• Title/Summary/Keyword: hybrid protocol

Search Result 286, Processing Time 0.027 seconds

The Hybrid Lighting Control System on Multiple Sensor (다중센서 기반의 하이브리드 조명제어 시스템)

  • Hong, Sung-Il;Lin, Chi-Ho
    • Journal of IKEEE
    • /
    • v.17 no.3
    • /
    • pp.301-308
    • /
    • 2013
  • In this paper, we propose the hybrid lighting control system on multiple sensor. The proposed hybrid lighting control system was designed for management and control of street lightings by configured as the data display part of integration-interworking part, the data conversion-processing part of integrated management part, and the communication part of gateway system. The data are implemented to designing the DB to enable to storage in real-time by enable to monitoring by wireless remote control and schedule set. As a result of the efficiency verification of the proposed hybrid lighting control system, the hybrid lighting control system be to the real-time monitoring and remote lighting control was possible, because to peristalsis with smart devices and portable PC etc., and it could be obtained the effect of energy and electricity, communication cost reduction.

Hybrid Cryptosystem based on Diffie-Hellman over Elliptic Curve (타원 곡선 상의 Diffie-Hellman 기반 하이브리드 암호 시스템)

  • 정경숙;정태충
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.104-110
    • /
    • 2003
  • In this paper, we proposed hybrid cryptosystem of Diffie-Hellman base in Elliptic Curve, and explained for specific protocol design. The proposed system is efficient hybrid cryptosystems system that offer implicit key authentication about sender and receiver unlike existing hybrid system. This system increased safety generating session key using pseudo-random number generator by cryptographic. Because the system is hybrid system, it is more efficient in calculation amount aspect supplementing merit and fault of public key system and secret key system. Also, the system can not get right plaintext except receiver even if sender's secret key is revealed and impersonation attack is impossible. And the system offers security on known keys without influencing in safety of other session's cryptogram even if session key is exposed. And the system is provided safety about mutual entity authentication and replay attack.

  • PDF

A study on the receiving rate of the data of the hybrid communication system using data transfer methods for controller system of navigational aids (데이터 전송방식에 따른 항로표지 관리용 하이브리드 통신 시스템의 수신율 분석에 관한 연구)

  • Jeon, Joong Sung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.1
    • /
    • pp.78-85
    • /
    • 2014
  • The Mu-communication board supported by hybrid communication is designed with Cortex M3, which is a low power energy consumption 32-bit microcontroller. The Cortex M3 microcontroller has UART(Universal asynchronous receiver/transmitter) ports which can set appropriately using the command line interpreter (CLI) program with each port. URAT ports are used for hybrid communication modems, GPS modules, etc. When the socket type was compared with the short message service type, the socket type was proven to be better. By improving the receiving performance in the control and management system of the AtoN, data loss was minimized. During the testing of the socket and SMS, data was collected from each buoy for 12 hours every 1 minute and the receiving rate of the data was found to be more than 98.58 % and 99.42 % respectively.

Cross-Layer Service Discovery Scheme for Hybrid Ad-hoc Networks (하이브리드 애드-혹 네트워크를 위한 크로스-레이어 서비스 검색 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.223-228
    • /
    • 2009
  • Efficient service discovery mechanism is a crucial feature for a hybrid ad-hoc network supporting extension of a wireless ad-hoc network to the Internet. We propose an efficient cross-layer service discovery mechanism using non-disjoint multi-path source routing protocol for hybrid ad-hoc networks. Our scheme has advantages of multi-path routing protocol and cross-layer service discovery. Intuitively, it is not difficult to imagine that the cross-layer service discovery mechanism could result in a decreased number of messages compared to the traditional approach for handling routing independently from service discovery. By simulation, we show that faster route recovery is possible by maintaining multiple routing paths in each node, and the route maintenance overhead can be reduced by limiting the number of multiple routing paths and by maintaining link/node non-disjoint multi-path.

Design and Performance Analysis of Multi-hop Routing Protocol for WiMedia (WiMedia를 위한 멀티홉 라우팅 프로토콜 개발 및 성능분석)

  • Jung, Jin-Uk;Lee, Seung-Jin;Jin, Kyo-Hong;Hwang, Min-Tae;Jeon, Young-Ae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1406-1415
    • /
    • 2012
  • Though WiMedia supports the higher data rates than other WPAN technologies, a WiMedia device cannot reach other devices which are apart from it more than 10 meter; the limited transmission range of the WiMedia protocol. In this paper, we propose a multi-hop QoS routing protocol to enable WiMedia devices to transmit real-time data to devices that is located out of transmission range. The proposed routing protocol is a hybrid routing protocol, which is the mixed protocol of table-driven and on-demand routing algorithm. In the proposed protocol, a route for a device within 2-hop is established by using the table-driven routing algorithm and a route for the device beyond 2-hop is established by using the on-demand routing algorithm. We perform ns-2 simulation to investigate the performance of the proposed routing protocol with AODV and DSDV. The simulation results show that the proposed protocol's performance is better than AODV and DSDV in terms of the throughput and delay.

performance analysis of the CSMA/CA protocol using stop-and-wait ARQ method in iwreless LANs (무선 근거리 통신망에서의 Stop-and-wait ARQ 방식을 사용하는 충돌회피 프로토콜 성능분석)

  • 김재현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1208-1220
    • /
    • 1996
  • In this paper, the performance of a Carrier Sense Multiple Access/Collision avoidance (CSMA/CA) protocol using stop-and-Wait automatic Repeat reQuest, which is adapted as a draft standard in IEEE 802.11, is analyzed using a mathematical method based on a renewal theory, and simulation checks are performed, which confirm the goodness of our anlysis. In order to anlayze of CSMA/CA, we model that network is composed of finite populationand channel is slotted. And, we consider the CSMA/CA protocol as a hybrid protocol of 1-persistent CSMA and p-persistent CSMA protocol. As resuls of analysis, we have found that the throughput is degraded and packet delay is increased as the number of stations, Acknowledgement (ACK) length and Distributed coordination function Inter Frame Space (DIFS) length are increased.

  • PDF

Context-aware Based Distributed Clustering for MANET (상황인식 기반의 MANET을 위한 분산 클러스터링 기법)

  • Mun, Chang-min;Lee, Kang-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.277-280
    • /
    • 2009
  • Mobile Ad-hoc Network(MANET) could provide the reliable monitoring and control of a variety of environments for remote place. Mobility of MANET would require the topology change frequently compared with a static network. To improve the routing protocol in MANET, energy efficient routing protocol would be required as well as considering the mobility would be needed. In this paper, we propose a new method that the CACH(Context-aware Clustering Hierarchy) algorithm, a hybrid and clustering-based protocol that could analyze the link cost from a source node to a destination node. The proposed analysis could help in defining the optimum depth of hierarchy architecture CACH utilize. The proposed CACH could use localized condition to enable adaptation and robustness for dynamic network topology protocol and this provide that our hierarchy to be resilient.

  • PDF

Secure Authenticated key Exchange Protocol using Signcryption Scheme (Signcryption을 이용한 안전한 인증된 키 교환 프로토콜 연구)

  • Kim Rack-Hyun;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.139-146
    • /
    • 2006
  • A Signcryption proposed by Yuliang Zheng in 1997 is a hybrid public key primitive that combines a digital signature and a encryption. It provides more efficient method than a straightforward composition of an signature scheme with a encryption scheme. In a mobile communication environment, the authenticated key agreement protocol should be designed to have lower computational complexity and memory requirements. The password-based authenticated key exchange protocol is to authenticate a client and a server using an easily memorable password. This paper proposes an secure Authenticated Key Exchange protocol using Signcryption scheme. In Addition we also show that it is secure and a more efficient that other exiting authenticated key exchange protocol.

Effective Routing Protocol Implementation Framework on Riverbed (OPNET) Modeler and its Example for AntHocNet (Riverbed (OPNET) Modeler의 효과적인 라우팅 프로토콜 추가 프레임워크 및 이를 이용한 AntHocNet 라우팅 구현)

  • Kim, Kwangsoo;Lee, Cheol-Woong;Shin, Seung-hun;Roh, Byeong-hee;Roh, Bongsoo;Han, Myoung-hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.974-985
    • /
    • 2016
  • Riverbed Modeler, which is a commercial packet-level discrete event simulator is used to model, design, and simulate complicated communication protocols and large-scale network. Riverbed Modeler got credit for its reliability in field of network simulation. In the MANET simulation environment using Riverbed Modeler, it is very complicated to add a new routing protocol into existing architecture of routing protocols because it is required lots of modifications of protocol recognition. In this paper, we propose Routing Adding Framework which can reduce errors or mistakes during modifying the existing routing support architecture. Routing Adding Framework is provided as a adapter API for protocol recognition. and it is only minimum modifications for protocol identifiers when a new routing protocol is added to the child process of manet_mgr process which manages routing protocols for IP layer. With Routing Adding Framework, we can reduce less than half modification. Then, we shows an example of implementation of a hybrid routing protocol AntHocNet using Routing Adding Framework, and we verify its design and application of the Routing Adding Framework by obtaining simulation result with similar result given by AntHocNet.

Design and Verification of Satellite B-ISDN Multi-Signalling Protocol (위성 B-ISDN 다중신호 프로토콜의 설계 및 검증)

  • 박석천;남기모;김동영;변지섭;최동영
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.13-16
    • /
    • 1999
  • The terrestrial/satellite hybrid network may replace or supply the terrestrial network in some areas or certain application. Futhermore, it can play an important role in the development of B-ISDN due to their features of flexible wide coverage, independent of ground distances and geographical constraints, multiple access and multipoint broadcast. Also, satellite have the capability to supply terrestrial ATM and B-ISDN with flexible links for access networks as well as trunk networks. This paper describes the design and verification of the interworking protocol between terrestrial B-ISDN and satellite network. For the verification, the designed interworking protocol is modeled by Petri-net and analyzed by reachability tree.

  • PDF