• Title/Summary/Keyword: Synchronization protocol

Search Result 259, Processing Time 0.027 seconds

A Node Activation Protocol using Priority-Adaptive Channel Access Scheduling for Wireless Sensor Networks (무선 센서 네트워크를 위한 적응적 우선순위 채널 접근 스케쥴링을 이용한 노드 활성화 프로토콜)

  • Nam, Jaehyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.469-472
    • /
    • 2014
  • S-MAC is hybrids of CSMA and TDMA approaches that use local sleep-wake schedules to coordinate packet exchanges and reduce idle listening. In this method, all the nodes are considered with equal priority which may lead to increased delay during heavy traffic. The method introduced in this paper provides high throughput and small end-to-end delay suitable for applications such as real-time voice streaming and its functionality is independent of underlying synchronization protocol. The novel idea behind our scheme is that it uses the priority concept with (m,k)-firm scheduling in order to achieve its objectives. The performance of our scheme is obtained through simulations for various packet sizes, traffic loads which show significant improvements in packet delivery ratio, and delay compared to existing protocols.

  • PDF

Risk Factors for the Probability of Pregnancy Following Synchronization Protocols in Dairy Cows (젖소에서 배란동기화 프로그램 적용 후 임신율에 영향을 미치는 요인 분석 연구)

  • Jeong, Jae-Kwan;Kang, Hyun-Gu;Jung, Young-Hun;Hur, Tai-Young;Kim, III-Hwa
    • Journal of Veterinary Clinics
    • /
    • v.31 no.5
    • /
    • pp.382-388
    • /
    • 2014
  • The objective of this study was to determine the risk factors associated with pregnancy following 3 synchronization protocols in dairy cows. Data were collected on 1,952 cows from 22 dairy farms, including synchronization protocols ($PGF_{2{\alpha}}$ + estradiol benzoate [PG+EB], Ovsynch, and CIDR-ovsynch), cow parity, body condition score (BCS), and dates of previous calving, insemination and conception. The odds ratio (OR) for pregnancy were analyzed by logistic regression using the LOGISTIC procedure in SAS. The analysis revealed that farm (p = 0.005), cow parity (p = 0.0001), BCS (p < 0.005), and AI season (p < 0.05) significantly affected and calving to AI interval tended to affect (p < 0.1) the probability for pregnancy. Although synchronization protocols did not affect the probability for pregnancy (p > 0.05), cow parity and synchronization protocols showed a significant interaction (p < 0.005); the OR (0.60) was significantly lower (p < 0.0001) for multiparous cows compared to primiparous cows using PG+EB, whereas the OR (1.44) tended to be higher (p < 0.1) for multiparous cows compared to primiparous cows using the Ovsynch, and the probability for pregnancy did not differ between multiparous and primiparous cows using the CIDR-ovsynch (p > 0.05). Cows with BCS ${\geq}$ 3.00 were more likely pregnant (OR: 1.41) compared with cows having BCS ${\leq}$ 2.75, whereas cows inseminated during summer had a lower OR (0.73) compared with those inseminated during spring. Cows with a calving to AI interval > 150 days were more likely to be pregnant (OR: 1.20) compared with cows with a calving to AI interval ${\leq}$ 150 days. In conclusion, the OR for pregnancy following synchronization protocols in dairy cows was affected by farm, parity, BCS, calving to AI interval of the cow, and AI season, and there was a significant interaction between cow parity and synchronization protocols; the OR for pregnancy was lower for multiparous cows compared with primiparous cows using the PG+EB protocol.

Authentication Protocol based on Credential for Implantable Medical Device (체내 삽입장치를 위한 위임장 기반의 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.259-264
    • /
    • 2014
  • Body insertion due to the recent development of sensor technology, the device is attached patients to receive medical services from anywhere, anytime environment is changing. Body insertion devices for the hospital, the patient's vital information attached personnel (doctors, nurses, pharmacists, etc.) to pass, however, when a problem occurs, a patient's information to a third party that can be exploited easily exposed. In this paper, we proposed signature authentication protocols mandate based on the patient's power of attorney from the center of the u-Healthcare services, hospital officials FormHelper third party disguised as a patient, the hospital patient information easily obtained from the officials to prevent. The proposed protocol, the patient's sensitive information to a third party, do not expose the patient's sensitive information to the random number generated by the u-Healthcare service centers and patients hash signature key to encrypt sensitive information of patients. From third parties to maintain synchronization between the patients and the hospital personnel in order to prevent patient information from being exploited illegally by the patient's vital information leakage can be prevented.

On the Generation of Synchronizable Conformance Test Sequences Using the Duplex Digraph and Distinguishing Sequences (이중 방향그래프와 구별시퀀스를 이용한 동기적 적합시험 항목의 생성)

  • Kim, Chul;Song, Joo-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.2
    • /
    • pp.241-249
    • /
    • 1997
  • In this paper, a new technique is proposed for generating a minimum-length synchronizable test sequence that can be applied in the distributed test architecture where both external synchtonization and input/output operation costs are taken into consideration. the method defines a set of transformation rules that constructs a duplex digraph from a given finite state machine representation of a protocol specification rules that constructs a duplex digraph from a given finite state machine representation of a protocol specificatio such that a rural chinese postman tour of the duplex digraph can be used to generate a minimum-length synchronizable test sequence using synchronizable distinguishing sequences as the state identification sequence for each state of the given finite state machine. The method provides an elegant solution to the synchronization problem that arises during the application of a predetermined test sequence in some protocol test architectures that utilize remote testers.

  • PDF

Efficient RFID Search Protocols Providing Enhanced User Privacy (강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Nyang, Dae-Hun;Lee, Mun-Kyu;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.347-356
    • /
    • 2009
  • In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.

An Extended Real-Time Synchronization Protocols for Shared Memory Multiprocessors (공유메모리 다중 프로세서 실시간 시스템에서의 동기화 프로토콜)

  • Kang, Seung-Yup;Ha, Rhan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.136-138
    • /
    • 1998
  • 작업들이 자원을 공유하는 경우 예측하기 어려운 지연시간이 발생한다. 다중 프로세서 시스템에서의 자원공유로 인한 지연시간은 더욱 예측하기 어렵다. 실기간 시스템의 스케줄 가능성 검사를 위해서는 이러한 지연시간을 정확히 예측해야한다. 선점가능한 우선순위 구동 CPU 스케줄링 알고리즘에 의해서 다른 우선순위의 작업과의 동기화는 우선순위 역전 문제를 야기한다. 본 논문에서는 다중 프로세서에서의 동기화 프로토콜을 제안하고 작업의 지연시간을 분석한다. 다른 프로세서에 할당된 작업들이 수행중인 자원을 요구할 때, 자원을 수행하는 작업의 우선순위를 높여줌으로써 자원수행을 빠르게 종료하게 한다. 이로 인해 자원에 의한 지연을 최소화한다. 특히, 높은 우선순위 작업의 경우 더욱 작은 지연시간을 갖게한다. 시뮬레이션을 통한 Shared Memory Protocol [5]과의 비교, 분석 결과 성능의 향상을 보임을 알 수 있다. 다양한 작업집합에 대한 지연시간을 분석하였다.

  • PDF

A Key Management Scheme for IPTV CAS in DOCSIS 3.0 Security System (DOCSIS 3.0 보안 시스템 기반 IPTV CAS를 위한 키 관리 기법)

  • Koo, Han-Seung;Lee, Jin-Hwan;Song, Yun-Jeong;Kwon, O-Hyung;Lee, Soo In
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.4
    • /
    • pp.207-217
    • /
    • 2008
  • A novel scheme is presented for Traffic Encryption Key (TEK) rekeying with low communication overhead for an Internet Protocol television (IPTV) conditional access system over Data-Over-Cable Service Interface Specifications (DOCSIS) 3.0. The proposed scheme utilizes the DOCSIS system synchronization for periodic TEK rekeying instead of a conventional TEK rekeying negotiation process. Analysis shows that the communication overhead is only 0.012 Kbps when TEK rekeying frequency is 1 second.

  • PDF

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

CNN based IEEE 802.11 WLAN frame format detection (CNN 기반의 IEEE 802.11 WLAN 프레임 포맷 검출)

  • Kim, Minjae;Ahn, Heungseop;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.27-33
    • /
    • 2020
  • Backward compatibility is one of the key issues for radio equipment supporting IEEE 802.11, the typical wireless local area networks (WLANs) communication protocol. For a successful packet decoding with the backward compatibility, the frame format detection is a core precondition. This paper presents a novel frame format detection method based on a deep learning procedure for WLANs affiliated with IEEE 802.11. Considering that the detection performance of conventional methods is degraded mainly due to the poor performances in the symbol synchronization and/or channel estimation in low signal-to-noise-ratio environments, we propose a novel detection method based on convolutional neural network (CNN) that replaces the entire conventional detection procedures. The proposed deep learning network provides a robust detection directly from the receive data. Through extensive computer simulations performed in the multipath fading channel environments (modeled by Project IEEE 802.11 Task Group ac), the proposed method exhibits superb improvement in the frame format detection compared to the conventional method.

A Study on IEC61850-9-2 Distributed Sampled Measured Values Applications for Merging Unit at Process Level (프로세스 레벨의 병합 단위장치를 위한 IEC61850-9-2 샘플링 값 서비스 구현에 관한 연구)

  • Kim, Gwan-Su;Lee, Hong-Hee;Kim, Byung-Jin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.7
    • /
    • pp.1177-1182
    • /
    • 2007
  • Recently, IEC61850 supports the standardized communication technique in both station bus and process bus, and presents the substation automation model. In this paper, we propose the required techniques to develop the Merging Unit (MU), which is one of the important data acquisition equipment in substation automation, under IEC61850 communication protocol. Especially, we also propose the precision time synchronization technique using GPS(Global Positioning System) for the MU. IEC61850-9-2 SV (Sampled Value) service is applied to the MU which is designed using microprocessor. In order to evaluate the performance of the proposed MU, the playback program, which can reconstruct the transmitted sampled value data on the basis of time information, is developed and the performance of the IEC61850 SV service for MU is verified experimentally.