• Title/Summary/Keyword: industrial protocol

Search Result 687, Processing Time 0.027 seconds

Advanced HEED protocol using distance weight in USN (USN 환경에서 거리 가중치를 사용한 개선된 HEED 프로토콜)

  • Jeoung, Su-Hyung;Yoo, Hae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.370-376
    • /
    • 2009
  • Recently, Study for routing protocol is gone vigorously in the Ubiquitous Sensor Network. A hierarchical routing protocol is being practical and received interest among them. Therefore we analyze a weak point of HEED. And I suggest the new protocol that solved a weak point of HEED. The new protocol that we propose puts weight in the energy remainder amount than HEED and elect CH. And elected CH is designed to change by new node when quantity of energy leftover becomes less than 50%. Therefore all nodes come to use energy fairly. The protocol that we proposed can prove the cluster survival rate about 30%. And CH is more effective because when elect CH replace, response time selects small node.

RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response (다중 비트 시도와 응답을 이용한 RFID 거리 한정 프로토콜)

  • Jeon, Il-Soo;Yoon, Eun-Jun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.19-26
    • /
    • 2012
  • To resist the relay attacks in RFID system, it is commonly used RFID distance bounding protocols using the round trip time measurement for 1 bit challenge and response between a reader and a tag. If the success probability of relay attacks for the 1 bit challenge and response can be reduced in these protocols, it is possible to make an efficient distance bounding protocol. In this paper, we propose an efficient RFID distance bounding protocol based on 2 bit challenge and response which is modified the RFID distance bounding protocol proposed by Hancke and Khun based on 1 bit challenge and response. The success probability of relay attack for the proposed protocol is (7/16)n for the n times of challenge and response, which is much lower than (3/4)n given by Hancke and Khun's protocol.

A Programmable Protocol Data Conversion Algorithm for Industrial Machine Monitoring (산업용 장비 모니터링을 위한 프로그램 가능한 프로토콜 데이터 변환 알고리즘)

  • Eum, Sang-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2139-2144
    • /
    • 2017
  • In case of communication method and protocol applied to the industrial field, various kinds and methods are applied to the field according to the environment and hardware configuration specifications. In order to develop and construct an industrial monitoring system, the development of the equipment is carried out through hardware system analysis and communication protocol analysis each time, so that a lot of development costs and time are being entered. In this paper, we proposed a programmable protocol conversion algorithm to support the integrated monitoring of industrial equipment using various protocols. This method can extract the necessary data from the data transmitted by serial communication, NMEA, CAN, Modbus communication method and transmit it to Ethernet. We implemented a communication gateway module that supports various communication methods, and experimented with data conversion and transmission.

Verification Test of Communication Protocol for Interface between EIS and LDTS (철도신호설비 상호간 정보전송을 위한 통신 프로토콜 검증시험)

  • 황종규;이재호;윤용기;신덕호
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.2
    • /
    • pp.114-119
    • /
    • 2004
  • According to the computerization of railway signalling systems. the communication protocol for interface between these systems are required. Therefore the new communication protocol for railway signaling system is required. Generally, there are two verification method for new designed protocol in the industrial and academic fields. One is the laboratory testing method which is very popular and general technique. In our research the comparison between existing and new designed protocol for signaling is described and the verification test results are also represented. From these laboratory test, we are verified the conformance of new designed protocol. Another method is verified by formal method. The format verification method is widely used at safety-critical system design but this approach is nor popular at verification communication protocol. However it is very important to verify the safety of new designed protocol for railway signaling system because signaling systems are very safety-critical systems. So, the methodology for formal verification of designed protocol is also reviews in this paper.

Evaluation of realtime communication over TCP/IP network for industrial automation (공장 자동화를 위한 TCP/IP 네트웍에서의 실시간 통신에 관한 연구)

  • 윤영찬;박재현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1032-1035
    • /
    • 1996
  • While Ethernet and TCP/IP are the most widely used protocol, for Real-time system, it is not applicable because it doesn't guarantee the deterministic transmission time. Furthermore, the TCP acknowledgement scheme and sliding window algorithm enforce to collide packets. Although various Collision-Free CSMA protocol was presented, it is very difficult to implement in well known OS(UNIX, WilidowsNT) because we have to modify network kernel. This paper presents another transmission protocol based on modified UDP. The colliding probability can be minimized by avoiding successive packet transmission and decreasing competition duration. The proposed algorithm can be used for the soft real-time industrial automation network.

  • PDF

Usability of Wireless Application Protocol Interface in the Philippines

  • Tangsoc, Jazmin Chong;Ponio V., Amelia S.
    • Industrial Engineering and Management Systems
    • /
    • v.8 no.1
    • /
    • pp.54-65
    • /
    • 2009
  • The existence of Internet revolutionized the computer and communications world. With the rising demand for accessing the Internet, the mobile technology has incorporated the use of Internet in mobile phones. Wireless Application Protocol (WAP) has combined two of the widest utilized technology today: mobile phones and Internet. This study aims to assess the existing WAP pages offered by the top service providers in the Philippines through usability testing experiments. The paper also aims to identify existing problems in WAP interface by focusing on the errors committed by the users. From the usability study, it was found out that common usability problems are wrong selection of links, unclear grouping of categories, wrong feedback, and redundant links. The type of service provider used is significant in determining the performance of users while experience in accessing WAP is insignificant.

A Design of A Modbus Application Protocol for Multiple SCU Connections (다중 제어 장치 연결을 위한 Modbus 응용 Protocol 설계)

  • Song, Jeong-Ho;Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.642-649
    • /
    • 2018
  • The Modbus protocol is the most widely used protocol for connecting multiple slave control units (SCUs) in the master control unit. However, the Modbus protocol does not identify which SCU response message corresponds to the service request message. Therefore, when using the Modbus protocol, one service request message can be transmitted after processing the previous message. In this paper, we propose a Modbus application protocol with an index code and a service code to solve the problem. As a result of experimentation, it is possible to transmit the next service request message without processing the previous service request message. And when a communications error occurs, it is possible to identify what type of error occurred using an error detection algorithm. Also, with simultaneous multiple service requests, the proposed protocol can improve processing time by about 66.2%, compared to the original Modbus protocol.

A Sensor Network Security Protocol for Monitoring the State of Bridge (교량감시를 위한 센서 네트워크 보안프로토콜)

  • Lim, Hwa-Jung;Jeon, Jin-Soon;Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.211-220
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. The inherent vulnerability in security of the sensor nodes has promoted the needs for the lightweight security protocol. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring the man-made objects such as bridges. Furthermore, we present the efficient way of setting the routing path by storing IDs, MAC(message authentication code) and the location information of the nodes, and taking advantage of the two node states, Sleep and Awake. This also will result in the reduced energy consuming rate.

  • PDF

An Authentication Protocol using the EXOR and the Hash Function in RFID/USN (RFID/USN에서의 EXOR과 해쉬 함수를 이용한 인증 프로토콜)

  • Shin, Jin-Seob;Park, Young-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.24-29
    • /
    • 2007
  • The essential factor of ubiquitous is security technology to properly prepare making possible network access, economic and convenient information exchange. This paper proposes an authentication protocol for RFID as one technology to realize such an ubiquitous. The proposed protocol used only the EXOR and the hash function operations reduces operations at RFID tag, which improves stability compared to existing protocols.

  • PDF

Three-Party Key Exchange Protocol Providing User Anonymity based on Smartcards (사용자 익명성을 제공하는 스마트카드 기반 3자 참여 키 교환 프로토콜)

  • Choi, Jong-Seok;Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.388-395
    • /
    • 2009
  • Three-party authenticated key exchange protocol based on smartcards using XOR and hash function operation instead of the public key operation has been proposed in 2006. Recently, it is doing for research because of increasing interest in privacy. This paper pointed out that proposed three-party authenticated key exchange protocol in 2006 has some problems; it is user anonymity and slow wrong input detection, and then we proposed new one to overcome these problems.