session control mechanism should provide appropriate multicast control functions in order to support effective transmission of video traffic generated by personal IPTV broadcasters. The P2P IPTV session control model proposed in this paper is designed to be based on the standard SIP(Session Initiation Protocol), IGMP(Internet Group Management Protocol), and COPS(Common Open Policy Service) protocol so that it can contribute to the easy and prompt deployment of inter-operable P2P IPTV platform.

Efficient Flooding Methods for Link-state Routing Protocols (Link-state 라우팅 프로토콜을 위한 효율적인 플러딩 방법)

  • Kim, Jeong-Ho;Lee, Seung-Hwan;Rhee, Seung-Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.760-766
    • /
    • 2012
  • In this paper, we propose an efficient flooding process on link-state routing protocol. It is possible to exchange information using typical link-state routing protocol; for example, OSPF(Open Short Path First) or IS-IS(Intermediate system routing protocol) that floods LSA between nodes when the network topology change occurs. However, while the scale of network is getting bigger, it affects the network extensibility because of the unnecessary LSA that causes the increasing utilization of CPU, memory and bandwidth. An existing algorithm based on the Minimum spanning tree has both network instability and inefficient flooding problem. So, we propose algorithm for efficient flooding while maintaining network stability. The simulation results show that the flooding of proposed algorithm is more efficient than existing algorithm.

Packet Processing Analysis of OSPF Routing Protocol (OSPF라우팅 프로토콜의 패킷 처리 분석)

  • 최승한;주성순
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.477-480
    • /
    • 2000
  • Open Shortest Path First(OSPF) is a dynamic, hierarchical routing protocol designed to support routing in TCP/IP networks. Currently, OSPF is used as Interior Gateway Protocol(IGP) in many routers. In this paper, we analyze the variation of number of OSPF routing packets in case of changing the network configuration. The results show that the number of packets in case of adding new link increase five times than one in case of normal operation.

  • PDF

A Study on the Practical Implementation of a OAI Protocol for Scholarly Communication (학술정보 유통에 있어 OAI프로토콜의 적용에 관한 연구)

  • 이수상
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.2
    • /
    • pp.219-241
    • /
    • 2004
  • The OAI(Open Archives Initiative) is an evolving protocol and philosophy regarding interoperability for digital libraries. This protocol has its roots in an effort to enhance access to digital libraries as a means of increasing the availability of scholarship communication. Thus, this research outlines the history of the OAI protocol, the basic model of SP(service provider)/DP(data provider), and the prerequisites to implement the OAI protocol. Viewed in this light, this paper also describes the experiences of KERIS project of SP/DP model and lists the differences between prerequisites and KERIS case.

  • PDF

A Study on Open API Security Protocol based on Multi-Channel (다중 채널 기반 오픈 API 보안 프로토콜에 관한 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.40-46
    • /
    • 2020
  • Safe security technology is required for the startup ecosystem according to the construction and service of a joint open platform in the financial sector. Financial industry standard open API recommends that payment-related fintech companies develop/apply additional security technologies to protect core API authentication keys in the mutual authentication process. This study proposes an enhanced API security protocol using multiple channels. It was designed in consideration of the compatibility of heterogeneous platforms by further analyzing the problems and weaknesses of existing open API related research. I applied the method of concealment to remove the additional security channels into a single channel of the existing security protocols. As a result of the performance analysis, the two-way safety of the communication session of the multi-channel and the security of the man-in-the-middle attack of the enhanced authentication key were confirmed, and the computational performance of the delay time (less than 1 second) in the multi-session was confirmed.