• Title/Summary/Keyword: Protocol Integration

Search Result 262, Processing Time 0.025 seconds

A Design of Protocol for Credit Card Transaction on PDA Using ECC (타원곡선 암호를 이용한 PDA 기반의 신용카드 결제 프로토콜 설계)

  • Yu, Seong-Jin;Kim, Seong-Youl;Youn, Chun-Kyun;Chung, Il-Yong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1033-1040
    • /
    • 2003
  • In order to provode information services on M-Commerce, a payment solution with security function should be required. User's mobile terminals for using M-Commerce services are diversifying to cellular phone, PDA, Smart phone etc. Among them, intergration of PDA's interface and mobile connection overcomes the weak point of existing cullular phone depending on information via the internet. In this paper, the protocol for a credit card transaction on PDA using ECC is presented. Secure Card module on this protocol encrypts user's information such as private information, delivery information and credit card information and store them on PDA in order to free from inputting information whenever it is used. This scheme also offers security services on M-Commerce including authentication, confidentiality, integration, non-repudiation and so on.

A study on implementation of software development environment for SDL (통신 프로토콜 명세 언어 SDL을 위한 소프트웨어 개발 환경 구현)

  • Choe, Yeong-Han;Kim, Seong-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1522-1533
    • /
    • 1996
  • This paper presents a programming environment for the edition and verification of specification language SDL. It is implemented in the Concerto software factory, which has been as a support for the development of real size software. Concerto is a software factory designed for application development in the fields of computer communication protocols or real time system. It offers various kinds of tools to produce software, organize this production and automate it. Concerto allows a smooth integration of various formalism such as the C and $C^{++}$, languages, structured documentation, HOOD methodology (Hierarchical Object Orient Design). In this paper, as an important tools in the process of communication protocol software development, we describe fist describe the principles of this environment, then we illustrate its application by means of a simple example, the Inres protocol. Moreover, we study how hypertext mechanism of Concert to create logical links between a protocol and its asscoiated service.

  • PDF

A Study on the RSVP_Proxy for Micro Mobility (마이크로 이동성 위한 RSVP_Proxy에 관한 연구)

  • 박승균;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9B
    • /
    • pp.774-782
    • /
    • 2003
  • Generally, in the Mobile IP technologies, the use of RSVP(Resource ReSerVation Protocol) is recommended in order to provide a mobile node real-time service. However, the handoff of a mobile node increases the registration delay, RSVP reservation delay and signalling overhead in the Mobile IP and RSVP interworking. Specially, the resource reservation on the path between a mobile node and a correspondent node is the duplicated reservation and then causes unnecessary creation of the signalling overhead and waste of the resource, since the majority of the path before handoff and after handoff is same. If the radius of a cell providing a wireless interface to a mobile node is small, the number of handoff will increase and also signalling overhead and duplicated resource reservation will increase. In this paper, we proposed the integration model of Cellular IP and RSVP with RSVP proxy scheme. Here, Cellular IP protocol minimizes registration delay, transfer delay, and loss by handoff in micro cell network, the RS VP proxy that minimizes the duplication of resource reservation prevents the path for RSVP session from change using the address for reservation of a mobile node. Proposed scheme was evaluated in comparison with the existing Mobile IP and RSVP interworking scheme using the probability of resource reservation fail to the radius of a cell and the handoff rate.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

A Study on The RFID/WSN Integrated system for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 RFID/WSN 통합 관리 시스템에 관한 연구)

  • Park, Yong-Min;Lee, Jun-Hyuk
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.31-46
    • /
    • 2012
  • The most critical technology to implement ubiquitous health care is Ubiquitous Sensor Network (USN) technology which makes use of various sensor technologies, processor integration technology, and wireless network technology-Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN)-to easily gather and monitor actual physical environment information from a remote site. With the feature, the USN technology can make the information technology of the existing virtual space expanded to actual environments. However, although the RFID and the WSN have technical similarities and mutual effects, they have been recognized to be studied separately, and sufficient studies have not been conducted on the technical integration of the RFID and the WSN. Therefore, EPCglobal which realized the issue proposed the EPC Sensor Network to efficiently integrate and interoperate the RFID and WSN technologies based on the international standard EPCglobal network. The proposed EPC Sensor Network technology uses the Complex Event Processing method in the middleware to integrate data occurring through the RFID and the WSN in a single environment and to interoperate the events based on the EPCglobal network. However, as the EPC Sensor Network technology continuously performs its operation even in the case that the minimum conditions are not to be met to find complex events in the middleware, its operation cost rises. Moreover, since the technology is based on the EPCglobal network, it can neither perform its operation only for the sake of sensor data, nor connect or interoperate with each information system in which the most important information in the ubiquitous computing environment is saved. Therefore, to address the problems of the existing system, we proposed the design and implementation of USN integration management system. For this, we first proposed an integration system that manages RFID and WSN data based on Session Initiation Protocol (SIP). Secondly, we defined the minimum conditions of the complex events to detect unnecessary complex events in the middleware, and proposed an algorithm that can extract complex events only when the minimum conditions are to be met. To evaluate the performance of the proposed methods we implemented SIP-based integration management system.

Design and Implementation of Public Web Services Analyzer (웹 서비스 분석기의 디자인과 구현)

  • Matai Janarbek
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.241-243
    • /
    • 2005
  • Web services (WS) present a new promising software technology, which provides application-to-application interaction. They are built on the top of existing web protocol and based on open XML standards. Web services are described using WSDL, and the UDDI is a integration directory provide registry of Web Services descriptions. WSDL provides information of Web Services but it is getting more and more important to know more than those provided by WSDL. From WSDL we can not get the information like usage of WS, performance of WS, complexity of WS, usability of WS with other web service. In this paper, we proposed a new method for Web Services so called Public Web Services Analyzer (PWSA). This technique is based on analyzing various public UDDI registries in order to get various kinds of statistics of web services. Those statistics will be used by both web services developers and consumers for finding them suitable services for their needs. PWSA guarantees that it can provide enough information to find right web services for both Web Services Consumers and Web Service Developers.

  • PDF

Privacy and Security Model for RFID Healthcare System in Wireless Sensor Network (무선센서네트워크 환경하에서 RFID 헬스 시스템을 위한 보안)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.439-441
    • /
    • 2012
  • The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.

  • PDF

Design and Implementation of KNX-ZigBee Gateway (KNX-ZigBee 게이트웨이의 설계 및 구현)

  • Lee, Woo-Suk;Hong, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.7
    • /
    • pp.720-729
    • /
    • 2011
  • The demand for wireless technology in home automation systems has recently been increasing due to several advantages such as installation cost reduction, easy placement, easy extension, aesthetic benefits, and mobile device connectivity. Among the many wireless technologies, ZigBee is one of the most useful for home automation; a wireless home networking system can be configured using ZigBee alone. Compatibility with conventional home networking systems that are based on wired media, however, is not supported. KNX is a mature protocol for wired media that is recognized as an international standard. This paper proposes a KNX-ZigBee gateway to interface between KNX and ZigBee systems and thereby enable integration of wired and wireless home automation systems.

The Design of Functional Class for SNMP/CMIP Integration Management Gateway System Using CORBA (CORBA를 이용한 SNMP/CMIP 통합관리 Gateway 시스템 구축을 위한 기능별 클래스 설계 방안)

  • 강미영;곽지영;강현철;남지승
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.93-96
    • /
    • 2000
  • The CMIP(Common Management Information Protocol) and SNMP(Simple Network Management Network) are the two major network management protocols, Which nee to be integrated. Since the networks need to be managed in a uniform way, the CORBA(Common Object Request Broker Architecture) NE View is to develop as a Standard in the ATM Forum For the TMN management structure to integrate these two protocols. In this paper, the function classes are defined to develop the gateway for efficient subnetwork management. The function classes are defined based on the analysis of EMS functions which are mainly network management design of the TMN structure. Also, the object models of the SMI)(Structure of Management Information) in SNMP and the GDMO(Guidelines for the Definition of Managed Objects) in CMIP are developed way direct translation and abstract translation. The integrated management system design, information model translation of EMS using classdefinition, is efficient is efficient method to interconnect CORBA/SNMP and CORBA/CMIP.

  • PDF