• Title/Summary/Keyword: message protocol

Search Result 948, Processing Time 0.034 seconds

An Authentication Scheme using Polynomial Equation of GF($2^n$) In ZK-Proof Protocol (GF($2^n$)의 다항식을 이용한 영지식 증명의 인증 기법)

  • 이원희;전문석;이철희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.1
    • /
    • pp.150-156
    • /
    • 1993
  • This paper studies an Authentication sheme which is used polynomial equation over GF(2n)for reducing time to authenticate sender and his message in secret data communication. Also in order to maintain strong secrecy, this scheme use interactive Zero-knowledge proof protocol for generating information of sender's authentication via unprotected communication channel.

  • PDF

Performance of burst-level bandwidth reservation protocols for multiple hop ATM LANs (다중 HOP으로 구성된 ATM LAN용 버스트 레벨의 대역 예약프로토콜의 성능분석)

  • 윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1200-1207
    • /
    • 1996
  • The paper presents and analyzes two efficient burst-level bandwidth reservation protocols for multi-hop ATM Local Area Networks. With the tell-and-wait (TNW) protocol and the tell-and-go (TNG) protocol[6], a negative acknowledgmen(NACK) message representing the bandwidth starvation on a switch on the source-destnation path can be always sent by a destination. We note that the protocols waste more bandwidth as the round-trip delay increases, since the switches on the path must reserve the bandwidth until the NACK will arrive. Based on this pitfall, the proposed protocols allow and ATM node, rather than a destination node to send a NACK. This allowance can save the needless bandwidth wastage. Using the thinned load approximation method, we show the proposed protocols have good performance and practical simplicity. Thus, the proposed protocols may be candidates for the ABR service in multi-hop ATM LANs and ATM WANs.

  • PDF

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Prioritized Data Transmission Mechanism for IoT

  • Jung, Changsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2333-2353
    • /
    • 2020
  • This paper proposes a novel data prioritization and transmission mechanism to minimize the number of packets transmitted and reduce network overload using the constrained application protocol (CoAP) in resource-constrained networks. The proposed scheme adopts four classification parameters to classify and prioritize data from a sensor. With the packet prioritization scheme, the sensed data having the lowest priority is only delivered using the proposed keep-alive message notification to decrease the number of packets transmitted. The performance evaluation demonstrates that the proposed scheme shows the improvement of resource utilization in energy consumption, and bandwidth usage compared with the existing CoAP methods. Furthermore, the proposed scheme supports quality-of-service (QoS) per packet by differentiating transmission delays regarding priorities.

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

A study on the implementation of MMS in Mini-MAP (Mini-MAP에서의 MMS 구현에 관한 연구)

  • Kim, H.;Kang, M. S.;Park, M.;Lee, S. B.;Kong, H. T.;Choi, M. S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.745-748
    • /
    • 1990
  • MMS (Manufacturing Message Specification) is a communications standard of MAP (Manufacturing Automation Protocol), which is a Network Protocol for Industrial Automation. In the environment of Mini-MAP, MMS is situated in the application layer and on the LLC (Logical Link Control) layer. In this paper, MMS software is implemented on the basis of ISO DIS 9506. The implemented software was tested with Token Passing Bus Network Interface Unit, which was designed in our laboratory and performs the actions of layer 1 and 2.

  • PDF

Design and Implementation of RPL-based Distributed MQTT Broker Architecture (RPL 기반 분산 MQTT 브로커 구조 설계 및 구현)

  • An, Hyunseong;Sa, Woojin;Kim, Seungku
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.9
    • /
    • pp.1090-1098
    • /
    • 2018
  • MQTT is a lightweight messaging protocol that can be used for low power IoT devices. The MQTT basically uses single MQTT broker to indirectly share message information between publishers and subscribers. This approach has a weakness in regard to traffic overflow, connection fault, security, etc. In this paper, we propose a distributed MQTT broker architecture that solves the problems in single MQTT broker structure. The distributed MQTT broker architecture is expected to support new application services that cannot be supported by a conventional MQTT architecture. We have designed and implemented a distributed MQTT broker architecture based on the RPL protocol that has been widely used for IoT network. The experiment results show that the proposed MQTT broker architecture represents better publishing/subscribing latency and network stability than the conventional MQTT broker architecture.

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

Development of Test Cases of STEP AP216 for the Exchange of Hullform Data (선형정보 교환을 위한 STEP AP216 Test Case 개발)

  • 이순섭;김용대;서정우;김수영
    • Korean Journal of Computational Design and Engineering
    • /
    • v.8 no.3
    • /
    • pp.141-149
    • /
    • 2003
  • The ship STEP is an international standard for the computer-interpretable representation of ship product information and for the exchange of ship product model data. The ship STEP consists of several APs(Application Protocol), such as AP215(ship arrangement), AP216(ship moulded form), AP218(ship structures), AP226(ship mechanical systems), and AP234(operating logs, records, message). The STEP AP216(ISO 10303) are an application protocol for the exchange of ship arrangement and ship moulded forms. The AP216 specifies the geometric shape and the hydrostatic properties of the ship moulded form. This paper introduces the state-of-the-art of ship STEP AP216 and develops the test case for the validation of data structure of AP216.

A Study on the Design of Addressing in Defense Computer Network (국방전산망의 주소지정방식 설계에 관한 연구)

  • Park Jong-Tae;Kim Hwa-Su;Ra Yong-Su
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.2
    • /
    • pp.44-55
    • /
    • 1992
  • According to the plan on Defense Computer Network, hundreds of troops and ten thousands of end users will be joined in the Defense Computer Networn the near future. Thus, we need hierarchical addressing methods between source station and destination station in order to send a message efficiently. On the basis of the above background, we proposed the addressing methods for both TCP/IP environment which is a current standard protocol and OSI environment which will be a future protocol in this paper. The network interface. routings and address management have considered in our proposed addressing methods.

  • PDF