• Title/Summary/Keyword: Protocol Design

Search Result 2,595, Processing Time 0.031 seconds

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Study of Business Model Based on Intelligent Agents for Optimal Contract (최적의 매매계약을 위한 지능형 에이전트 기반의 비즈니스 모형에 관한 연구)

  • 정종진
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.131-146
    • /
    • 2004
  • As Electronic Commerce(EC) has been emerged and has developed, many researchers have tried to establish EC framework for automated contract and negotiation using agent technologies. Traditional researches, however, often had limitations. They often enforced the user's participations during the automated contract process of agents. They also could only consider a few of the user's requirements for a specific goods and did not have supported the procedures and methodologies for making the best contract. In this paper, we propose business model on EC based on multiagents to overcome the defects of the previous researches. We apply CSP techniques to brokerage process to satisfy various preferential requirements from the user. We also propose efficient negotiation mechanism using negotiation model of game theory. The contract candidates automatically negotiate and mediate in terms of their benefits through the proposed negotiation mechanism. For the optimal brokerage and automated negotiation, the agents process activities for contract on three layers, which are called competition layer, constraint satisfaction layer and negotiation layer in the proposed model. We also design the message driven communication protocol to support the automated contract among the agents. Finally, we have implemented prototype systems applying the proposed model and have shown the various experimental results for efficiency of the proposed model.

  • PDF

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

Development of the Ship Manoeuvring PC Simulator Based on the Network (네트워크 기반의 간이 선박조종 시뮬레이터 개발)

  • Choi, Won-jin;Kim, Hyo-Il;Jun, Seung-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.403-412
    • /
    • 2019
  • The characteristics of the manoeuvring motion of a ship are dependent on the ship type, as well as draft or speed in the same ship. In recent years, the number of extra-large vessels has increased significantly, which can cause enormous material and environmental damage in the event of a marine accident. Thus, the importance of ship maneuvering is increasing. The IMO has forced the officers to be trained in simulators through the STCW 95 amendment. However, FMSS is costly and difficult to access and the PC-based simulator has the disadvantage that only one person can engage in simulation. The purpose of this study was to solve the shortcomings of the FMSS and PC-based simulators by enabling multiple people to use their PCs to simulate based on a network. The simulator is implemented through the analysis and numerical calculation of the Nomoto model, Radar function mounting, data transfer protocol design, and GUI building. To verify the simulator, the simulation results were compared and analyzed with the test results of T.S. HANBADA according to the criteria of the Korean Register of Shipping(KR) and IMO standards for ship maneuverability. As a result, It showed a relative error of 0%~ 32.1% with an average of 13.7%, and it satisfied the IMO criteria for ship maneuverability.

EMDR-IGTP on the Depression, Anxiety, Post Traumatic Stress, and Self-esteem of Graduate Nursing Students (EMDR 통합 집단치료가 간호대학원생의 우울, 불안, PTSD, 및 자아존중감에 미치는 효과)

  • Oh, Kyong-ok;Gang, Moon-hee;Kim, Sun-Hee
    • Journal of Digital Convergence
    • /
    • v.16 no.6
    • /
    • pp.233-240
    • /
    • 2018
  • The study aimed to evaluate the effects of the EMDR-IGPT(Eye movement desensitization and reprocessing-integrative group treatment protocol) on the depression, anxiety, post traumatic stress, self-esteem in graduate nursing students. A quasi-experimental study employing a nonequivalent control group and pre-post design was conducted. The participants were graduate nursing students from C university (Experimental group=22, Control group=28). The experimental group participated in the 8 session-EMDR-IGPT for 8 weeks, while control group were treated by waitlist. Data were analyzed using ${\chi}^2-test$, independent t-test, with SPSS 24.0 program. There were significant differences in anxiety(t=-2.50, p<.05) and self-esteem(t=20.78, p<.01) of participants between experimental group and control group after completion of 8 session-EMDR-IGPT. The results indicate that EMDR-IGPT can be used to improve anxiety and self-esteem of graduate nursing students. Furthermore, further study needs to identify the mechanism of the effects of the program.

Design of Adaptive DCF algorithm for TCP Performance Enhancement in IEEE 802.11 based Mobile Ad-hoc Networks (IEEE 802.11 기반 이동 ad-hoc 망에서 TCP 성능 향상을 위한 적응적 DCF 알고리즘 설계)

  • Kim, Han-Jib;Lee, Gi-Ra;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.79-89
    • /
    • 2006
  • TCP is the most widely used transport protocol in Internet applications that guarantees a reliable data transfer. But, in the wireless multi-hop networks, TCP performance is degraded because it is designed for wired networks. The main reasons of TCP performance degradation are contention for wireless medium at the MAC layer, hidden terminal problem, exposed terminal problem, packet losses in the link layer, unfairness problem, reordering problem caused by path disconnection, bandwidth waste caused by exponential backoff of retransmission timer due to node's mobility and so on. Specially, in the mobile ad-hoc networks, discrepancy between a station's transmission range and interference range produces hidden terminal problem that decreases TCP performance greatly by limiting simultaneous transmission at a time. In this paper, we propose a new MAC algorithm for mobile ad-hoc networks to solve the problem that a node can not transmit and just increase CW by hidden terminal. In the IEEE 802.11 MAC DCF, a node increases CW exponentially when it fails to transmit, but the proposed algorithm, changes CW adaptively according to the reason of failure so we get a TCP performance enhancement. We show by ns-2 simulation that the proposed algorithm enhances the TCP performance by fairly distributing the transmission opportunity to the failed nodes by hidden terminal problems.

Analysis of implant strain value exerted using different screw tightening protocols in screw-retained 3-unit prostheses (3본 나사 유지형 임플란트 보철물의 고정 방식에 따른 임플란트 고정체 치경부에 발생하는 변형율 비교분석)

  • Kim, Sang-Beom;Lee, Du-Hyeong;Lee, Cheong-Hee
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.58 no.4
    • /
    • pp.321-327
    • /
    • 2020
  • Purpose: The purpose of this study was to measure and compare the strain value exerted on the cervical area using different screw tightening protocols in implant-supported, screw-retained 3-unit prostheses. Materials and methods: Strain gauges were attached to four implants: two external and two internal. Thereafter, two study model were designed each type using acrylic resin. CAD-CAM was used to design hex and nonhex abutments for each group (EH, ENH, IH, and INH group) and Screw-cement-retained prostheses were also designed using a nonprecious base metal. Abutment was fixed with 10 Ncm torque, and the prosthesis was cemented. Screws were fixed with 30 Ncm torque using different three protocols. After 5 min, the strain gauge level was measured, and group analysis was performed (α=.05). Results: External group showed significantly lower strain values than internal group and the EH group showed significantly lower strain values than the ENH group (P<.05). There was no difference in strain value based on the types of screw tightening protocols in same group (P>.05). The IH group exhibited significantly higher strain values than the INH group and the IH group showed a significant difference in strain values based on the types of screw tightening protocols used (P<.05). Conclusion: There was no significant effect on the external type in the implant-supported, screw-retained prostheses. However, strain values were high in the internal type, and the types of screw tightening protocol significantly affected these implants.

A Study of Future Internet Testbed Construction using NetFGA/OpenFlow Switch on KOREN/KREONET (KOREN/KREONET기반 NetFPGA/OpenFlow 스위치를 이용한 미래인터넷 테스트 베드 구축 방안 연구)

  • Park, Man-Kyu;Jung, Whoi-Jin;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.109-117
    • /
    • 2010
  • Building a large-scale testbed for Future Internet is very important to evaluate a new protocol and new network architecture designed by clean-slate approach. In Korea, new Future Internet testbed project, called FIRST (Future Internet Research for Sustainable Testbed), has been started since Mar. 2009 to design and test new protocols. This project is working together with ETRI and 5 universities. The FIRST@PC is to implement a virtualized hardware-accelerated PC-node by extending the functions of NetFPGA card and build a Future Internet testbed on the KOREN and KREONET for evaluating newly designed protocols and interesting applications. In this paper, we first briefly introduce FIRST@PC project and explain a 'MAC in IP Capsulator' user-space program using raw-socket in Linux to interconnect OpenFlow enabled switch sites on the KOREN and KREONET. After that, we address test results for TCP throughput performance for varying packet size. The test results show that the software based capsulator can support a reasonable bandwidth performance for most of applications.

The Design and Implementation of Automotive Smart-key System Using general-purpose RFID (교통카드와 같은 범용 RFID를 활용한 자동차용 스마트키 시스템 설계 및 구현)

  • Lee, Yun-Sub;Kim, Kyeong-Seob;Yun, Jeong-Hee;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.42-50
    • /
    • 2009
  • Ubiquitous computing technology is widely used in not only our everyday lives but also in education, medical care, military, environment and administration. RFID system, the basis of ubiquitous, is in the spotlight which can be an alternative solution of a bar code recognition system and magnetic system as they basically have practicality and security issues. An electronic authentication named smart-key system is recently concerned by an alternative solution of the security unit for an automobile. RFID system which has a general purpose is also in the limelight by an application technology. In this paper we designed vehicle smart key system with general-propose RFID system that is already in use. First, we designed control unit and RFID card reader for vehicle smart key system. Then we propose an algorithm and prove that the vehicle key system is controllable by showing the result of implementing and testing, after installing. Also security level is enlarged by proposing a authentication protocol between RFID reader and control unit.

Design and Analysis of Intelligent AMC Scheme with Relay Protocols in LTE-Advanced System (LTE-Advanced 시스템에서 릴레이 프로토콜을 적용한 지능형 AMC 기법의 설계 및 분석)

  • Malik, Saransh;Kim, Bora;Moon, Sangmi;Kim, Daejin;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.10-19
    • /
    • 2012
  • In this paper, we propose an Adaptive Modulation and Coding (AMC) scheme using relay protocols generally known as Relay Node (RN). The AMC scheme is used for improving the throughput and a reliability of a communication system, because of the nature of different modulation and coding schemes. We analyze the performance of relay protocols with the AMC scheme and observed that relay protocols with the AMC scheme is capable of providing better average throughput at a lower Signal to Noise Ratio (SNR) level as compared to the conventional scheme with no AMC. We perform Monte Carlo simulations with Long Term Evolution-Advanced (LTE-A) parameters to prove the performance comparison of adaptive Modulation and Coding Scheme (MCS) relay protocols with the non-adaptive MCS relay protocols. The simulation results of the proposed system with adaptive MCS prove that among the Amplify-and-Forward (AF), Decode-and-Forward (DF) and DeModulate-and-Forward (DMF), the DMF protocol performs best at a lower SNR value and also provides better average throughput.