• Title/Summary/Keyword: Protocol Design

Search Result 2,595, Processing Time 0.024 seconds

A Design of Encryption Method for Strong Security about Tapping/Interception of VoIP Media Information between Different Private Networks (이종 사설망간에 VoIP 미디어의 도.감청 보안 강화를 위한 암호화 기법 설계)

  • Oh, Hyung-Jun;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.113-120
    • /
    • 2012
  • VoIP provides voice data service using existing IP networks and has received much attention recently. VoIP service has a variety of security vulnerabilities. Types of main attacks on VoIP service are tapping/interception, DoS attacks, spam, misuse of service attacks and the like. Of these, confidential information leak because of tapping/interception has been considered as a critical problem. Encryption techniques, such as SRTP and ZRTP, are mostly used to prevent tap and intercept on VoIP media information. In general, VoIP service has two service scenarios. First, VoIP service operates within a single private network. Second, VoIP service operates between different private networks. Both SRTP and ZRTP for VoIP media information within a single private network can perform encryption. But they can not perform encryption between different private networks. In order to solve this problem, in this paper, we modify SRTP protocol. And then, we propose an encryption method that can perform encryption of VoIP media information between the different private networks.

Determination of Mequitazine in Human Plasma by Gas-Chro-matography/Mass Spectrometry with Ion-Trap Detector and Its Pharmacokinetics after Oral Administration to Volunteers

  • Kwon Oh-Seung;Kim Hye-Jung;Pyo Heesoo;Chung Suk-Jae;Chung Youn Bok
    • Archives of Pharmacal Research
    • /
    • v.28 no.10
    • /
    • pp.1190-1195
    • /
    • 2005
  • The objective of this study was to develop an assay for mequitazine (MQZ) for the study of the bioavailability of the drug in human subjects. Using one mL of human plasma, the pH of the sample was adjusted and MQZ in the aqueous phase extracted with hexane; the organic layer was then evaporated to dryness, reconstituted and an aliquot introduced to a gas chromatograph/mass spectrometer (GC/MS) system with ion-trap detector. Inter- and intra-day precision of the assay were less than 15.1 and $17.7{\%}$, respectively; Inter- and intra-day accuracy were less than 8.91 and $18.6{\%}$, respectively. The limit of quantification for the current assay was set at 1 ng/mL. To determine whether the current assay is applicable in a pharmacokinetic study for MQZ in human, oral formulation containing 10 mg MQZ was administered to healthy male subjects and blood samples collected. The current assay was able to quantify MQZ levels in most of the samples. The maximum concentration ($C_{max}$ was 8.5 ng/mL, which was obtained at 10.1 h, with mean half-life of approximately 45.5 h. Under the current sampling protocol, the ratio of $AUC_{t{\rightarrow}last}$ to $AUC_{t{\rightarrow}{\infty}}$ was $934{\%}$, indicating that the blood collection time of 216 h is reasonable for MQZ. Therefore, these observations indicate that an assay for MQZ in human plasma is developed by using GC/MS with ion-trap detector and validated for the study of pharmacokinetics of single oral dose of 10 mg MQZ, and that the current study design for the bioavailability study is adequate for the drug.

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

Design and realization of the passenger ship's MSP service system using ASM2.0 : focusing on captain's mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 여객선 MSP서비스 시스템 설계 및 구현)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.871-882
    • /
    • 2015
  • AIS-ASM is one of the studies to provide a variety of maritime safety information as well as the information on a ship's position that is their own function, and AIS-ASM has been implemented with adjustment of the relevant regulations since 2004. However, it was reported that the increased use of ASM message on the existing AIS channel affects the part of the existing AIS own function such as the transmission of the ship's position and safe-related information. Also, seamless MSP service is difficult to provide at a low transmission rate of the existing AIS channel. This study aims to reduce the marine officer's workload through automating captain's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and realized the ASM2.0 protocol through analyzing domestic regulations about passenger flight and AIS-ASM message.

Establishment of Climate Region by Recent 30-year Temperature Range in South Korea Area (남한지역의 최근 30년간 기온분포에 의한 기후권역 설정)

  • Ryu, Yeon-Soo;Park, Mi-Lan;Kim, Jin-Wook;Joo, Hye-Jin
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.11a
    • /
    • pp.376-382
    • /
    • 2011
  • Since the Industrial Revolution has caused global change by using of a fossil fuel, a reckless and growth-oriented development. A global mean temperature since 19th century has climbed up 0.4~$0.8^{\circ}C$. Our country, afterwards, global warming has increased the temperature every season. After The Kyoto Protocol regarding a greenhouse gas reduction goal took effect, be situations that decrease of greenhouse gas was acutely required. Therefore, interest of utilization of the new & renewable energy is increasing everyday. In advanced research, we shows that at first divided a country to nine range by natural geography, and second executed Meteorological data analysis of recent 30 years considering level of significance by nine range. The results of advanced research are that the similarities are low because there are the regions that temperature deviation of the similar climate regions is large in winter season, and there are not characteristics of clear discrimination of temperature. This study shows that at first divided a country to six range by temperature range, and second executed Meteorological data analysis of recent 30 years considering level of significance by six range. The results of this study are that in heating load calculation of building, periodic temperature data management is required because facility capacity and cost are affected greatly by outdoor temperature, and temperature by climate range needs consideration of pertinent area. Ground temperature was assumed of the weather in region, the ground and soil. Lastly, we were able to know that establishment of climate region by temperature range can be useful policy making and plans of design of the horticultural facilities and architectures.

  • PDF

Design of a HL7-based Mobile Web Prescription Interface for U-Healthcare (U-Healthcare를 위한 HL7 기반의 모바일 웹 처방 인터페이스의 설계)

  • Ahn, Yoon-Ae;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.8-16
    • /
    • 2013
  • Active studies are under way on telemedicine and medical support based on mobile devices in order to vitalize U-Healthcare. Especially when the medical law is revised to allow a remote prescription system, studies on a mobile prescription system will rapidly increase. And yet since mobile apps have less compatibility due to the nature of mobile platform, there is a restriction that they have to be redeveloped to be compatible with the platform. To compensate this problem, this study designs a mobile web prescription interface by using HLTML5, the standard language of mobile web development and jQuery Mobile, a JavaScript Library. It also adds a feature of converting to a form of standard protocol HL7-based messages to share data with existing hospital information system. This interface makes it possible to be interlocked with the existing hospital information system through the transmission of the HL7 messages. The advantage of the proposed system is that it can be used in various environments since it is independent of mobile platforms and compatible with general computers.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

사용자 인터페이스 디자인을 위한 Video Protocol 분석 도구 개발에 관한 연구

  • 김병욱;이건표
    • Proceedings of the ESK Conference
    • /
    • 1997.10a
    • /
    • pp.456-459
    • /
    • 1997
  • 디자이너에게 필요한 정보가 제품의 성격이 변함에 따라 변하면서 정보 수집의 흐름도 달라져가고 있다. 지금까 지의 디자인 정보 수집이 단순 설문조사에서 사용자의 사용상황을 관찰하는 보다 실질적인조사 혹은 컨텍스트 디 자인(Context Design: 사용환경을 고려한 디자인)으로 바뀌어 가고 있다. 그러나 기존의 조사분석방법들이 특정한 면(인지적 혹은 행위적)에 편중된 자료 수집에 초점이 맞추어져 있어서 다양한 정보의 수집과 이러한 정보의 통합 적 관리가 어려운 문제점을 가지고 있다. 정보의 수집과 통합적 관리의 어려움이 발생하게 되는 원인을 좀더 구체 적으로 살펴보면 첫째, 수잡되는 데이터의 문제이다. 데이터의 성격을 사용자인 개인의 조작행위에 중점을 두거나 또는 작업상황이나 사용자의 성격/선호도와 같은 부분에 중점을 두기 때문에 서로 상호작용하여 사용자 인터페이스에 큰 영향을 미치는 이 두 유형의 데이터에 관한 분석을 어렵게 하는 원인이 되고 있다. 둘째, 적당한 데이터 수집도구 (data logger)의 미비를 들 수 있다. 이것은 기존의 Data logger들은 정보를 문자나 숫자 또는 특수문자로서 정보를 추출하게 됨으로써 데이터를 뽑는 당시부터 정보가 추출자로인하여 1차적으로 가공이 된다는 점이다. 이것은 보다 실질적이고 분석단계에서 보다 면밀한 분석이 이루어 질 수 있는 중요한 데이터가 유출될 수도 있다는 것을 의미하는 것이다. 마지막으로 위에서 언급했던 두 유형의 데이터를 동시에 분석할 수 있는 방법의 부재와 실질적인 데이터를 분석하여 이를 디자인에 활용할 수 있는 정보로 가공할 수 있는 도구가 마련되어 있지 않다는 점이다. 디자인 작업은 종합적인 시각화 과정임에 비해 분석된 결과가 비시각적이며 위에서 언급했듯이 분절된 정보가 되기 쉽기 때문에 이를 디자인에 곧바로 적용시키기 어려운 점이 있다. 이에 본 연구는 기존의 바용성 평가를 위한 분석도구들이 갖는 문제 점들 해결하여 제품의 사용자 인터페이스 디자인 개발과정에서 활용할 수 있는 평가 분석도구를 개발하는 것을 목표로 한다. 이를 위해 첫째, 다양한 유형의 정보를 포함하는 비디오 정보를 선정하였따. 둘째, 데이터를 다양한 측면에서 추출할 수 있는 Data logger를 개발하였다. 셋째, 데이터를 시각적으로 정리하고 분석할 수 있는 도구를 제안한다. 마지막으로 인터페이스 디자인에서 여러 가지 디자인안을 도출해 내는 작업에 이용할 수 있는 종합화과정을 개발한다. 이러한 일련의 과정이 통합된 컴퓨터 시스템 안에서 이루어지도록 프로그램을 개발하여 정보의 유용성을 높일 수 있도록 한다.

  • PDF

Implementation of IoT Sensors Network Using Mobius Platform (모비우스 플랫폼을 이용한 IoT 센서 네트워크 구현)

  • Chang, Woo Young;Lee, Yong Cheol;Kang, Jeong Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.211-218
    • /
    • 2017
  • In this study, we implemented IoT Sensor Network using Mobius Platform and implemented four kinds of Z-wave sensors applicable to smart home service to verify its performance. The 12 common service functions (CSF) provided by Mobius enable application services including status monitoring of sensors to be implemented quickly. The standard service procedures and protocols have eliminated the design process of the system and shortened the meeting time for establishing protocol between application software developer, gateway developer and sensor developer, and discussion time for adjustment of opinion. We confirmed that the application service based on the implemented sensor network and the implementation of IoT sensor can shorten the development schedule, and confirmed that most of the products purchased in the market can be accommodated without change. We hope that such speediness and openness will be able to meet the demands of various services and contribute to expanding services and creating new markets.

A Real Time Location Based IoT Messaging System using MQTT (MQTT 활용 실시간 위치 기반 IoT 메시징 시스템)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.27-36
    • /
    • 2018
  • In this paper, we design and implement a real time IoT messaging system that can collect location information of moving vehicles and pedestrians in real time using MQTT protocol and provides location based information service in administrative area. We implemented MQTT based IoT device for vehicle location information collection and communication and MQTT based smartphone application for pedestrian location information service. IoT clients can send messages to the server in administrative units by using the MQTT Topic which is equal to administrative names. The SLIMS (Seoul Location based IoT Messaging System) implemented in this study is able to analyze the real time traffic volume of pedestrians and vehicles by tracking clients. It also can deliver messages to clients based on coordinate range. SLIMS can be used as a real-time location-based information service for large-scale IoT devices such as real-time flow population and vehicle traffic analysis and location-based message delivery.