• Title/Summary/Keyword: Open Protocol

Search Result 479, Processing Time 0.027 seconds

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments

  • Obaidat, Mohammad S.;Dhurandher, Sanjay K.;Gupta, Deepank;Gupta, Nidhi;Asthana, Anupriya
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.269-294
    • /
    • 2010
  • The interconnection of mobile devices in urban environments can open up a lot of vistas for collaboration and content-based services. This will require setting up of a network in an urban environment which not only provides the necessary services to the user but also ensures that the network is secure and energy efficient. In this paper, we propose a secure, energy efficient dynamic routing protocol for heterogeneous wireless sensor networks in urban environments. A decision is made by every node based on various parameters like longevity, distance, battery power which measure the node and link quality to decide the next hop in the route. This ensures that the total load is distributed evenly while conserving the energy of battery-constrained nodes. The protocol also maintains a trusted population for each node through Dynamic Trust Factor (DTF) which ensures secure communication in the environment by gradually isolating the malicious nodes. The results obtained show that the proposed protocol when compared with another energy efficient protocol (MMBCR) and a widely accepted protocol (DSR) gives far better results in terms of energy efficiency. Similarly, it also outdoes a secure protocol (QDV) when it comes to detecting malicious nodes in the network.

The Device Configuration Protocol with Real-Time Processing for QoS Support over IPv6 (IPv6 상에서 QoS 지원을 위한 실시간 처리용 DCP 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.660-668
    • /
    • 2005
  • Recently, the Internet-based communication method has been adopted as an open networking solution in the field of remote control and data acquisition. In the current Internet, most networking applications are developed according to the client-server approach. In this paper, we propose an innovative Device Configuration Protocol (DCP) that exchanges the traditional role between client and server to provide a uniform device interface over the Internet for various field devices. The proposed protocol is implemented as an application-level protocol running on top of the standard TCP/IP protocols. Also, the DCP protocol is extended with real-time processing to work with the FlowLabel of IPv6 for QoS (Quality of Service) support. The simulation results show that the real-time packets can be processed prior to the given deadline regardless of throughput, as compared to the normal packets.

A Security Analysis of Zhao and Gu's Key Exchange Protocol (Zhao와 Gu가 제안한 키 교환 프로토콜의 안전성 분석)

  • Nam, Jung-Hyun;Paik, Ju-Ryon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.91-101
    • /
    • 2012
  • Key exchange protocols are essential for building a secure communication channel over an insecure open network. In particular, password-based key exchange protocols are designed to work when user authentication is done via the use of passwords. But, passwords are easy for human beings to remember, but are low entropy and thus are subject to dictionary attacks. Recently, Zhao and Gu proposed a new server-aided protocol for password-based key exchange. Zhao and Gu's protocol was claimed to be provably secure in a formal adversarial model which captures the notion of leakage of ephemeral secret keys. In this paper, we mount a replay attack on Zhao and Gu's protocol and thereby show that unlike the claim of provable security, the protocol is not secure against leakage of ephemeral secret keys. Our result implies that Zhao and Gu's proof of security for the protocol is invalid.

Improved Two-Party ID-Based Authenticated Key Agreement Protocol (개선된 두 참여자간 식별자 기반 인증된 키 동의 프로토콜)

  • Vallent, Thokozani Felix;Kim, Hae-Jung;Yoon, Eun-Jun;Kim, Hyunsung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.595-604
    • /
    • 2013
  • Devising a secure authenticated key agreement (AKA) protocol for two entities communicating over an open network is a matter of current research. McCullagh et al. proposed a new two-party identity-based AKA protocol supporting both key escrow and key escrow-less property instantiated by either in a single domain or over two distinct domains. In this paper, we show that their protocol over two distinct domains suffers from masquerading attack and therefore does not satisfy the claimed security. The attack is made possible due to the lack of sufficient authentication of entity and integrity assurance in the protocol. We then propose an efficient verifiable key agreement protocol by including signature primitive in the authentication procedure to solve the problem of McCullagh et al.'s protocol.

Network Security Protocol Performance Analysis in IoT Environment (IoT 환경에서의 네트워크 보안 프로토콜 성능 분석)

  • Kang, Dong-hee;Lim, Jae-Deok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.955-963
    • /
    • 2022
  • The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environment are connected to the Internet and are closely used in daily life, the damage caused by cyber attacks is also serious. Therefore, encryption communication using a network security protocol must be considered for a service in a more secure IoT environment. A representative network security protocol includes TLS (Transport Layer Protocol) defined by the IETF. This paper analyzes the performance measurement results for TLS version 1.2 and version 1.3 in an IoT device open platform environment to predict the load of TLS, a representative network security protocol, in IoT devices with limited resource characteristics. In addition, by analyzing the performance of each major cryptographic algorithm in version 1.3, we intend to present a standard for setting appropriate network security protocol properties according to IoT device specifications.

Remote Measurement of the Automobile′s ECU Signals with KWP2000 using Bluetooth Module (Bluetooth 모듈을 이용한 KWP2000 차량 ECU신호의 원격 계측)

  • Choi Kwang-Hun;Kwon Tae-Kyu;Lee Seong-Cheol
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.10
    • /
    • pp.86-93
    • /
    • 2004
  • This paper presents the remote measurement of the ECU signals adopted with KWP 2000 protocol using the wireless communication technique of bluetooth. The bluetooth technology will be the most promising network paradigm which can open the new area in the information technology. Especially, bluetooth module is able to link all the electrical products and personal computers to cellular phone or PDA. This research has a try to design a wireless measurement model of ECU signal based on the car telemery system using bluetooth device. In order to measure the ECU signals, we designed the interface circuits which is able to communicate between the ECU system and the terminal circuits according to the ISO, SAE regulation of communication protocol standard. A microprocessor S3c341 OX is used for the system control and communication of ECU signals. The embedded system software is programmed to measure the ECU signals using the ARM compiler and ANCI C based on Micro/OS-II kernel to communicate between two bluetooth modules using bluetooth stack. The remote measurement of ECU signals using the bluetooth was designed and implemented to evaluate the performance of wireless network to the transmit measurement data. The possibility for the remote measurement of the self diagnosis signals of ECU adopted with KWP2000 protocol verified through the developed systems and algorithms in embedded system.

Distributed Coordination Protocol for Ad Hoc Cognitive Radio Networks

  • Kim, Mi-Ryeong;Yoo, Sang-Jo
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.51-62
    • /
    • 2012
  • The exponential growth in wireless services has resulted in an overly crowded spectrum. The current state of spectrum allocation indicates that most usable frequencies have already been occupied. This makes one pessimistic about the feasibility of integrating emerging wireless services such as large-scale sensor networks into the existing communication infrastructure. Cognitive radio is an emerging dynamic spectrum access technology that can be used for flexibly and efficiently achieving open spectrum sharing. Cognitive radio is an intelligent wireless communication system that is aware of its radio environment and that is capable of adapting its operation to statistical variations of the radio frequency. In ad hoc cognitive radio networks, a common control channel (CCC) is usually used for supporting transmission coordination and spectrum-related information exchange. Determining a CCC in distributed networks is a challenging research issue because the spectrum availability at each ad hoc node is quite different and dynamic due to the interference between and coexistence of primary users. In this paper, we propose a novel CCC selection protocol that is implemented in a distributed way according to the appearance patterns of primary systems and connectivity among nodes. The proposed protocol minimizes the possibility of CCC disruption by primary user activities and maximizes node connectivity when the control channel is set up. It also facilitates adaptive recovery of the control channel when the primary user is detected on that channel.

Effects of communication in learning middle grade school Mathematics (중학생을 대상으로 한 수학적 의사소통의 지도 효과에 관한 연구)

  • 김선희;이종희
    • Journal of Educational Research in Mathematics
    • /
    • v.8 no.1
    • /
    • pp.145-162
    • /
    • 1998
  • This study investigated the effect of teaching mathematical communication in mathematics learning. Cooperative learning, mathematics pin pals, and writing a mathematics diary were used to teach how to communicate mathematically. The experimental group was assigned to cooperate in class, to write a mathematics diary at the end of each class, and to exchange the mathematics pen pals once a week. The control group was taught by the traditional teaching method. The results were analyzed quantitatively and qualitatively. The learning achievement between the two groups was performed with pretests and posttests. And after this study, mathematics pen pals, video protocol and open-ended test were analyzed. The results of this study are the following: 1. There were little differences in learning achievement test between the group taught through communication and those not. And there were little differences in the results of achievement test between the two groups-high and low level classes.2. Cooperative learning, writing a mathematics diary and mathematics pen pals were effective as methods of teaching communication mathematically. The analysis of mathematics pen pals which is to investigate student's writing abilities showed that pen pal partners were improved in QCAI communication levels. There was a significant difference between the two groups in open-ended test. This means that communication learning has an effect on the tests for mathematical thought, reasoning, and creative thought. The analysis of video protocol showed that four students in a cooperative group were improved in their speaking and listening abilities.

  • PDF

Performance Test of Asynchronous Process of OGC WPS 2.0: A Case Study for Geo-based Image Processing

  • Yoon, Gooseon;Lee, Kiwon
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.4
    • /
    • pp.391-400
    • /
    • 2017
  • Geo-based application services linked with the Open Geospatial Consortium (OGC) Web Processing Service (WPS) protocol have been regarded as an important standardized framework for of digital earth building in the web environments. The WPS protocol provides interface standards for analysis functionalities within geo-spatial processing in web-based service systems. Despite its significance, there is few performance tests of WPS applications. The main motivation in this study is to perform the comparative performance test on WPS standards. Test system, which was composed of WPS servers, WPS framework, data management module, geo-based data processing module and client-sided system, was implemented by fully open source stack. In this system, two kinds of geo-based image processing functions such as cloud detection and gradient magnitude computation were applied. The performance test of different server environments of non-WPS, synchronous WPS 1.0 and asynchronous WPS 2.0 was carried out using 100 threads and 400 threads corresponds client users on a web-based application service. As the result, at 100 threads, performance of three environments was within an adjacent range in the average response time to complete the processing of each thread. At 400 threads, the application case of WPS 2.0 showed the distinguished characteristics for higher performance in the response time than the small threads cases. It is thought that WPS 2.0 contributes to settlement of without performance problems such as time delay or thread accumulation.

Implementation of MQTT protocol based internet maker kit (MQTT 프로토콜 기반의 사물인터넷 메이커 키트 구현)

  • Kwon, Dong-hyeon;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.736-739
    • /
    • 2017
  • Recently, makers who do not have huge production equipments and who actually make products that they thought by utilizing digital production tools are emerging as new trends. As these makers shared how to make products, the 'maker movement', an open source manufacturing movement, spread. In the case of the domestic market, the maker movement is being activated through the government's policy support. However, compared to developed countries, there is not enough awareness and environment of maker culture, and only open platform hardware and software are used without specialized education / development equipment or kit for maker. Therefore, in this paper, we implement a MQTT protocol based Internet object maker kit for real service interworking rather than simple data connection through hardware connection.

  • PDF