• Title/Summary/Keyword: messaging service

Search Result 161, Processing Time 0.022 seconds

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

A Study on the Dependence of Mobile Instant Messenger (모바일 인스턴트 메신저 의존도에 관한 연구)

  • Kim, Jae-Jon;Lee, Yunhee;Nho, Hee-Ock;Park, Kyung-Ja
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

A Multi-Agent Message Transfer Architecture based on the Messaging Middleware ZeroMQ (메시지 지향 미들웨어 ZeroMQ 기반의 다중 에이전트 메시지 전송 구조)

  • Chang, Hai Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.290-298
    • /
    • 2015
  • This paper suggests a multi-agent message transport architecture based on the message-oriented middleware ZeroMQ. Compared with the other middlewares such as CORBA, Ice, and Thrift, ZeroMQ receives a good score in the evaluation of performance, QoS (Quality of Service), patterns, user friendliness, and resources. The suggested message transfer architecture borrowed many basic concepts like agent platform, AMS (Agent Management System), and MTS (Message Transfer System) from FIPA (Foundation for Intelligent Physical Agents) standard multi-agent specifications, and the architecture inherited the strength of the architecture from the multi-agent framework SMAF (Smart Multi-Agent Framework). The architecture suggested in this paper is a novel peer-to-peer architecture which is not known to the ZeroMQ community. In the suggested architecture, every MTS agent uses only one ZeroMQ router socket to support peer-to-peer communication among MTS agents. The suggested architecture can support closely collaborating software areas such as intelligent robots as well as the traditional application areas of multi-agent architecture. The suggested architecture has interoperability and scalability with the ZeroMQ devices and patterns.

A System of Mobile Device Information Processing (모바일 단말 정보 처리 시스템)

  • Bang, Jin-Suk;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2135-2142
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices is HTTP headers about under using provides device information to contents provider in the provide the contents. However, There is no standard for device information provided, so interoperability problems, because external contents using mobile phone companies to provide the device information in a different way. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. However, in using the UAProf can not provide for the complete device information, because MMS support information, smart card support, information and support for external storage is not specified. Thus, In this paper, we designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessar, and it used to design and implementation of the Contents Adaptation System.

Advanced ICMP Traceback Mechanism Against DDoS Attack in Router (DDoS 공격에 대한 개선된 라우터 기반 ICMP Traceback iT법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2003
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive dating. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a 'advanced ICW Traceback' mechanism, which is based on the modified pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source, by which we can diminish network overload and enhance Traceback performance.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

AIS-ASM Standardised Communication Message Development Based on Users' Communication Needs at Sea (사용자 요구 기반의 AIS-ASM 표준통신메시지 개발에 관한 연구)

  • Choi, Seung-Hee;Ahn, Young-Joong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.6
    • /
    • pp.639-645
    • /
    • 2017
  • Application Specific Messages (ASM) have been introduced by a number of international bodies, such as the International Maritime Organization (IMO), the International Telecommunication Union (ITU) and the International Association of Lighthouse Authorities (IALA), for the purpose of resolving AIS overloading issues caused by an increasing number of ships using AIS systems. ASM communication will transmit a large amount of safety-related information at sea, including meteorological information, accident reporting, and navigational warnings. Specifically, this message transaction system is expected to be actively used for communication among ships and for ship-to-shore (4S), where VHF communication through voice was standard. In order to design a user-oriented service through standardised AIS-ASM messaging in the future, the need for analysis of this seems to be quite critical. In order to reflect users' AIS-ASM communication needs, therefore, frequently-occurring marine communication messages were analysed through a questionnaire survey conducted on 57 marine officers and 50 VTS operators. Based on the survey results, a list of key standardised messages was suggested as a reference for future AIS message development.

Effects of Foodservice Franchise's Online Advertising and E-WOM on Trust, Commitment and Loyalty

  • AHN, Sung-Man;YANG, Jae-Jang
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.2
    • /
    • pp.7-21
    • /
    • 2021
  • Purpose: One of the characteristics of service companies such as foodservice franchise is that it is easy to imitate, so many brands can imitate the menu that is popular with consumers. Therefore, foodservice franchise company should develop a brand that customers can identify from other brands in order differentiate it from its competitors. In order make the foodservice franchise company identifiable from other brands, it is possible through communication with customers. Therefore, this study proposes a new research model to analyze customer loyalty through online advertising and online word of mouth trust and immersion. Online was provided to customers through a mixture of advertisements and word of mouth, but previous studies have only considered online advertisements or online word of mouth. In addition, we want to verify the difference according to gender, which is an important variable in researching the online information processing behavior of customers. Research design, data, and methodology: The questionnaire of this study was surveyed on 20 years of age or older who have visited the restaurant franchise store within the last 3 months among the foodservice franchise companies operating SNS. During the survey period, 400 surveys were surveyed for a total of 20 days from April 1 to April 20, 2020. Result: The research results are as follows. First, in this study, the effect of online advertisement and online word of mouth on trust and immersion was studied. Second, this study verified the social influence theory in online advertising and online word of mouth. Third, the effect of online advertising and online word of mouth on loyalty according to gender was verified. Fourth, compared to existing advertisements, online advertisements are suitable for marketing by foodservice franchise companies because they can interact with consumers, modify advertisements immediately, execute extensive advertisements at low cost, segment the market, and measure advertisement effectiveness. The recent online expansion has been expanded to mobile-based, allowing foodservice franchisees to provide new communication services such as SMS (Short Message Service), multimedia messaging services, and location-based services. Fifth, a foodservice franchise company can increase brand awareness through online marketing or induce the use of offline stores. Sixth, franchisor can grow into a sustainable company only when they use resources efficiently. Conclusions: Trust is important in foodservice franchise information. This trust has a significant impact on customer commitment and loyalty.

A Study of Performance Analysis on Effective Multiple Buffering and Packetizing Method of Multimedia Data for User-Demand Oriented RTSP Based Transmissions Between the PoC Box and a Terminal (PoC Box 단말의 RTSP 운용을 위한 사용자 요구 중심의 효율적인 다중 수신 버퍼링 기법 및 패킷화 방법에 대한 성능 분석에 관한 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.54-75
    • /
    • 2011
  • PoC(Push-to-talk Over Cellular) is an integrated technology of group voice calls, video calls and internet based multimedia services. If a PoC user can not participate in the PoC session for various reasons such as an emergency situation, lack of battery capacity, then the user can use the PoC Box which has a similar functionality to the MM Box in the MMS(Multimedia Messaging Service). The RTSP(Real-Time Streaming Protocol) method is recommended to be used when there is a transmission session between the PoC box and a terminal. Since the existing VOD service uses a wired network, the packet size of RTSP-based VOD service is huge, however, the PoC service has wireless communication environments which have general characteristics to be used in RTSP method. Packet loss in a wired communication environments is relatively less than that in wireless communication environment, therefore, a buffering latency occurs in PoC service due to a play-out delay which means an asynchronous play of audio & video contents. Those problems make a user to be difficult to find the information they want when the media contents are played-out. In this paper, the following techniques and methods were proposed and their performance and superiority were verified through testing: cross-over dual reception buffering technique, advance partition multi-reception buffering technique, and on-demand multi-reception buffering technique, which are designed for effective picking up of information in media content being transmitted in short amount of time using RTSP when a user searches for media, as well as for reduction in playback delay; and same-priority packetization transmission method and priority-based packetization transmission method, which are media data packetization methods for transmission. From the simulation of functional evaluation, we could find that the proposed multiple receiving buffering and packetizing methods are superior, with respect to the media retrieval inclination, to the existing single receiving buffering method by 6-9 points from the viewpoint of effectiveness and excellence. Among them, especially, on-demand multiple receiving buffering technology with same-priority packetization transmission method is able to manage the media search inclination promptly to the requests of users by showing superiority of 3-24 points above compared to other combination methods. In addition, users could find the information they want much quickly since large amount of informations are received in a focused media retrieval period within a short time.

Design and Implementation of IoT Chatting Service Based on Indoor Location (실내 위치기반 사물인터넷 채팅 서비스 설계 및 구현)

  • Lee, Sunghee;Jeong, Seol Young;Kang, Soon Ju;Lee, Woo Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.920-929
    • /
    • 2014
  • Recently, embedded system which demand is explosively increasing in the fields of communication, traffic, medical and industry facilities, expands to cyber physical system (CPS) which monitors and controls the networked embedded systems. In addition, internet of things(IoT) technology using wearable devices such as Google Glass, Samsung Galaxy Gear and Sony Smart Watch are gaining attention. In this situation, Samsung Smart Home and LG Home Chat are released one after another. However, since these services can be available only between smart phones and home appliances, there is a disadvantage that information cannot be passed to other terminals without commercial global messaging server. In this paper, to solve above issues, we propose the structure of an indoor location network based on unit space, which prevents the information of the devices or each individual person from leaking to outside and can selectively communicate to all existent terminals in the network using IoT chatting. Also, it is possible to control general devices and prevent external leakage of private information.