• Title/Summary/Keyword: T=1 protocol

Search Result 454, Processing Time 0.032 seconds

Development and Effect of the Feeding Protocol for Preterm Infants (미숙아의 수유 프로토콜 개발 및 적용)

  • Lee, Jae-Young;Son, Hyun-Mi;Park, Kyung-Hee
    • Child Health Nursing Research
    • /
    • v.20 no.1
    • /
    • pp.20-29
    • /
    • 2014
  • Purpose: The purpose of this study was to develop a feeding protocol for premature infants and to evaluate the effects of protocol. Methods: The feeding protocol was developed through a literature review and discussions of an expert group. The developed feeding protocol was tested with 85 preterm infants in one neonatal intensive care unit in B city. A non-equivalent control group non-synchronized design was used. Data were collected from January 1 to April 30, 2013 for the control group and from June 1 to September 30, 2013 for the experimental group. The experimental group (n=38) received the feeding protocol, whereas the control group (n=47) had routine feeding care. Collected data were analyzed by t-test and -test using SPSS/WIN version 18.0. Results: First feeding time (t=2.22, p=.029) and full enteral feeding time (t=2.28, p=.026) were significantly decreased in the experimental group compared to the control group. There was no difference in incidence of complications (p>.05). Also no significant differences in weight reduction rate between the two groups were observed at the 7th postnatal day (t=-1.23, p=.222). Conclusion: The results indicate that the feeding protocol for preterm infants is effective in decreasing first feeding time and full enteral feeding time.

ZigBee Authentication Protocol with Enhanced User Convenience and Safety (사용자 편의성 및 안전성이 강화된 ZigBee 인증 프로토콜)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.81-92
    • /
    • 2022
  • The rapidly growing IoT market is expanding not only in general households but also in smart homes and smart cities. Among the major protocols used in IoT, ZigBee accounts for more than 90% of the smart home's door lock market and is mainly used in miniaturized sensor devices, so the safety of the protocol is very important. However, the device using Zig Bee is not satisfied with the omnidirectional safety because it uses a fixed key during the authentication process that connects to the network, and it has not been resolved in the recently developed ZigBee 3.0. This paper proposes a design method that provides omnidirectional safety to the ZigBee authentication protocol and can be quickly applied to existing protocols. The proposed improved ZigBee authentication protocol analyzed and applied the recently developed OWE protocol to apply ECDH, which has low computational volume and provides omnidirectional safety in IoT. Based on this, it provides the safety of the ZigBee authentication protocol, and it is expected that it will be able to provide user convenience as it does not require a separate certificate or password input.

Security Analysis of Remote Healthcare System in Cloud-based IoT Environment (클라우드 기반 IoT 환경의 원격 헬스케어 시스템에 대한 보안성 분석)

  • Kwon Jaemin;Hong Sewoong;Choi Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.31-42
    • /
    • 2023
  • As computer performance is leveled upward, the use of IoT systems is gradually expanding. Although IoT systems are used in many fields, it is true that it is difficult to build a safe system due to performance limitations. To overcome these limitations, many researchers have proposed numerous protocols to improve security issues. Among them, Azrour et al. except. We proposed a new efficient and secure authentication protocol for remote healthcare systems in a cloud-based IoT environment, and claimed that the new protocol could solve the security vulnerabilities of the existing protocols and was more efficient. However, in this paper, through the security analysis of the remote healthcare system in the cloud-based IoT environment proposed by Azrour et al., the protocol of this system was found to be vulnerable to Masquerade attack, Lack of Perfect Forward Secrecy, Off-line password guessing attack, and Replay attack.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Design Of A Secure Authentication Protocol Against Phishing And Pharming Attacks (피싱과 파밍 공격에 대응하기 위한 인증 프로토콜 설계)

  • Kim, Ik Su;Choi, Jong Myung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • As individuals spend more time doing social and economic life on the web, the importance of protecting privacy against Phishing and Pharming attacks also increases. Until now, there have been researches on the methods of protection against Phishing and Pharming. However, these researches don't provide efficient methods for protecting privacy and don't consider Pharming attacks. In this paper, we propose an authentication protocol that protects user information from Phishing and Pharming attacks. In this protocol, the messages passed between clients and servers are secure because they authenticate each other using a hash function of password and location information which are certificated to clients and servers only. These messages are used only once, so that the protocol is secure from replay attacks and man-in-the-middle attacks. Furthermore, it is also secure from Pharming attacks.

The Effects of Clinical Application of a Nursing Diagnosis Protocol (간호진단 프로토콜(Protocol)의 임상적용 효과에 관한 연구)

  • 이향련;조미영;조결자;김윤희;김귀분;김광주;문희자;박신애;강현숙
    • Journal of Korean Academy of Nursing
    • /
    • v.19 no.1
    • /
    • pp.40-62
    • /
    • 1989
  • This study was conducted to measure the effects of clinical application of a Nursing Diagnosis Protocol. The dependent variables were the degree of patient's satisfaction and the degree of nurse's satisfaction with the nursing activity. Analysis of the effect of the use of the nursing diagnosis protocol was based on the nursing record. The subjects for this study were 61 nurses(experimental group 31, control group 30) and 155 patients (experimental group 55, control group 100) on four internal medicine wards in K University Hospital in Seoul. Data collection was done from August to October 12,1988. The results obtained in this study can be summarized as follows, 1, Effect of the clinical application of the nursing diagnosis protocol. 1) The first hypothesis ; “nurses who use the nursing diagnosis protocol will have higher degrees of satisfaction than those who use traditional methods” was rejected (t=.54, df=58, p=.59). 2) The second hypothesis ; “patients nursed by nurses using the nursing diagnosis protocol will have higher degrees of satisfaction than those nursed with traditional methods” was supported(t=1.93, df=154, p=.05). 3) The third hypothisis : Major hypothesis ; “the nursing records of the experimental group, who used the nursing diagnosis protocol, will be more detailed than those of the control group” was supported (t=6.40, df=79.90, p=.000). (1) The first subhypothesis ; “The recorded data collection of the experimental group will be more detailed than that of the control group” was rejected (t=1.79, df=118, p=.07). (2) The second subhypothesis ; “The recorded patient's problem statement of the experimental group will be more detailed than that of the control group”, was supported. (3) The third subhypothesis ; “The nursing record of the experimental group will be more convenient for implementation than that of the control group” was supported. 2. Factors related to the nurse's degree of satisfaction with protocol. 1) No general characteristics(age, religion, education level, duty career, present duty career) were related to the nurse's degree of satisfaction. 2) Variables related to the nurse's degree of satisfaction were “satisfaction as a nurse” and “consider nursing as lifelong job” (t=-2.6, df=13.22, p=.02, t=2.41, df=23.85, p=.02). 3. Factors related to the patient's degree of satisfaction. 1) General characteristics related to the patient's degree of satisfaction with nurses using the protocol were age, educational level, and being married.(F=5.17, df=3/153, p=.00, t= -2.39, df=154, p=,01, f=5.91, df=2/153, p=.00) 2) The variables previous hospitalization, duration of hospitalization, the hospital unit presence of a relative, medical insurance, or medical diagnosis were not related to the patient's degree of satisfaction. 1. The experimental group's nursing record was more detailed than the control group's record with regard to the physical and psychological state of the patients. As noted above, the experimental group nurses, who use a nursing diagnosis had protocol were less satisfied than the control group who used traditional methods of the recording, but experimental group patients had a higher degree of satisfaction than the control group patients. The nursing records of experimental group, using the nursing, diagnosis protocol was more detailed than that of the control group. If the nursing diagnosis protocol is used in clinical nursing practice, the quality of nursing care may be improved.

  • PDF

Authentication Method for Safe Internet of Things Environments (안전한 사물 인터넷 환경을 위한 인증 방식)

  • Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.1
    • /
    • pp.51-58
    • /
    • 2015
  • Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.

A Design and Implementation of Indoor IoT Resource Control Service using Web-based IETF CoAP Protocol (웹 기반의 IETF CoAP 프로토콜을 이용한 실내 IoT 자원 제어 서비스 설계 및 구현)

  • Jin, Wenquan;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.77-82
    • /
    • 2016
  • Recently, an IoT(Internet of Things) application communication protocol is standardizing for connectivity between every things on Internet. In this paper, we design and implement an indoor resource control service using IETF (Internet Engineering Task Force) CoAP (Constrained Application Protocol) based on Web. We present an indoor resource control architecture based on Web included functionalities of proxy and RD (Resource Directory) in a web server. Developed indoor resource control service supports to register low-powered and small-scale IoT nodes to web server using CoAP. This service allows users to control the indoor resources through a web browser using Web proxy with functionality of HTTP-CoAP converting.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

Performance Comparison of HTTP, HTTPS, and MQTT for IoT Applications

  • Sukjun Hong;Jinkyu Kang;Soonchul Kwon
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Recently, IoT technology has been widely used in many industries. Also research on integrating IoT technology with IoT sensors is actively underway. One of the important challenges in IoT is to support low-latency communication. With the development of communication networks and protocols, a variety of protocols are being used, and their performance is improving. In this paper, we compare the performance and analyze the characteristics of some of the major communication protocols in IoT application, namely MQTT, HTTP, and HTTPS. IoT sensors acquired data by connecting an Arduino equipped with ESP8266 and a temperature and humidity sensor (DHT11). The server measured the performance by building servers for each protocol using AWS EC2. We analyzed the packets transmitted between the Arduino and the server during the data transmission. We measured the amount of data and transfer time. The measurement results showed that MQTT had the lowest data transmission time and data amount among the three protocols.