• 제목/요약/키워드: Sender

검색결과 466건 처리시간 0.021초

XML 전자서명을 이용한 XML/EDI 시스템 보안에 관한 연구 (A Study on XML/EDI System Security using XML Signature)

  • 이경록;서장훈;박명규
    • 대한안전경영과학회지
    • /
    • 제4권1호
    • /
    • pp.57-68
    • /
    • 2002
  • As Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to change and WEB EDI, E-Mail EDI, FTP EDI etc. which are based on the internet appeared. These days the XML/EDI which has XML document appeared. The XML/EDI consider advantages and disadvantages of VAN/EDI and EDI which based on the internet. Also, EDI system has to assure a safe exchange between sender and receiver. But, the internet has security problems because it uses a open TCP/IP protocol. Although there are many methods for security, it is being studied with XML concept. On this paper, we will suppose the XML/EDI system model with XML Signature, and build a procedure of electronic signature and delivery of document between sender and receiver.

코드 업데이트 프로토콜에서 에너지 잔존량에 따른 노드선정 기법 (Energy-Aware Node Selection Scheme for Code Update Protocol)

  • 이승일;홍원기
    • 대한임베디드공학회논문지
    • /
    • 제5권1호
    • /
    • pp.39-45
    • /
    • 2010
  • As wireless sensor network are being deployed in a wide variety of application areas, the number of sensor nodes in a sensor filed becomes larger and larger. In the past, ISP (In-System Programming) method have been generally used for code update but the large number of sensor nodes requires a new code update method called network reprogramming. There are many challenging issues for network reprogramming since it can make an impact on the network lifetime. In this paper, a new sender selection scheme for network reprogramming protocol is proposed to decrease energy consumption for code update by minimizing overlapped area between sender nodes and reducing data contention. Simulation results show that the proposed scheme can reduce the amount of message traffic and the overall data transmission time.

The study of preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient

  • Kim, Hyun-Ji;Kang, Jung-Ae;Lee, Sang-Soo
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권9호
    • /
    • pp.57-63
    • /
    • 2016
  • The purpose of the study is to investigate the preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient. Results show that women mostly prefer to use dynamic and imaged emoticon than men. However, the preference of using text messages increases when both men and women express uncomfortable emotion. Especially, when users send family messages, they tend to prefer for text message. And when users send close friends messages, the preference for dynamic and imaged emoticon is high. When users send distant friends messages, the similar tendency is shown regardless of emotion. These results can provide the information to use emoticon in the filed of education and take advantage in digital education and mobile education.

Group Key Agreement From Signcryption

  • Lv, Xixiang;Li, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3338-3351
    • /
    • 2012
  • There is an intuitive connection between signcryption and key agreement. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. In this paper, we present a primary approach for constructing an authenticated group key agreement protocol from signcryption. This approach introduces desired properties to group key agreement. What this means is that the signcryption gives assurance to a sender that the key is available only to the recipient, and assurance to the recipient that the key indeed comes from the sender. Following the generic construction, we instantiate a distributed two-round group key agreement protocol based on signcryption scheme given by Dent [8]. We also show that this concrete protocol is secure in the outsider unforgeability notion and the outsider confidentiality notion assuming hardness of the Gap Diffie-Hellman problem.

무선 센서 네트워크에서 에너지 효율적이고 멀티미디어 트래픽에 적합한 MAC 프로토콜 (Energy Efficient and Multimedia Traffic Friendly MAC Protocol in Wireless Sensor Networks)

  • 김성철;김혜윤;김중재
    • 한국멀티미디어학회논문지
    • /
    • 제19권8호
    • /
    • pp.1460-1465
    • /
    • 2016
  • In this paper, we propose an energy efficient and multimedia traffic friendly MAC protocol (EEMF-MAC) that controls sender's wakeup period based on the data packet's transmission urgency and the receiver's wakeup periods based on the received data packet traffic loads. The protocol is useful for applications such as object tracking, real time data gathering, in which priority-based packet transmission is required. The basic idea of EEMF-MAC is that it uses the priority concept with transmission urgency of sender's data packet to reduce the transmission delay of the urgent data and it also uses duty cycling technique in order to achieve energy efficiency. EEMF-MAC showed a better performance in energy efficiency and packet transmission delay compared to existing protocols, RI-MAC and EE-RI-MAC.

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • 제43권3호
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.

무선 센서 네트워크 에서 에너지 효율적인 싱크노드 기반 MAC 프로토콜 (SB-MAC : Energy efficient Sink node Based MAC protocol for Wireless Sensor Networks)

  • 전준헌;김성철
    • 한국정보통신학회논문지
    • /
    • 제18권1호
    • /
    • pp.177-182
    • /
    • 2014
  • 본 논문에서는 무선 센서 네트워크에서 에너지 효율적인 싱크노드 기반의 MAC 프로토콜을 제안한다. 본 논문에서 제안되는 싱크 노드 기반 MAC 프로토콜(Sink node-Based MAC: SB-MAC)은 송신자 노드의 에너지 소모를 줄이고 전송 지연을 감소시키기 위해 RB (rapid beacon) 프레임이 사용된다. RB 프레임은 IEEE 802.15.4의 비콘 프레임의 수정된 형태이다. RB 프레임에 포함된 전송 노드의 데이터 길이 정보를 이용하여, 데이터 전송에 참여하지 않는 다른 노드들이 오랫동안 sleep 모드에 머물게 함으로써 에너지 소모를 줄일 수 있다. 이를 통하여 기존의 X-MAC 및 RI-MAC 프로토콜들에 비해 데이터 전송 지연 및 에너지 소모 면에서 더 좋은 성능을 가진다. SB-MAC 프로토콜은 하나의 싱크노드와 다수의 송신 노드들로 구성되어 있는 네트워크 환경에 에너지 효율적인 프로토콜이다.

온라인 구전정보특성이 정보수용의도와 재구전 의도에 미치는 영향에 관한 연구: 수신자의 전문성을 중심으로 (Study on the Influence of Online WOM Information Characteristics on the Intention of Information Acceptance and also Re-WOM: Focused on the Receiver's Expertis)

  • 김지숙;권혁기
    • 한국산업정보학회논문지
    • /
    • 제21권6호
    • /
    • pp.81-93
    • /
    • 2016
  • 본 연구는 구전정보 수용에 영향을 미칠 수 있는 발신자의 전문성, 구전정보의 생생함과 동의성을 고려하여 온라인 구전정보특성이 구전정보 확산에 미치는 영향관계가 수신자의 전문성 수준에 따라 어떻게 차이가 나는지 확인하고자 실증 분석하였다. 분석결과 첫째, 발신자의 전문성이 높고 구전정보가 생생하고 동의성이 높을수록 정보수용의도에 긍정적인 영향을 미치는 것으로 나타났다. 둘째, 정보수용의도가 재구전의도에 긍정적인 영향을 미치는 것으로 나타났다. 셋째, 수신자의 전문성 수준은 온라인 구전정보 특성이 정보수용의도에 미치는 영향력을 조절하는 것으로 나타났다.

남녀 청소년의 성역할 정체감과 양성평등의식 (Gender Role Identity and Egalitarianism Consciousness among Adolescents)

  • 김영숙;정복례
    • 지역사회간호학회지
    • /
    • 제18권2호
    • /
    • pp.310-319
    • /
    • 2007
  • Purpose: This study intends to investigate gender role identity and egalitarianism consciousness among adolescents and to determine the relationship between the two factors. Method: Data were collected from 376 middle and high school students in U City. Tools used were the Korean Sexual Role Identity (Kim, J. H., 2005) and the Gender Egalitarianism Consciousness among Adolescents (Kim, 2002). Data were analyzed using SPSS 12.0 for t-test, one-way ANOVA and Pearson correlation coefficient. Results: There was no significant difference between boys and girls in sender role identity. Boys' gender role identity was different according to school grade (t=-3.19, p= .00), frequency of mother's hugging (t=-2.28, p= .02) and girls' according to religion (t=-2.24, p= .03) mother's job (F=3.59, p= .02), father's education level (F=3.20, p= .04), mother's education level (F=3.24, p= .04), family harmony (F=7.28, p= .00), and frequency of mother's hugging (t=-2.41. p= .02). There was significant difference in egalitarianism consciousness according to sender (t=-12.70. p= .00) Boys' egalitarianism consciousness was different according to school type (t= .02, p= .00) and father's education level (F=4.97, p= .02), and girls' according to school grade (t=-4.21 p= .00), school type (t=-3.12, p= .00), father's level of education (F=3.78. p= .02), decision maker of important domestic matter (F=4.95, p= .00) and frequency of mother's hugging (t=2.53, p= .01). In Girls, sexual role identity and sender egalitarianism consciousness were significantly correlated with each other (r= .01, p= .04). Conclusion: Through the study, it was found that boys' concern for sexual equality of was remarkably lower than girls. Therefore, it is necessary to offer curriculums for boys and to start social education for parents.

  • PDF

I-TCP를 위한 이동성 지원 라우터에서의 버퍼 오버플로우 방지 (Prevention of Buffer Overflow in the Mobility Support Router for I-TCP)

  • 김창호;최학준;장주욱
    • 한국정보과학회논문지:정보통신
    • /
    • 제31권1호
    • /
    • pp.20-26
    • /
    • 2004
  • I-TCP의 이동성 지원 라우터(MSR)의 버퍼가 넘치는 현상을 방지하기 위한 혼잡제어 알고리즘을 제안한다. 무선망 환경에서의 높은 비트 오류율와 잦은 핸드오프로 인해 유ㆍ무선이 혼재된 네트워크에서의 TCP Reno의 혼잡제어 방식은 유선으로만 이루어진 네트워크에서 보다 낮은 전송률을 보인다. 이를 해결하기 위해 하나의 TCP 연결을 유선과 무선부분 각각 두개의 TCP 연결로 나누어 처리하는 I-TCP가 제안되었다. 그러나 무선망의 비트 오류가 과다하게 발생하거나 핸드오프가 빈번하면 이동성 지원 라우터의 버퍼가 넘치는 현상이 발생할 수 있다. 이것은 MSR이 송신자에게 해달 ack를 보낸 패킷(MSR 버퍼에 있는)들이 수신자에게 전송되지 못하는 결과를 초래하여 TCP의 end-to-end semantic를 위반하게 된다. 본 논문에서는 송신자와 MSR 사이에 “흐름 제어” 기법을 도입하여 이동성 지원 라우터의 버퍼가 넘치는 현상을 방지하였다. 송신자와 MSR 사이의 advertised window를 MSR 버퍼의 남은 공간과 연동하여 MSR의 버퍼가 넘치기 전에 MSR로 전송되는 패킷의 양을 조절할 수 있다.