• Title/Summary/Keyword: ProtocolMonitoring

Search Result 748, Processing Time 0.024 seconds

An Efficient Energy Usage of Wireless Sensor Network (무선 센서 네트워크에서 에너지의 효율적 사용방법)

  • Oh, Se-Jun;Hur, Sun;Lee, Gun-Woo
    • IE interfaces
    • /
    • v.23 no.2
    • /
    • pp.108-117
    • /
    • 2010
  • Wireless sensor network may be installed where it is hard to access or where one has to constantly gather data without any human's monitoring. Sensors which compose a sensor network are usually small with poor battery capacities and thus energy-efficient usage is very important because of difficulties in replacing or recharging the batteries to make the lifetime of the whole sensor network longer. LEACH protocol, a well-known hierarchical routing protocol, may resolve this problem by distributing the role of cluster header evenly to the sensor nodes in the whole area of network at each round. In this thesis, we introduce a variant of LEACH protocol which considers the distance between base station and sensors in the way that if a node is far from the base station then the probability that this node becomes a cluster header is low. Experiments to evaluate the energy efficiency and the ability to collect the information show that the proposed method in this paper has maintained much wider sensing area while keeping the energy efficiency same as LEACH.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

Performance Analysis of a Media Access Control Protocol for Magnetic Field Communication (자기장 통신을 위한 매체 접근 제어 프로토콜의 성능분석)

  • Jeong, Eui-Hoon;Won, Yun-Jae;Kim, Sun-Hee;Lim, Seung-Ok;Bang, Young-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5A
    • /
    • pp.464-472
    • /
    • 2011
  • As wireless sensor networks are applied to various applications such as environment monitoring and disaster sensing system, there are increased needs for wireless communication in underground environment. Since the previous wireless communication technology using electromagnetic wave is not appropriate for the underground environment, a new alternative is required. Recently a magnetic field communication technology has been proposed and standardized as a domestic KS standard. In this paper, we analyze the media access control protocol of the KS standard by an analysis and a simulation study.

A Study on the Introduction of an International Communication Protocol(DATEX-ASN) to Traffic Control System in Korea (ITS센터 간 국제통신규격(DATEX-ASN)을 신호시스템에 도입하는 방안에 대한 연구)

  • Ko, Kwang-Yong;Lee, Seung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.3
    • /
    • pp.138-152
    • /
    • 2007
  • A communication system based on DATEX-ASN, an international communication protocol for use in COSMOS, a real-time traffic responsive signal system of Seoul, was developed in this study. Through laboratory experiments, it was identified that some additional rules were necessary for its successful application to COSMOS and thus proper complementary rules were devised. Laboratory experiments were to measure error-rates of monitoring information packet, EOC duration and operating cycle-length errors at different data transmission rates and the results of each experiment were compared each other. The results show that the DATEX-ASN protocol requires a transmission rate of at least 9,600bps which is higher than a transmission rate of 4,800bps required by NTCIP.

  • PDF

An Efficient Hybrid Lighting Management System Implementation on Multi Protocol (다중 프로토콜 기반의 효율적인 하이브리드 조명관리 시스템 구현)

  • Hong, Sung-Il;Lin, Chi-Ho
    • Journal of IKEEE
    • /
    • v.17 no.4
    • /
    • pp.550-558
    • /
    • 2013
  • In this paper, we propose an efficient hybrid lighting management system implementation on multiple protocol. The proposed hybrid lighting management system was implemented by configured as the data display part for management and control of lighting device and the data conversion-processing part the communication part of gateway. The data were designed the DB to enable to storage in real-time, and implemented able to manage by real time wireless remote control and schedule setting. The proposed an efficient hybrid lighting management system, it was possible the real-time monitoring and remote lighting control by peristalsis with smart devices and portable PC etc., and it could be obtained reduction effect of energy and electricity, communication cost.

Intelligent Motor Control System Based on CIP (CIP 기반의 지능형 전동기 제어 시스템)

  • Kim, On;Choi, Seong-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.307-312
    • /
    • 2020
  • This paper proposed intelligent motor control system that replaced smart motor devices, such as motor protection relays, smart circuit breakers and variable speed drives, with one integrated module to perform efficient motor control at industrial sites. The proposed intelligent motor control system provides easy monitoring of critical data for each motor or load connected to an intelligent motor control system over a CIP(Common Industrial Protocol)-based network, which enables accurate process control at all times, real-time access to fault information and records to simplify diagnosis and minimize equipment downtime.

Enhanced Communication Transport Protocol: Implementations and Experimentations (ECTP 멀티캐스트 전송 프로토콜: 구현 및 성능분석)

  • Park, Ki-Shik;Park, Juyoung;Koh, Seok-Joo;Jo, In-June
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.876-890
    • /
    • 2003
  • This paper proposes a protocol for the reliableand QoS-aware multicast transport, which is called the Enhanced Communications Transport Protocol (ECTP). The ECTP has so far been developed and standardized in ITU-T SG17 and ISO/IEC JTC 1/SC 6. Differently from the conventional reliable multicast, as shownin the IETF RMT WG, the ECTP additionally provides several distinct features such as tight control of multicast session, tree-based error control, and QoS management. For the tight control of multicast connections, the sender is at the heart of one-to-many group communications, and it is responsible for overall connection management such as connection creation/termination, pause/resumption, and the join and leave operations. for tree-based reliability control, ECTP configures a hierarchical tree during connection creation. Error control is performed within each local group defined by a control tree, which was partly designed like the IETF TRACK approach. Each parent retransmits lost data in response to retransmission requests from its children. For QoS management, ECTP supports QoS negotiation for resource reservation, and it also provides QoS monitoring and maintenance operations. ECTP has been implemented and tested on Linux machine, along with Application Programming Interfaces based on Berkeley sockets. For basic testing of the ECTP functionality, we give some preliminary experimental results for performance comparison of ECTP and TCP unicast transports. In conclusion, we describe the status of ECTP experimentations over APAN/KOREN testbed networks

Remote robot system using Internet server (인터넷 서버 기반의 원격 로봇 시스템)

  • Lee, Tae-Hee;Cho, Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1434-1441
    • /
    • 2003
  • Recent technological advances in utilization and generalization of Internet have overcome some of the limitations of remote robot control range and real-time monitoring system. However, It needs Embedded system with control protocol or hardware which has avility to port the micro realtime operating system in robot control system communicate with remote controlled robot, because those system use the wireless LAM or Bluetooth as a network media. In this paper, we design and implement the wireless MODEM protocol and install it to the server system. Also, we implement a client system could control the remote robot through the server and we assure that this protocol and client/server system ate suitable for small size remote control system based on Internet.

An Intrusion Detection Method by Tracing Root Privileged Processes (Root 권한 프로세스 추적을 통한 침입 탐지 기법)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.239-244
    • /
    • 2008
  • It is not enough to reduce damages of computer systems by just patching vulnerability codes after incidents occur. It is necessary to detect and block intrusions by boosting the durability of systems even if there are vulnerable codes in systems. This paper proposes a robust real-time intrusion detection method by monitoring root privileged processes instead of system administrators in Linux systems. This method saves IP addresses of users in the process table and monitors IP addresses of every root privileged process. The proposed method is verified to protect vulnerable programs against the buffer overflow by using KON program. A configuration protocol is proposed to manage systems remotely and host IP addresses are protected from intrusions safely through this protocol.

Study on Providing Anonymity of HTTPS Web Site Blocking (HTTPS 웹 사이트 차단의 익명성 제공 방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.53-59
    • /
    • 2019
  • As the number of harmful sites increases, many social problems are occurring. Therefore, in order to solve this problem, the government is carrying out activities to block access to web sites to harmful sites based on the law. However, due to the change from HTTP to HTTPS protocol, it has become difficult to block the harmful sites in the existing method. In the existing HTTP protocol, a method of blocking the site corresponding to the harmful site domain list by utilizing the DNS information was used. However, due to the generalization of HTTPS, it is difficult to block the harmful sites in the existing method. Therefore, the ISP uses the method of blocking the website using the SNI field in the TLS (Transport Layer Security) Handshake protocol used for HTTPS. However, since the method using SNI field raises the concern of monitoring Internet users or exposing information about connected sites, in this paper, we proposed method which can support anonymity to Internet users while blocking harmful sites. The suggested method also can support integrity and source authentication to the transmitted data.