• Title/Summary/Keyword: lightweight protocols

Search Result 68, Processing Time 0.024 seconds

Analysis of Power-Saving Protocols for Multi-hop Ad Hoc Networks (다중 홉 Ad Hoc 망에서 Power-Saving 프로토콜의 성능분석)

  • 김동현;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.203-207
    • /
    • 2003
  • Mobile Ad Hoc Network is a kind of network technology, that mobile hosts can compose networks freely and temporarily where the base networks don't exist and where its establishment is difficult or as occasion demands. Ubiquitous computer network is prograssing in the forms of miniaturization, lightweight or portability. So far, MANET was studied in the point how to route it efficiently, but its power saving problems are been issuing nowadays. We try to not only compare and analyze power saving protocols in multi-hop Ad Hoc network but also present their efficiencies in this thesis.

  • PDF

Authentication Protocol Supporting Secure Seamless Handover in Network Mobility (NEMO) Environment (네트워크 이동성 환경에서 안전한 Seamless 핸드오버 지원을 위한 인증 프로토콜)

  • Kim, Jong-Young;Yoon, Yong-Ik;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.57-64
    • /
    • 2012
  • The existing protocols proposed in network mobility (NEMO) environment can require many computational costs and can bring about a delay of binding update. To solve these problems, in this paper we propose an authentication protocol supporting secure seamless handover in NEMO environment. The proposed protocol can handle quickly mutual authentication between a mobile router (MR) and an access router (AR), which uses group key among ARs and a master key (MK) issuing from key issuing server (KIS) for reducing the time of binding update as much as possible. In performance, the proposed protocol can process quickly binding update with little computational cost comparison with the existing binding update protocols and it results in robustness against existing attacks.

Lightweight RFID Authentication Protocols Based on Hash Function (해쉬함수에 기반한 경량화된 RFID 인증 프로토콜)

  • Ha, Jae-Cheol;Baek, Yi-Roo;Kim, Hwan-Koo;Park, Jea-Hoon;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.61-72
    • /
    • 2009
  • To guarantee security between the tag and back-end server and implementation efficiency in low power tag, we propose two typed mutual authentication protocols in RFID system. One is static-ID authentication scheme which is well suitable in distributed server environments. The other is dynamic-ID scheme which is additively satisfied forward security. In proposed scheme, it does not need any random number generator in tag and requires only one(maximally three) hash operation(s) in tag or server to authenticate each other. Furthermore, we implement the proposed schemes in RFID smart card system and verify its normal operations.

UDP-Based Active Scan for IoT Security (UAIS)

  • Jung, Hyun-Chul;Jo, Hyun-geun;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.20-34
    • /
    • 2021
  • Today, IoT devices are flooding, and traffic is increasing rapidly. The Internet of Things creates a variety of added value through connections between devices, while many devices are easily targeted by attackers due to security vulnerabilities. In the IoT environment, security diagnosis has problems such as having to provide different solutions for different types of devices in network situations where various types of devices are interlocked, personal leakage of security solutions themselves, and high cost, etc. To avoid such problems, a TCP-based active scan was presented. However, the TCP-based active scan has limitations that it is difficult to be applied to real-time systems due to long detection times. To complement this, this study uses UDP-based approaches. Specifically, a lightweight active scan algorithm that effectively identifies devices using UPnP protocols (SSDP, MDNS, and MBNS) that are most commonly used by manufacturers is proposed. The experimental results of this study have shown that devices can be distinguished by more than twice the true positive and recall at an average time of 1524 times faster than Nmap, which has a firm position in the field.

Shear Performance Evaluation of Cast-in Specialty Inserts in Cracked Concrete according to Cyclic Loading Patterns (반복하중 패턴에 따른 균열 콘크리트에 매입된 선설치 인서트 앵커의 전단성능 평가)

  • Jeong, Sang-Deock;Oh, Chang-Soo;Lee, Chang-Hwan
    • Journal of Korean Association for Spatial Structures
    • /
    • v.23 no.2
    • /
    • pp.53-60
    • /
    • 2023
  • Recently, a novel cast-in specialty insert was developed in Korea as an anchor for lightweight pipe supports, including fire-protection pipes. As these pipe supports and anchors play a critical role in transferring loads of fire-protection pipes to structural members, it is crucial to evaluate their seismic performance before applying the newly developed insert. In this study, the seismic shear performance of the insert anchors was evaluated through cyclic loading tests based on the loading protocols of ACI 355.2 and FEMA 461. Initially, five monotonic loading tests were conducted on the insert anchors in cracked concrete, followed by cyclic loading tests based on the monotonic test results. The findings revealed that the insert anchors exhibited negligible decrease in shear strength even after cyclic loading. Furthermore, a comparison of the maximum load and displacement of the insert anchors obtained under the loading protocols of ACI 355.2 and FEMA 461 was performed to investigate the applicability of the FEMA 461 loading protocol for anchor performance evaluation.

A Study on the Lightweight Encryption Method for Secure MQTT Communication (안전한 MQTT 통신을 위한 경량 암호화 방법에 관한 연구)

  • Jeon, Yu-ran;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.82-84
    • /
    • 2022
  • In recent years, research has been actively conducted to solve overhead problems caused by the increase in the number of IoT devices. MQTT, one of the IoT lightweight protocols for resolving performance degradation in IoT environments, is standardized to enable efficient operation in many-to-many communication environments, but there is a security vulnerability as it does not provide encryption by default. Although TLS communication technology can be applied to solve these problems, it is difficult to meet IoT's lightweight power-saving requirements. This paper introduces the latest MQTT communication encryption trends and analyzes IoT applicability by comparing TLS encryption and payload encryption methods.

  • PDF

A Study on the Comparison of Reliability Between MQTT and CoAP (Confirmative Message) (MQTT와 CoAP(Confirmative message) 신뢰성 비교)

  • Ryu, Kuem-gang;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.485-487
    • /
    • 2017
  • With the growth of the IoT, security is a growing concern. Things the risk of IoT security has been constantly raised, and there have been many cases of hacking. As a result, there is a growing concern and scale about security, but there is a lack of interest and research on the message protocols between Iot devices. With the development of the IoT, the importance of low-power, lightweight and accurate message delivery will become more important and more advanced message protocols will be needed. In this paper, it is aimed to construct the system for communication between client and server of MQTT and CoAP with Confirmative option, which are most used among IoT message protocols and compare the message reliability of each communication protocol to check efficiency.

  • PDF

A Design of Infrastructure for Control/Monitoring System in the Distributed Computing Environment (분산 컴퓨팅 환경에서의 제어/감시 시스템 개발을 위한 기반 구조 설계)

  • 이원구;박재현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.547-547
    • /
    • 2000
  • Recently, due to the advance of computer, network and Internet technology, control/monitoring systems are required to process the massive data, At the same time, the software development environment uses more and more component-based methodology. This paper proposes the services for the control /monitoring domain. Especially we define domain-specific interfaces and categories to acquire compatibility between products, and implement architecture for lightweight event service. As it is very important to support compatibility between heterogeneous systems, the proposed system provides modules for the web service and communication protocols based on the XML. And as proposed architecture consists of cluster of servers and Windows 2000's NLB service, it can guarantee more stable operation,

  • PDF

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.