• Title/Summary/Keyword: Smart Packet

Search Result 140, Processing Time 0.026 seconds

Blockchain-Based Smart Home System for Access Latency and Security (지연시간 및 보안을 위한 블록체인 기반 스마트홈 시스템 설계)

  • Chang-Yu Ao;Kang-Chul Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.157-164
    • /
    • 2023
  • In modern society, smart home has become a part of people's daily life. But traditional smart home systems often have problems such as security, data centralization and easy tampering, so a blockchain is an emerging technology that solves the problems. This paper proposes a blockchain-based smart home system which consists in a home and a blockchain network part. The blockchain network with 8 nodes is implemented by HyperLeger Fabric platform on Docker. ECC(Elliptic Curve Cryptography) technology is used for data transmission security and RBAC(role-based access control) manages the certificates of network members. Raft consensus algorithm maintains data consistency across all nodes in a distributed system and reduces block generation time. The query and data submission are controlled by the smart contract which allows nodes to safely and efficiently access smart home data. The experimental results show that the proposed system maintains a stable average query and submit time of 84.5 [ms] and 93.67 [ms] under high concurrent accesses, respectively and the transmission data is secured through simulated packet capture attacks.

Packet Scheduling Scheme and Receiver-Based Recovery Scheme for MPTCP in Heterogeneous Networks (이종망에서 MPTCP를 위한 패킷 스케줄링 방법과 수신단 기반의 손실 복구 방법)

  • Oh, Bong-Hwan;Kim, Hanah;Lee, Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.975-983
    • /
    • 2012
  • Multi network interface has become common phenomenon for mobile devices such as smart phone which has 3G, LTE-advanced, WiFi. Consequently, there are researches for a transmission strategies using multiple paths below on end-to-end connection. MPTCP which is proposed and being standardized by the IETF as a new transport protocol can perform concurrent multipath transfer using multiple network interfaces. However, current MPTCP has performance degradation when it use heterogeneous networks which have quite different network characteristics. Therefore, this paper proposes the packet scheduling scheme and receiver-based recovery scheme to reduce the performance degradation due to reordering problem. Also, simulation results show that the proposed scheme can improve throughput and retransmission performance.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

A Development of APDU Packet Analyzer Based oil Smart Card (스마트 카드를 위한 APDU 패킷 분석기 개발)

  • 박진호;조증보;정민수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.350-353
    • /
    • 2004
  • 스마트 카드를 사용함에 있어서 APDU 통신은 필수적이다. 이런 APDU 를 통해 패킷을 주고 받을 경우에 그 패킷의 이진코드를 분석해 자바 가상 기계에 어떻게 할당되는지 시각적으로 보여줌으로써 그 이진코드 하나 하나가 어떤 의미를 내포하고 있는지 보다 명확하고 쉬운 이해가 가능 하도록 하며, 복잡한 절차의 카드와 카드리더기 사이의 APDU 통신을 버튼 하나로 해결해준다.

  • PDF

A Nearly Optimal One-to-Many Routing Algorithm on k-ary n-cube Networks

  • Choi, Dongmin;Chung, Ilyong
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.9-14
    • /
    • 2018
  • The k-ary n-cube $Q^k_n$ is widely used in the design and implementation of parallel and distributed processing architectures. It consists of $k^n$ identical nodes, each node having degree 2n is connected through bidirectional, point-to-point communication channels to different neighbors. On $Q^k_n$ we would like to transmit packets from a source node to 2n destination nodes simultaneously along paths on this network, the $i^{th}$ packet will be transmitted along the $i^{th}$ path, where $0{\leq}i{\leq}2n-1$. In order for all packets to arrive at a destination node quickly and securely, we present an $O(n^3)$ routing algorithm on $Q^k_n$ for generating a set of one-to-many node-disjoint and nearly shortest paths, where each path is either shortest or nearly shortest and the total length of these paths is nearly minimum since the path is mainly determined by employing the Hungarian method.

Traffic Analysis of Smart Phone Mobile Games Characteristics in Smart Phone Environment (스마트폰 환경 하에서 모바일 게임 특성에 따른 트래픽 분석에 관한 연구)

  • Choi, Su-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.407-410
    • /
    • 2013
  • 전 세계적으로 초고속 인터넷이 보급화 되고 대중화 되는 현재 컴퓨터 온라인 게임 산업뿐만 아니라 스마트폰 모바일 게임 산업이 빠르게 성장하면서 고정된 장소에서 게임하는 시대는 가고 이동 중 게임하는 시대가 열렸다. 이와 동시에 모바일 게임 트래픽 또한 점차 증가되고 있는 실정이다. 본 논문은 모바일 게임의 트래픽 분석을 위해 서로 다른 특성의 게임인 애니팡과 드래곤 플라이트를 이용하여 모바일 속도 측정 프로그램인 벤치비로 트래픽 변동 상황을 정리하고 tPacketCapture 프로그램과 네트워크 측정 분석기인 Wireshark로 일정한 시간 간격을 두고 총 패킷의 수와 전송되는 패킷의 크기 등에 대한 체계적인 네트워크 데이터를 분석하여 시간적 제한이 있는 보드 퍼즐 게임의 특성을 지닌 애니팡은 게임 진행상에서 빈번하게 데이터 패킷이 송 수신 되고 시간적 제한이 없는 슛팅 게임의 특성을 지닌 드래곤 플라이트는 게임 시작과 종료 지점에서만 주로 데이터 패킷이 송 수신 된다는 것을 알 수 있었다. 이러한 스마트폰 모바일 게임의 트래픽 분석은 향후 모바일 게임 네트워크의 성능 평가나 다른 모바일 게임의 설계 및 개발 등에 활용 될 수 있을 것이다.

The Design and Implementation of High Performance Intrusion Prevention Algorithm based on Signature Hashing (시그너처 해싱 기반 고성능 침입방지 알고리즘 설계 및 구현)

  • Wang, Jeong-Seok;Jung, Yun-Jae;Kwon, H-Uing;Chung, Kyu-Sik;Kwak, Hu-Keun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.209-220
    • /
    • 2007
  • IPS(Intrusion Prevention Systems), which is installed in inline mode in a network, protects network from outside attacks by inspecting the incoming/outgoing packets and sessions, and dropping the packet or closing the sessions if an attack is detected in the packet. In the signature based filtering, the payload of a packet passing through IPS is matched with some attack patterns called signatures and dropped if matched. As the number of signatures increases, the time required for the pattern matching for a packet increases accordingly so that it becomes difficult to develop a high performance US working without packet delay. In this paper, we propose a high performance IPS based on signature hashing to make the pattern matching time independent of the number of signatures. We implemented the proposed scheme in a Linux kernel module in a PC and tested it using worm generator, packet generator and network performance measure instrument called smart bit. Experimental results show that the performance of existing method is degraded as the number of signatures increases whereas the performance of the proposed scheme is not degraded.

An Efficient Channel Search Method for Transmitting Massive Multimedia Data (대용량 멀티미디어 데이터 전송을 위한 효율적인 채널 검색 방법)

  • Chung, Kyung Taek;Go, Sung Hyun
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.170-175
    • /
    • 2020
  • It is important to select the most appropriate channel for efficient transmission of massive multimedia data between smart devices in wireless sensor network. In the fixed channel method, sensor nodes can restrict usefulness of frequency and may be a major constraint to support frequency at various environments. In this paper, we propose a modified efficient channel search algorithm that determines available channel and tolerance of interference of links between two nodes. From the results of computer simulation, the proposed method shows that the link of channel can be set efficiently than the other methods even if the number of interference links increases and the beacon packet waiting time caused by interference is reduced remarkably.

Implementation of Software Radio System for IEEE 802.15.4 Physical Layer Using USRP and GNU Radio (USRP와 GNU Radio를 이용한 IEEE 802.15.4 물리 계층 소프트웨어 라디오 시스템 구현)

  • Park, Dae-Hyeon;Kim, Young-Sik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.11
    • /
    • pp.1214-1219
    • /
    • 2010
  • In this paper, a software radio system, supporting the physical layer of IEEE 802.15.4 standard, has been developed using USRP(Universal Software Radio Peripheral) board and GNU Radio package of an open source development kit for software radio. The software radio system supports the standards of BPSK and OQPSK modulations for 868/915 MHz band and OQPSK modulation for 2.45 GHz band. To verify the operation of the developed system, it has been tested under the standard signals according to the frequency band and packet structures for the transmitting and receiving operation. At 2.4 GHz, the Smart RF EV board and CC2430 modules are used to check the proper operation of the software radio system. The system performance test shows that the emission power spectrum, the eye-pattern, and PER(Packet Error Rate) meet the standard. It has been confirmed that the developed system supports the PHY layer of IEEE 802.15.4.