• Title/Summary/Keyword: Protocol Design and Verification

Search Result 120, Processing Time 0.05 seconds

Design and Verification of Interworking Protocol between DiffServ and MPLS (DiffServ와 MPLS망간 연동프로토콜 설계 및 검증)

  • 박석천;정선화;김성주;이준호;정운영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.406-408
    • /
    • 2001
  • DiffServ와 MPLS 기술은 기존의 인터넷이 지니고 있는 많은 제약사항을 해결할 수 있는 차세대 인터넷 핵심기술로서 미래 통신망의 핵심으로 자리잡을 것으로 예상된다. 인터넷망 발전단계에서 경제성과 기술의 효용성 문제로 인해 망간의 연동 연구는 매우 중요한 연구과제이다. 따라서 인터넷 서비스의 QoS보장이나 고속의 서비스를 경계적으로 제공하기 위해 DiffServ망과 MPLS망 연동에 대한 연구는 필수적으로 이루어져야 한다. 이를 위해 본 논문에서는 DiffServ망과 MPLS망에서 QoS 제공을 위한 요소들을 분석하고, 이를 바탕으로 DiffServ와 MPLS망간 연동 프로토콜을 설계하고 검증하였다.

An enhanced signcryption protocol for providing for providing forward secrecy (전방 비밀성을 제공하는 개선된 Signcryption 프로토콜)

  • 이경현;조현호;이준석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7C
    • /
    • pp.653-663
    • /
    • 2002
  • The signature-then-encryption based on RSA scheme provides forward secrecy, but requires 4 modulo exponentiation operations in total, and the signcryption scheme proposed by Zheng simultaneously fulfills both the functions of digital signature and symmetric key encryption in a logically single step, and with a computational cost significantly smaller than that required by the current standard signature-then-encryption, but it can not provide forward secrecy. In this paper, we propose an enhanced signcryption scheme which can provide forward secrecy with lower computational cost and lower communication overhead comparing with those of the signature-then-encryption based on RSA, and with a similar communication overhead of Zheng's scheme. The proposed scheme can be also easily modified to the direct signature verification scheme by the recipient without using the recipient's private key. Additionally, we suggest a new design protocol with server-supported signatures which solves the CRLs(Certificate Revocation Lists) burden and provides non-repudiation of origin. This protocol with server-supported signatures also can be applied to the original signcryption scheme proposed by Zheng in order to improve security.

Design and Verification of Gateway for CC and SIP in Next Generation Mobile Communication Network (차세대 이동통신망에서 CC와 SIP 연동 게이트웨이의 설계 및 검증)

  • Kim, Hyeong-Kuk;Lee, Jeong-Jun;Jung, Woon-Young;Kim, Jeong-Hoon;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1353-1356
    • /
    • 2002
  • 차세대 이동통신망(IMT-2000 : International Mobile Telecommunication-2000)에서는 기존 통신망에서 제공하는 기능을 그대로 제공하면서 여러 향상된 기능을 제공하는 형태로 개발되고 있으며 기존 망 구조를 적절히 수용하면서 현재 제공하고 있는 음성 서비스를 수용할 수 있는 경제적이고 효율적인 통신망의 구축이 필요하다. 그러므로 음성과 데이터의 통합 및 서비스를 제공하는 IP 망에서의 음성 서비스와 차세대 이동통신망과의 연동게이트웨이 개발은 필수적이다. 따라서 본 논문에서는 차세대 이동통신망의 CC(Call Control)와 IP 망의 SIP(Session Initiation Protocol)를 이용한 연동 프로토콜을 설계를 하고 검증하였다.

  • PDF

The Design and Verification of Multicast Key Distribution Protocol for Group Communication (그룹 통신을 위한 멀티캐스트 키 분배 프로토콜 설계 및 검증)

  • 김봉한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.31-42
    • /
    • 2000
  • 특성 사용자 그룹에게만 음성과 영상 데이터를 전송할 수 있는 통신 메커니즘을 가진 멀티캐스트는 유니캐스트와 비교해서 통신 링크의 수가 상당히 많으므로 부당한 공격자로부터 신분위장 서비스 부인 공격과 재전송 공격 부인, 트래픽 관찰 공격을 받기가 쉽다. 그러므로 본논문에서는 현재 멀티캐스트 통신을 위해서 제안 및 사용되고 있는 여러 가지 멀티캐스트 라우팅 프로토콜 중에서 보다 효율적인 보안 체계를 구성할 수 있는 공유 트리를 기반으로 하는 코어 기반 트리(CBT: Core Based Tree)를 이용하여 3개로 구성된 그룹키 KEK TEK을 획득함으로서 안전한 멀티캐스트 통신이 가능한 키 분배 프로토콜을 설계하였다 그리고 패트리넷을 이용하여 안전성을 검증하였다.

Efficient multi-hop relay transmission on sensor network (센서 네트워크 기반 효율적인 멀티 홉 릴레이 전송)

  • Kwon, Tai-Gil;Kim, Do-Hoon;Won, Hui-Chul;Hwang, Kyu-Sung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we consider an efficient protocol for the multi-hop relay transmission on a sensor network which can be utilized in a ubiquitous environment. More specifically, we propose an efficient relaying protocol for the distance and position recognition on the proposed sensor network which performs with the differentially bi-orthogonal chirp spread spectrum (DBO-CSS) in the industrial, scientific and medical (ISM) bands. For an efficient networking access, we design and implement four different packet structures, zone information packet, hop information packet, tag information packet, and application serial packet. Additionally, we also propose an efficient position recognition algorithm. Finally, for verification of our proposed protocol's efficiency, we build the testbed system which consists of $15m{\times}15m$ multi-cell and 10 hops in the network.

Design of An Fair Non-Repudiation Protocol Using Digital Signature Recorder (전자서명 기록기를 이용한 공정한 부인방지 프로토콜의 설계)

  • Lee, Yong-Joon;Oh, Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1345-1351
    • /
    • 2004
  • Due to the overwhelming importance the Internet gained nowadays, more and more sophisticated security services are requested. However many applications such as Internet Banking, Home Trading System, Electronic Medical Recede, electronic commerce, etc. are related to non-repudiation. Non-repudiation services are one of these new security requirements. ill comparison to other security issues, such as privacy or authenticity of communications, non-repudiation has not been studied intensively. Informally, we say that a protocol is fair if at the end of the protocol execution either originator receives a non-repudiation of receipt evidence and recipient receives a non-repudiation of origin evidence or none of them receives any valid evidence. The most non-repudiation protocols rely on a trusted third party(TIP) that has to intervene during each protocols run. the TIP may create a communication bottleneck. ill this paper, we suggest the digital signature recorder that guarantees fairness logically and supplies minimal network bottleneck to be composed verification server physically.

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Research Design for the Verification of Constitutional Prescription Determinants (체질처방 결정요인 확인을 위한 연구설계)

  • Jin, Hee-Jeong;Kim, Sang-Hyuk;Baek, Young-Hwa;Jang, Eun-Su;Ryu, Jong-Hyang;Lee, Si-Woo
    • Journal of Sasang Constitutional Medicine
    • /
    • v.27 no.2
    • /
    • pp.222-230
    • /
    • 2015
  • Objectives The purpose of this study is to design a research to find clinical factors involved in the decision-making process for determining the constitutional prescription based on prospective clinical data. Methods We have created a draft of the case report form. Therefore, seven constitutional experts was interviewed for additional items to be important used to determine the constitutional prescription in clinic. Interviews were done from December 2012 to March 2014, experts per person 2-3 times, took time of about 120 minutes per interview. Since then, we developed the final case report form through the expert meeting. At the same time, the developing the electronic case report form (eCRF) and the protocol to collect constitutional treatment cases was also discussed. Results & Conclusions The items of the case report form were subject general, lifestyle, health measurement, record of expert, prescription and evaluation after medication. The part of the clinical symptoms of the record of expert allowed to be recorded in the 5-point scale for the collection of quantitative data as much as possible. Assuming a re-visit of the patient, if necessary, twice the recording were to be possible. At the same time, the eCRF and the protocol to collect constitutional treatment cases were also developed. In this study, it will be able to more objectively standardize the medical decision making process that the experts of constitutional prescription decision. As a result, it will be possible to provide the standardized constitutional medical services.

Development of Versatile CAM System (PosCAM) Supporting CNC Shop Floor Operation (CNC Shop Floor 조업지원용 다능형 CAM시스템 (PosCAM) 개발)

  • 서석환;지우석;김성구;홍희동;조정훈;정대혁;김창남
    • Korean Journal of Computational Design and Engineering
    • /
    • v.4 no.4
    • /
    • pp.339-349
    • /
    • 1999
  • The punose of this paper is to introduce the comprehensive CAM system (called PosCAM) supporting various function requested from shop floor operators. PosCAM is comported of two subsystems (PosCAM I and PosCAM II) which are designed to make up for the contemporary CAD/CAM systems. PosCAM I is mainly for : a) verifying the part programs written in both custom macros and standard G-codes, b) enhancing machining productivity and quality with built-in cutting conditions and feedrate optimization algorithm. PosCAM II is for : a) efficiently managing the numerous part programs and tool data stored in CNC memory, and b) integratively controlling and monitoring various CNCs from the control center through RS-422 with DNC 2 protocol. The developed systems have been tested via various experiments, and can be Applied for the industrial CNC machine shop as a means for enhancing productivity. The PosCAM system has been implemented and successfully used in the Machine Shop Department of PosCAM since march 1998.

  • PDF

A design of HomePNA2.0 PHY. (10Mbps급 HomePNA2.0 PHY. 회로 설계)

  • 박성희;구기종;김종원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1282-1287
    • /
    • 2002
  • In this Paper, we present the design of 10Mbps HomePNA(Home Phoneline Networking Alliance) PHY which is Home Network Technology using phone-line. It is connected with external interface through MII(Media Independent Interface) and AFE(Analog Front End) Interface. 10Mbps HomePNA PHY is composed with Management Block IEEE 802.3 CSMA/CD MAC(Media Access Control) Block Modulator block and Demodulator block. For their verification, we designed a prototype FPGA PCB board using XPC860T made in Motorola. We verified HomePNA frame data transmission using a driver program based Linux kernel. we verified rate negotiation by HomepNA 2.0 Link Layer Protocol.