• Title/Summary/Keyword: Protocol Design and Verification

Search Result 120, Processing Time 0.033 seconds

Design and Verification of Seamless Handoff Protocol over Mobile IPv4 (Mobile IPv4에서의 Seamless 핸드오프 프로토콜 설계 및 검증)

  • 박병준;송병권;정태의
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10c
    • /
    • pp.58-60
    • /
    • 2003
  • Mobile IP는 현재의 인터넷에서 노드가 링크를 변화시킬 때 통신이 지속 될 수 있도록 이동성(Mobility)을 제공하기 위한 방안이다. Mobile IP는 MN(Mobile Node)이 HA(Home Agent) 와 FA(Foreign Agent)사이에서 링크를 변화시킬 때 CN(Correspondent Node)과 지속적인 통신을 할 수 있도록 한다. 그러나 FA에서 FA로 MN이 노드의 위치를 바꿀 때에는 핸드오프(Handoff)가 발생하여 패킷이 손실 될 수도 있다. 본 논문은 MN이 FA에서 다른 FA로 이동할 때 발생하는 패킷 손실과 순서변경에 대한 경우를 살펴 이를 해결하기 위한 Seamless 핸드오프 프로토콜을 기술하고 이를 검증한다.

  • PDF

- Design and Implementation of the secure WPKI Protocol on mobile environment - (무선환경에서 안전한 WPKI Protocol의 설계 및 구현)

  • Jang Yu Jin;Park Sang Min;Shin Seung Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.161-174
    • /
    • 2004
  • The existing PKI authentication structure uses the OCSP method. The primary task of OCSP is to verify the status of a transaction after verifying the validity of the certificate; but, because of continuing policy changes and updates within the PKI authentication method, the status of certificates and the structures are not consistent. Therefore, the SCVP method can be selected as the broadest method for completing authentication tasks accurately because the SCVP method includes validation of policy changes. An appropriate method for building an mobile environment within the capabilities of low-memory and reduced processing CPU needs to be assessed and developed. This thesis proposes a verification method that is independent of platform and applicable to any 05 in building and expanding the mobile environment.

System Software Modeling Based on Dual Priority Scheduling for Sensor Network (센서네트워크를 위한 Dual Priority Scheduling 기반 시스템 소프트웨어 모델링)

  • Hwang, Tae-Ho;Kim, Dong-Sun;Moon, Yeon-Guk;Kim, Seong-Dong;Kim, Jung-Guk
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.260-273
    • /
    • 2007
  • The wireless sensor network (WSN) nodes are required to operate for several months with the limited system resource such as memory and power. The hardware platform of WSN has 128Kbyte program memory and 8Kbytes data memory. Also, WSN node is required to operate for several months with the two AA size batteries. The MAC, Network protocol, and small application must be operated in this WSN platform. We look around the problem of memory and power for WSN requirements. Then, we propose a new computing model of system software for WSN node. It is the Atomic Object Model (AOM) with Dual Priority Scheduling. For the verification of model, we design and implement IEEE 802.15.4 MAC protocol with the proposed model.

  • PDF

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.

A Study on Modeling of Protocol for Basic Call Process SIB in Advanced Intelligent Network (고도지능망의 기본호처리 SIB를 위한 프로토콜 모델링에 관한 연구)

  • 조현준;이성근;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.322-330
    • /
    • 1994
  • SIBs(Service Independent Building block) are defined in CCITT advanced intelligent network concept model for supporting various services in the future. This paper describes the protocol modeling and verification for basic call process SIB. For modeling, we use Petri Net and verify this modeling by analyzing reachability tree of Petri Net. Results of this paper should be used for design and implementation of basic call process SIB.

  • PDF

A Verification Case Study about the Authentication of a Network using AAA (AAA가 적용된 네트워크의 인증에 대한 검증 사례연구)

  • Park, Sung-Bae;Kim, No-Whan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.295-300
    • /
    • 2017
  • AAA, an information-protective protocol authorizes the degree of service and rights to the user through a safe and reliable authentication. The protocol also systematically manages the accounting functions including billing, monitoring, and reporting using the user information. After a topology was created to design a network based on a router and server using RADIUS and TACACS+, a common virtual network was made using a packet tracker. This paper presents cases showing valid authentication through simulations.

A Study on Analysis for Secure M-Commerce Transaction (안전한 모바일 전자상거래를 위한 분석 연구)

  • Lee Ji-Yeon
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.3
    • /
    • pp.199-204
    • /
    • 2006
  • M-commerce protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. With the rise of smart card's usage, mobile e-commerce services with CEPS which is one of e-commerce transaction standards has been increased. In this paper, we describe a methodology to analyze the security of e-commece protocols and identify the security vulnerability of the CEPS based good purchase and e-money load protocols using formal verification technique. Finally, we discuss a countermeasure against the vulnerability in the purchase transaction protocol.

  • PDF

Design and Formal Verification of Protocol for Interface between Railway Signaling Systems and SCADA Systems (철도신호시스템과 전철전력 SCADA 장치간 프로토콜 설계 및 정형검증)

  • Hwang Jong-Gyu;Lee Jae-Ho;Yoon Yong-Gi
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.1358-1360
    • /
    • 2004
  • 철도 신호제어장치들은 각자 고유의 기능을 수행하면서 각 장치간 통신링크를 통하여 하나의 신호제어시스템을 구성하고 있다. 특히 철도청에서 통합 CTC 시스템을 구축하면서 신호제어시스템 이외의 SCADA나 여객정보안내 시스템 등과도 인터페이스를 통해 기존의 열차제어 기능만을 수행하는 것에서 타 시스템과의 통신을 통한 종합적인 정보시스템으로 발전하고 있다. 이러한 CTC장치와 외부설비들간의 인터페이스는 철도정보시스템의 발달에 따라 매우 중요한 부분이 되고 있으며, 본 논문에서는 이중 SCADA 장치와의 인터페이스를 위한 프로토콜 구조를 연구하였다. 이에 따라 본 논문에서는 기존의 도시철도, 경부고속철도 등의 프로토콜의 분석을 바탕으로 철도청 통합 CTC와 SCADA 장치간 통신을 위해 설계한 프로토콜 구조를 제시하고, 또한 설계한 프로토콜에 대한 안전성과 필연성을 정형검증(Formal Verification) 결과를 설명한다.

  • PDF

Design and Verification of Intrusion Detectioned Electronic Payment Protocol by Petri Net (페트리네트를 이용한 침입탐지 전자지불 프로토콜의 설계와 검증)

  • 유은진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • 본 논문은 인터넷 상에서 전자상거래가 이루어지는데 기본적으로 요구되는 보안성을 강화하기 위해 침입탐지 전자지불 프로토콜을 제안하였다. 여기서 침입탐지 기능이란 저보 전송이 이루어지는 순간마다 침입이 발생하였는지 탐지하도록 하므로써 신속한 탐지가 이루어지도록 하는 기능을 말한다. 제안된 침입탐지 전자지불 프로토콜의 타당성, 안정성을 분석하기 위해 페트리네트와 CPN(Coloured PetriNet)을 이용하여 모델링하였다. 또한 암호화 논리의 유용한 검증 도구로서 BAN(Burrows-Abadi-Needham)논리 시스템과 Kailar 논리 시스템을 이용하여 프로토콜의 타당성과 안정성을 확인 ·검증하였다.

Design And Verification Of A PCI Express Behavioral Model Using C Language (C 언어를 이용한 PCI Express 동작 모델 설계 및 검증)

  • 예상영;현유진;성광수
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.811-814
    • /
    • 2003
  • Today's and tomorrow's processors and I/O devices are demanding much higher I/O bandwidth than PCI 2.3 or PCI-X can deliver and it is time to engineer a new generation of PCI to serve as a standard I/O bus for future generation platforms. According to this demand the PCI SIG proposed PCI Express. This paper describes about the design of PCI Express Behavioral Model. A Behavioral Model enables the designers to test whether the design specifications are met by performing computer simulations rather than experiments on the physical prototype. In the proposed Model, we can verify whether our design concept satisfies the PCI Express functional protocol.

  • PDF