• Title/Summary/Keyword: Sending Message

Search Result 162, Processing Time 0.029 seconds

A Study on Internet Emergency Alert Distribution System Adaptive to the Receiver Characteristics (인터넷 기반의 수신자 맞춤형 재난경보 전달시스템 연구)

  • Ahn, Soyoung;Jeon, Inchan;Kim, Jihee;Lee, Yong Tae;Choi, Seong Jong
    • Journal of Broadcast Engineering
    • /
    • v.20 no.4
    • /
    • pp.598-605
    • /
    • 2015
  • Effective alerts will drastically mitigate the disaster impacts. One way to enhance the effectiveness is to prepare multiple alert distribution channels. In this paper, we propose a new emergency alert distribution system that will solve the weaknesses of the current distribution systems, such as Cell Broadcasting System and T-DMB Automatic Emergency Alert Service. The weaknesses are: the limitation of message length, small portions of terminals that can receive and display the alert signal, and one-way communication service. To solve these problems, we propose an emergency alert distribution system over the Internet with RSS (Rich Site Summary) format. The system also has the capability of adaptive alert filtering according to the receiver characteristics. We analyzed the characteristics of RSS as an alerting format, and draw functional requirements satisfying use case scenarios. We designed the system only with major requirements and verified it on our test bed. Sending richer message contents through various receiving terminals, the system will achieve more effective emergency alert service.

Design 5Q MPI Hardware Unit Supporting Standard Mode (표준 모드를 지원하는 5Q MPI 하드웨어 유닛 설계)

  • Park, Jae-Won;Chung, Won-Young;Lee, Seung-Woo;Lee, Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.59-66
    • /
    • 2012
  • The use of MPSoC has been increasing because of a rise of use of mobile devices and complex applications. For improving the performance of MPSoC, number of processor has been increasing. Standard MPI is used for efficiently sending data in distributed memory architecture that has advantage in multi processor. Standard In this paper, we propose a scalable distributed memory system with a low cost hardware message passing interface(MPI). The proposed architecture improves transfer rate with buffered send for small size packet. Three queues, Ready Queue, Request Queue, and Reservation Queue, work as previous architecture, and two queues, Small Ready Queue and Small Request Queue, are added to send small size packet. When the critical point is set 8 bytes, the proposed architecture takes more than 2 times the performance improvement in the data that below the critical point.

A study on the Improvement of Fairness of DQDB Network (DQDB 망에서 공정성 개선에 관한 연구)

  • 박종재;조영창;강상욱
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.237-246
    • /
    • 2001
  • In this paper we introduce a solution to improve the unfairness problem and to remove the waste of bandwidth in the distributed queue dual bus system. This solution requires only a minor modification of the current protocol and further shows no bandwidth wastes when we try to resolve the unfairness problem occurred in current DQDB protocol. There has been many problem in DQDB system in terms of fairness of sending message in each node. In order to solve this problem, Bandwidth Balancing technic and proportional assignment technic have been introduced. It is, however, to note that the waste of bandwidth problem is still existing in those technics, even though there has been significant improvement as to the fairness problem. In this paper we introduce a new solution to remove the waste of bandwidth problem while we are still obtaining the improved fairness of the network. By following this new solution, the simulation result shows higher throughput and lower message delay than previously proposed technics.

  • PDF

Adaptive Hangul Steganography Based on Chaotic Encryption Technique (혼돈 암호화 기법에 기반한 적응된 한글 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.177-183
    • /
    • 2020
  • Steganography uses digital images as a medium for sending secret messages over insecure networks. There is also a least significant bit(LSB) that is a popular method of embedding secret messages in digital images. The goal of steganography is to securely and flawlessly transmit secret messages using stego media over a communication channel. There is a need for a method to improve resistance to reduce the risk of exposure to third parties. To safely hide secret messages, I propose new algorithms that go through crossing, encryption, chaos and concealment steps. After separating Hangul syllables into choseong, jungseong and jongseong, the bitwised message information is encrypted. After applying the logistic map, bitwised information is reconstructed using the position of the chaotic sequence. The secret message is inserted into the randomly selected RGB channel. PSNR and SSIM were used to confirm the effectiveness of the applied results. It was confirmed as 44.392(dB) and 0.9884, respectively.

QoS Support in the Air Defense Alternative System (방공작전 예비체계의 QoS 지원)

  • Sim, Dong-Sub;Lee, Young-Ran;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.903-909
    • /
    • 2010
  • ADAS is the air defense control system performing air surveillance and identification of ROK and near air. This system is self-developed by Air Force, currently operated successfully as the alternative system of MCRC. ADAS processes converting and combining transferred the real time radar data detected by radars. additionally, it displays significant radar data as producing in tracks. Then, it uses the message queue for IPC(Inter Process Communication). the various tactical data processed in the server is ultimately send to the network management process through the message queue for transmitting to the weapon director console. the weapon director receives this transmitted tactical data through the console to execute air defense operations. However, there is a problem that data packet is delayed or lost since the weapon Director does not receive as the amount of tactical data from the server overflowed with air tracks and missions increased. This paper improved the algorism to display and transmit the various tactical data processed from ADAS server to numbers of the weapon director console in the real time without any delay or lost. Improved the algorism, established at exercise, the development server in the real operation network and the weapon director console, is proved by comparing the number of sending tactical data packets in the server and receiving packets in the weapon director.

Requirement Analysis of Korean Public Alert Service using News Data (뉴스 데이터를 활용한 재난문자 요구사항 분석)

  • Lee, Hyunji;Byun, Yoonkwan;Chang, Sekchin;Choi, Seong Jong
    • Journal of Broadcast Engineering
    • /
    • v.25 no.6
    • /
    • pp.994-1003
    • /
    • 2020
  • In this paper, we investigated the current issues on the KPAS(Korean Public Alert Service) by News analysis. News articles, from May 15, 2005 to April 30, 2020, were collected with the key word of 'KPAS' through the News Big-Data System provided by the Korea Press Foundation. The results of the content analysis are as follows. First, the issues on alert presentation were categorized by alarm sound, message content, alert level, transmission frequency, delay, reception range, time of alert, and language. Issues on inability to receive KPAS messages were categorized into authority, mobile, sending standard, mobile communication infra, etc. For the last two to three years, news on the inability issues had decreased, while news on the presentation issues had increased. This tells us that the public demand for improvement in the KPAS lies in the presentation issues. The demand for societal resolutions to the presentation issues especially on message content, transmission frequency, and reception range has soared.

Performance Enhancement Scheme for RR Protocol in MIPv6 (MIPv6에서 RR프로토콜 성능개선 방안)

  • 이달원;황일선;손승원;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.49-56
    • /
    • 2004
  • An Internet draft, named RR(Return Routability) protocol, proposed to IETF mobileip WG, in order to establish an optimal path to MN(Mobile Node) by securely sending the BU(Binding Update) message to CN(Correspondent Node). However, it has some problems with initiating the protocol by the MN: it causes to increases in communication load in the home network, to increases communication delay between MN and CN, and increases in communication load due to unnecessary message exchanges. To resolve the problems, this paper proposes an alternative scheme for the RR protocol in MIPv6. The proposed scheme is devised to start the protocol by HA on receiving the first packet from CN. It decreases the route optimization overhead by reducing the number of BU messages as well as the communication time. Beside these advantages, this scheme provides the same security grade as the original RR protocol.

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

Assessment of Position Degradation Due to Intermittent Broadcast of RTK MSM Correction Under Various Conditions

  • Yoon, Hyo Jung;Lim, Cheol soon;Park, Byungwoon
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.3
    • /
    • pp.237-248
    • /
    • 2020
  • GNSS has been evolving dramatically in recent years. There are currently 6 GNSS (4 GNSS, AND 2 RNSS) constellations, which are GPS (USA), GLONASS (Russia), BeiDou (China), Galileo (EU), QZSS (Japan), and IRNSS (India). The Number of navigation satellites is expected to be over 150 by 2020. As the number of both constellations and satellites used for the improvement of positioning performance, high accuracy, and robustness of precise positioning is more promising. However, a large amount of the correction messages is required to support the augmentation system for the available satellites of all the constellations. Since bandwidth for the correction messages is generally limited, sending or scheduling the correction messages might be a critical issue in the near future. In this study, we analyze the relationship between the size of the bandwidth and Real-Time Kinematics (RTK) performance. Multiple Signal Messages (MSM), the only Radio Technical Commission for Maritimes (RTCM) message that supports multi-constellation GNSS, has been used for this assessment. Instead of the conventional method that broadcasts all the messages at the same time, we assign the MSM broadcasting interval for each constellation in 5 seconds. An open sky static and dynamic test for this study was conducted on the roof of Sejong University. Our results show that the RTK fixed position accuracy is not affected by the 5-second interval corrections, but the ambiguity fixing rate is degraded for poor DOP cases when RTK correction are transmitted intermittently.

Remote Login Authentication Scheme based on Bilinear Pairing and Fingerprint

  • Kumari, Shipra;Om, Hari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4987-5014
    • /
    • 2015
  • The bilinear pairing, also known as Weil pairing or Tate pairing, is widely used in cryptography and its properties help to construct cryptographic schemes for different applications in which the security of the transmitted data is a major concern. In remote login authentication schemes, there are two major requirements: i) proving the identity of a user and the server for legitimacy without exposing their private keys and ii) freedom for a user to choose and change his password (private key) efficiently. Most of the existing methods based on the bilinear property have some security breaches due to the lack of features and the design issues. In this paper, we develop a new scheme using the bilinear property of an elliptic point and the biometric characteristics. Our method provides many features along with three major goals. a) Checking the correctness of the password before sending the authentication message, which prevents the wastage of communication cost; b) Efficient password change phase in which the user is asked to give a new password after checking the correctness of the current password without involving the server; c) User anonymity - enforcing the suitability of our scheme for applications in which a user does not want to disclose his identity. We use BAN logic to ensure the mutual authentication and session key agreement properties. The paper provides informal security analysis to illustrate that our scheme resists all the security attacks. Furthermore, we use the AVISPA tool for formal security verification of our scheme.