• Title/Summary/Keyword: common industrial protocol

Search Result 24, Processing Time 0.023 seconds

Performance Analysis of Wired/Wireless Hybrid Network based on Common Industrial Protocol (Common Industrial Protocol 기반의 유무선 하이브리드 네트워크에 관한 성능 분석)

  • Jung, Ji-Won;Lee, Seung-Ki;Kim, Dong-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1119-1127
    • /
    • 2007
  • This paper is concerned with a performance analysis using a wired/wireless hybrid network based on Common Industrial Protocol(CIP). For the performance analysis, the data transmission time, average end-to-end delay and throughput between DeviceNet and the wireless devices are investigated. The experimental results show the performance in terms of the polling/COS service time of CIP based hybrid network.

Intelligent Motor Control System Based on CIP (CIP 기반의 지능형 전동기 제어 시스템)

  • Kim, On;Choi, Seong-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.2
    • /
    • pp.307-312
    • /
    • 2020
  • This paper proposed intelligent motor control system that replaced smart motor devices, such as motor protection relays, smart circuit breakers and variable speed drives, with one integrated module to perform efficient motor control at industrial sites. The proposed intelligent motor control system provides easy monitoring of critical data for each motor or load connected to an intelligent motor control system over a CIP(Common Industrial Protocol)-based network, which enables accurate process control at all times, real-time access to fault information and records to simplify diagnosis and minimize equipment downtime.

Quorum based Peer to Peer Key Sharing Protocol over Wireless Sensor Networks

  • Yang, Soong-Yeal;Won, Nam-Sik;Kim, Hyun-Sung;Lee, Sung-Woon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2008.10b
    • /
    • pp.445-448
    • /
    • 2008
  • The key establishment between nodes is one of the most important issues to secure the communication in wireless sensor networks. Some researcher used the probabilistic key sharing scheme with a pre-shared key pool to reduce the number of keys and the key disclosure possibility. However, there is a potential possibility that some nodes do not have a common share in the key pool. The purpose of this paper is to devise a peer to peer key sharing protocol (PPKP) based on Quorum system and Diffie-Hellman key exchange scheme (DHS). The PPKP establishes a session key by creating a shared key using the DHS and then scrambles it based on Quorum system to secure that. The protocol reduces the number of necessary keys than the previous schemes and could solve the non-common key sharing possibility problem in the probabilistic schemes.

  • PDF

Usability of Wireless Application Protocol Interface in the Philippines

  • Tangsoc, Jazmin Chong;Ponio V., Amelia S.
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.1
    • /
    • pp.54-65
    • /
    • 2009
  • The existence of Internet revolutionized the computer and communications world. With the rising demand for accessing the Internet, the mobile technology has incorporated the use of Internet in mobile phones. Wireless Application Protocol (WAP) has combined two of the widest utilized technology today: mobile phones and Internet. This study aims to assess the existing WAP pages offered by the top service providers in the Philippines through usability testing experiments. The paper also aims to identify existing problems in WAP interface by focusing on the errors committed by the users. From the usability study, it was found out that common usability problems are wrong selection of links, unclear grouping of categories, wrong feedback, and redundant links. The type of service provider used is significant in determining the performance of users while experience in accessing WAP is insignificant.

Li100A Study on the Usability of WAP Interface in the Philippines

  • Chong, Jazmin N.;Ponio V, Amelia S.
    • Industrial Engineering and Management Systems
    • /
    • v.7 no.1
    • /
    • pp.66-77
    • /
    • 2008
  • The existence of Internet revolutionized the computer and communications world. With the rising demand for accessing the Internet, the mobile technology has incorporated the use of Internet in mobile phones. Wireless Application Protocol (WAP) has combined two of the widest utilized technology today: mobile phones and Internet. This study aims to assess the existing WAP pages offered by the top service providers in the Philippines through usability testing experiments. The paper also aims to identify existing problems in WAP interface by focusing on the errors committed by the users. From the usability study, it was found out that common usability problems are wrong selection of links, unclear grouping of categories, wrong feedback, and redundant links. The type of service provider used is significant in determining the performance of users while experience in accessing WAP is insignificant.

A Conversation Preference Profile for Web Services in Mobile Environment

  • Lee Kang-Chan;Lee Won-Suk;Jeon Jong-Hong;Lee Seung-Yun;Park Jong-Hun
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.1
    • /
    • pp.1-4
    • /
    • 2006
  • Recently Web Services choreography working group of W3C has published the working draft on WSCDL (Web Services Choreography Description Language) version 1.0 which defines reusable common rules to govern the ordering of exchanged messages between Web Services participants. This paper considers a computing environment where mobile clients are interacting with Web Services providers based on a WSCDL specification. In order to effectively cope with the user and device mobility of such an environment, in this paper we present an ongoing work to develop a framework through which a mobile client can specify its preference on how conversation should take place. The proposed framework provides a flexible means for mobile clients to minimize the number of message exchanges while allowing them to adhere to the required choreography.

A Motion Planning Algorithm for Synchronizing Spatial Trajectories of Multi-Robots (다수 로봇간 공간궤적 동기화를 위한 모션계획 알고리즘)

  • Jeong Young-Do;Kim Sung-Rak;Lee Choong-Dong;Lim Hyun-Kyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.12
    • /
    • pp.1233-1240
    • /
    • 2004
  • Recently the need for cooperative control among robots is increasing in a variety of industrial robot applications. Such a control framework enhances the efficiency of the real robotic assembly environment along with extending the robot application. In this paper, an ethernet-based cooperative control framework was proposed. The cooperative control of robots can multiply the handling capacity of robot system, and make it possible to implement jigless cooperation, due to realization of trajectory-synchronized movement between a master robot and slave robots. Coordinate transformation was used to relate among robots in a common coordinate. An optimized ethernet protocol of HiNet was developed to maximize the speed of communication and to minimize the error of synchronous movement. The proposed algorithm and optimization of network protocol was tested in several class of robots.

A Study on Improving the Security Vulnerabilities of Modbus-Based SCADA Control Systems (Modbus 기반 SCADA 제어 시스템의 보안 취약성 향상에 관한 연구)

  • Cagalaban, Giovanni A.;Kim, Seok-Soo;Ha, Kyung-Jae
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.421-424
    • /
    • 2009
  • SCADA control systems and protocols are developed based on reliability, availability, and speed but with no or little attention paid to security. Specifically in Modbus protocol, there are inherent security vulnerabilities in their design. The lack of common security mechanisms in the protocol such as authentication, confidentiality and integrity must be addressed. In this paper, security vulnerabilities of Modbus-based SCADA controls systems will be studied. An in-depth analysis of the message frame formats being sent between master and slave will be discussed to expose the security vulnerabilities. This will enable SCADA users to find ways to fix the security flaws of the protocol and design mitigation strategies to reduce the impact of the possible attacks. Security mechanisms are recommended to further enhance the security of SCADA control systems.

  • PDF

Service-oriented protocol security framework in ICT converged industrial environment (ICT 융합 산업 환경에서 서비스 지향 프로토콜 보안 프레임워크)

  • Lee, Seoung-Woo;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.15-22
    • /
    • 2017
  • This paper analyzes vulnerability of each service protocol used in ICT convergence industry, smart factory, smart grid, smart home, smart traffic, smart health care, and suggests technologies that can overcome security vulnerabilities. In addition, we design a service-oriented protocol security framework that allows us to quickly and easily develop security functions in an open environment by defining a security element common to protocols and designing a security module for each protocol layer including the corresponding elements. Service protocol independent security module and specialized security module, it will be possible to develop flexible and fast security system in ICT convergence industry where various protocols are used. The overall security level of the ICT service network can be improved by installing the necessary security modules in the operating system, and the productivity can be improved in the industrial security field by reusing each security module.

An Approach to Systems with Multi-Factor Method (다중요소방식을 이용한 시스템 접근방안)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won;Kim, Young-Gon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.842-848
    • /
    • 2012
  • In this paper, as a proper authentication method, we made it authenticate a user who has unauthorized device with using authorized device received from telecommunication company using QR code. We designed a better performance protocol which can authenticate mutually using safer and uncomplicated operations than existing user authentication system. Proposed user authentication system authenticates previously authorized mobile device without any information of client who is requesting to get access from outside, so we can basically prevent attack from hackers. In the future, we can possibly use it as user authentication method in common internet environment or we could study on user unique information instead of mobile device information.