• Title/Summary/Keyword: message protocol

Search Result 948, Processing Time 0.027 seconds

The Implementation of E-Mail Extraction Engine in Mobile Using Markup Language Converter (마크업 언어 변환기를 이용한 모바일용 전자우편 추출엔진 구현)

  • 박영삼;최병철;정영지
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.265-267
    • /
    • 2002
  • 유선 인터넷 망의 Mail 서비스에는 POP3(Post Office Protocol 3)규약과 IMAP4 (Internet Message Access Protocol 4)규약을 기반으로 하는 Mail 등이 있다. 무선 인터넷을 이용한 모바일 메일 서비스를 위해서는, POP3 Mail의 경우 전용 모바일 메일 서버를 이용하거나 메일 변환을 거쳐야 하고. Web Mail로 이용되는 IMAP4 메일의 경우에는 원격 파일 서버와 같이 서버 측에 메일이 보관되므로 IMAP4 규약이 없는 모바일 클라이언트로는 모바일 메일 서비스의 이용이 곤란하다. 본 논문에서는 XML 기반의 마크업 언어 변환기를 설계하고. 최근 보편화되고 있는 IMAP4 기반의 Web Mail을 모바일에서 이용할 수 있도록 하는 모바일용 메일 추출 엔진을 구현함으로써, POP3 메일 서비스뿐만 아니라 IMAP4를 기반으로 하는 Web Mail을 모바일 환경에서 이용할 수 있도록 하는 모바일 메일 서비스 방법을 제시하였다.

  • PDF

A Brief Consideration on the Security of Hash-Based Authenticator (해시 기반 인증자 안전성 고찰)

  • Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.609-612
    • /
    • 2016
  • Authenticated key exchange protocol achieves its authentication by using hash-based authenticator with input of common message and session key that agrees between participants. In the letter, we show that this approach cannot satisfy the entire security, through a recent example protocol that is proposed by Tsai et al, 2014, if the input of authenticator has been insecurely designed.

Energy-Aware Node Selection Scheme for Code Update Protocol (코드 업데이트 프로토콜에서 에너지 잔존량에 따른 노드선정 기법)

  • Lee, Seung-Il;Hong, Won-Kee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.39-45
    • /
    • 2010
  • As wireless sensor network are being deployed in a wide variety of application areas, the number of sensor nodes in a sensor filed becomes larger and larger. In the past, ISP (In-System Programming) method have been generally used for code update but the large number of sensor nodes requires a new code update method called network reprogramming. There are many challenging issues for network reprogramming since it can make an impact on the network lifetime. In this paper, a new sender selection scheme for network reprogramming protocol is proposed to decrease energy consumption for code update by minimizing overlapped area between sender nodes and reducing data contention. Simulation results show that the proposed scheme can reduce the amount of message traffic and the overall data transmission time.

Development of The DCCP for Data Reliability in IP Traffic System (IP기반 교통시스템에서 데이터의 신뢰성을 위한 DCCP 개발)

  • Park, Hyun-Moon;Seo, Hae-Moon;Lee, Gil-Yong;Park, Soo-Hyun;Kim, Sung Dong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.7-17
    • /
    • 2010
  • ITS(Intelligent Transport System) as things are used for Broadcast service using TDMB/TPEG/NAVI rather than personal seamless service. It is attaching weight to Traffic information gathering, Charging, Settlement service. This research is applied to improve DCCP(Datagram Congestion Control Protocol) which has function as protecting data and preserving message boundary. The improving method is like that we solve data trust in UDP because Connection and Transmission overhead in UDP is less than in TCP. We fix the data loss which is generated from unordered delivery section of IP base wireless service by using DCCP protocol. We guarantee of connection with OBE(On-Board Equipment) and reliance about transmission of data by complement to mapping table and multi-hoping. Finally, We evaluate the performance about transmission of IP based data. We constructed a test-bed near research center for this test.

Development of a Gateway System for Social Network Services

  • Kwon, Dongwoo;Jung, Insik;Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.118-125
    • /
    • 2015
  • In this paper, we propose a method to reduce mobile social network services (SNSs) traffic using a mobile integrated SNS gateway (MISG) to improve network communication performance between the mobile client and SNS servers. The gateway connects the client and SNS servers using the contents adapter and the web service adapter and helps to improve communication performance using its cache engine. An integrated SNS application, the user's client, communicates with the gateway server using integrated SNS protocol. In addition, the gateway can alert the client to new SNS contents because of the broker server implemented by the message queuing telemetry transport protocol. We design and develop the modules of the gateway server and the integrated SNS application. We then measure the performance of MISG in terms of content response time and describe the result of the experiment.

Study of Cluster Tree Routing Protocols (클러스터 트리 라우팅 프로토콜 연구)

  • Cho, Moo-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.8
    • /
    • pp.138-143
    • /
    • 2005
  • A hierarchical tree structure of clusters has advantages for the network design due to its scalability and simple routing protocol. In this paper, the cluster tree routing protocol is studied for the wireless sensor network. From the numerical analysis results, the data aggregation in the intermediate nodes reduces the number of communication message and saves the energy of sensor nodes, but it may result in increased data traffic latency. And also the selection of cluster head can increase the relaying hops very high.

A Study on the Implementation of Fieldbus-Based Manufacturing Automation Systems (필드버스를 이용한 생산자동화 시스템 구축 기술 연구)

  • Hong, Seung-Ho;Park, Tae-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.3 s.96
    • /
    • pp.91-102
    • /
    • 1999
  • Fieldbus provides real-time data communication among field devices in the manufacturing automation and process control systems. In this study, an experimental model of fieldbus-based manufacturing automation system is developed. Experimental model consists of two robots, two conveyor belts, NC machine, PLC, sensors and operator station. These machines are interconnected into the Profibus network, and exchange their data through the services provided by FMS(Fieldbus Message Specification), which is the application layer protocol of Profibus. The experimental model is used to measure the network-induced delay of variable and file data transmitted through FMS services. Network-induced delays are collected and analyzed on each sublayer of Profibus protocol stack. The results obtained from the experiment of this study can be effectively utilized when fieldbus is implemented on the practical manufacturing automation systems.

  • PDF

Wireless Networked Control Systems Using IEEE 802.15.4 (IEEE 802.15.4기반의 제어용 무선 네트워크에 대한 연구)

  • Lee, Jung-Il;Choi, Dong-Hyuk;Kim, Dong-Sung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.289-292
    • /
    • 2006
  • In this paper, a wireless control network based on IEEE 802.15.4 MAC protocol is proposed. The superframe of IEEE 802.15.4 is applied to the proposed wireless control network. The transmission and bandwidth management method are proposed for efficient transmission in the superframe. By these methods, the proposed wireless control network protocol is able to transmit three types of data (periodic data, sporadic data, and non real-time message), and guarantee real-time transmission within deadline.

  • PDF

Efficient Three-Party Password Authenticated Key Exchange for Client-to-Client Applications

  • Yang, Yanjiang;Bao, Feng
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.249-257
    • /
    • 2008
  • Nowadays, client-to-client applications such as online chat (e.g. MSN) and SMS (Short Message Services) are becoming increasingly prevalent. These client-to-client applications are revolutionizing the way we communicate. Three-party PAKE (password authenticated key exchange) protocols provide a means for the two communicating parties holding passwords to establishment a secure channel between them with the help of a common server. In this paper, we propose an efficient three-party PAKE protocol for the client-to-client applications, which has much better performance than the existing generic constructions. We also show that the proposed protocol is secure in a formal security model.

Quantum Computing Cryptography and Lattice Mechanism

  • Abbas M., Ali Al-muqarm;Firas, Abedi;Ali S., Abosinnee
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.242-249
    • /
    • 2022
  • Classical cryptography with complex computations has recently been utilized in the latest computing systems to create secret keys. However, systems can be breached by fast-measuring methods of the secret key; this approach does not offer adequate protection when depending on the computational complexity alone. The laws of physics for communication purposes are used in quantum computing, enabling new computing concepts to be introduced, particularly in cryptography and key distribution. This paper proposes a quantum computing lattice (CQL) mechanism that applies the BB84 protocol to generate a quantum key. The generated key and a one-time pad encryption method are used to encrypt the message. Then Babai's algorithm is applied to the ciphertext to find the closet vector problem within the lattice. As a result, quantum computing concepts are used with classical encryption methods to find the closet vector problem in a lattice, providing strength encryption to generate the key. The proposed approach is demonstrated a high calculation speed when using quantum computing.