• Title/Summary/Keyword: protocol

Search Result 13,905, Processing Time 0.043 seconds

A Multiaceess Protocol for Packet Transmission in Mobile Satellite Systems (이동 위성 통신 시스템에서 패킷 전송을 위한 다원 접속 프로토콜)

  • 임광재;곽경섭
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.7
    • /
    • pp.17-28
    • /
    • 1994
  • A combined random/reservation multiple access protocol is proposed which can provide services for packet transmission in mobile satellite systems between mobile statons, or between mobile stations and fixed stations. Random multiple access protocol and reservation multiple access protocol which are currently employed in most satellite communication systems have some strengthes and some weeknesses in according to the kind of user and traffic. In this paper, a combined random/reservation multiple access protocol with better characteristics is proposed. The models of the modified random access protocol and the proposed access protocol is setted and analyzed. The performance of the PDAMA protocol, the random access protocol and the proposed access protocol is compared using simulation. For small packet arrival rate, the performance of the proposed access protocol is close at that of the modified random access protocol, and better than that of the PDAMA protocol. As the packet arrival rate is increased, the modified random access protocol is saturated and unstable at 0.23, and the performance of the proposed access protocol is better than that of the PDAMA protocol.

  • PDF

DESIGN AND IMPLEMENTATION OF A PROTOCOL VERIFICATION SYSTEM (프로토콜 검증시스템의 설계 및 구현)

  • Kim, Yong-Jin
    • ETRI Journal
    • /
    • v.11 no.4
    • /
    • pp.22-36
    • /
    • 1989
  • In this paper, a design and implementation of an efficient protocol verification system named LOVE has been described. The LOVE has been developed specifically for LOTOS. It performs not only protocol syntax validation (PSV) but also protocol functional verification(PFV). The PSV is a test to check if a protocol is free from protocol syntax errors such as deadlocks and livelocks. The PFV confirms whether or not a protocol achieves its functional objectives. For the PSV, the reachability analysis is employed, and the observational equivalence test is used for the PFV. For protocol verification using the LOVE, a schematic protocol verification methodology has been outlined.

  • PDF

Cryptanalysis on a Three Party Key Exchange Protocol-STPKE'

  • Tallapally, Shirisha;Padmavathy, R.
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.43-52
    • /
    • 2010
  • In the secure communication areas, three-party authenticated key exchange protocol is an important cryptographic technique. In this protocol, two clients will share a human-memorable password with a trusted server, in which two users can generate a secure session key. On the other hand the protocol should resist all types of password guessing attacks. Recently, STPKE' protocol has been proposed by Kim and Choi. An undetectable online password guessing attack on STPKE' protocol is presented in the current study. An alternative protocol to overcome undetectable online password guessing attacks is proposed. The results show that the proposed protocol can resist undetectable online password guessing attacks. Additionally, it achieves the same security level with reduced random numbers and without XOR operations. The computational efficiency is improved by $\approx$ 30% for problems of size $\approx$ 2048 bits. The proposed protocol is achieving better performance efficiency and withstands password guessing attacks. The results show that the proposed protocol is secure, efficient and practical.

Implementation of SEND Protocol in IPv6 Networks (IPv6 네트워크에서 SEND 프로토콜의 구현)

  • An, Gae-Il;Nah, Jae-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.403-410
    • /
    • 2007
  • Neighbor Discovery (ND) protocol was proposed to discover neighboring hosts and routers in IPv6 wire/wireless local networks. ND protocol, however, has a problem that it is vulnerable to network attacks because ND protocol allows malicious users to impersonate other legitimate hosts or routers by forging ND protocol messages. To address the security problem, Secure Neighbor Discovery (SEND) protocol was proposed. SEND protocol provides address ownership proof mechanism, ND protocol message protection mechanism, reply attack prevention mechanism, and router authentication mechanism to protect ND protocol. In this paper, we design and implement SEND protocol in IPv6 local networks. And also, we evaluate and analyze the security vulnerability and performance of SEND protocol by experimenting the implemented SEND protocol on IPv6 networks.

Non-Blocking Two Phase Commit Protocol Reducing the Blocking Problem (봉쇄문제를 축소한 비봉쇄 이단계 완료규약)

  • An, In-Sun;Kim, Gyeong-Chang
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.523-532
    • /
    • 2001
  • An atomic commitment protocol ensures that distributed transcations terminate consistently at participating sites. An atomic commitment protocol is said to be non-blocking if it permits transaction termination to proceed at correct participants despite of failure in the coordinator site and communication. It is well known that the famous two phase commit(2PC) is a blocking protocol, whereas the three phase commit(3PC) protocol is a non-blocking. In this paper, we propose a non-blocking two phase commit(NB-2PC) protocol reducing the blocking problem than propose non-blocking protocols. The NB-2PC protocol can be obtained through modifications of the 2PC protocol. After receiving Prepare message from coordinator in the NB-2PC protocol, participants respond to the coordinator and several participants in voting phase. While participants wait for decision message from the coordinator, the blocking occurs due to the failure of the coordinator site, participants elect new coordinator among several participants receive response message. Despite of the coordinator site failures, participants consult new coordinator and follow termination protocols and achieve non-blocking property. We propose a basic structure of NB-2PC protocol and termination protocol and new coordinator election protocol. The NB-2PC protocol has non-blocking property and reduces processing time of commit protocol than the 3PC protocol. Also, through simulation experiments, we propose the NB-2PC protocol exhibits better performance of processing time of commit protocol than 3PC protocol.

  • PDF

Verification Test of Communication Protocol for Interface between EIS and LDTS (철도신호설비 상호간 정보전송을 위한 통신 프로토콜 검증시험)

  • 황종규;이재호;윤용기;신덕호
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.2
    • /
    • pp.114-119
    • /
    • 2004
  • According to the computerization of railway signalling systems. the communication protocol for interface between these systems are required. Therefore the new communication protocol for railway signaling system is required. Generally, there are two verification method for new designed protocol in the industrial and academic fields. One is the laboratory testing method which is very popular and general technique. In our research the comparison between existing and new designed protocol for signaling is described and the verification test results are also represented. From these laboratory test, we are verified the conformance of new designed protocol. Another method is verified by formal method. The format verification method is widely used at safety-critical system design but this approach is nor popular at verification communication protocol. However it is very important to verify the safety of new designed protocol for railway signaling system because signaling systems are very safety-critical systems. So, the methodology for formal verification of designed protocol is also reviews in this paper.

Priority oriented dobule reservation probocol for very high speed wireless LANs (초고속 무선 LAN을 위한 Priority Oriented Dobule Reservation 프로토콜)

  • 조광민;정상일;강철신
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.1
    • /
    • pp.151-161
    • /
    • 1997
  • In this paper we designed a high speed wireless multiple access protocol, which is suitable for future multimedia wireless LAN systems which support high quality video teleconferencing, telephony and graphic databases. In the proposed protocol, Slotted-ALOHA protocol is used for transmitting random data packets and the packet reservation multiple access(PRMA) protocol for transmitting periodic data packets. The use of minislot is introduced for the reservation scheme. In order to measure the performance characteristic of the proposed protocol, a simulator is designed using an object oriented programming language, C++, and an exhaustive simulation study is carried out. From the simulation results, it is observed that the proposed protocol and the existing PRMA protocol have almost the same delay characteristic when network traffic is low. However, the proposed protocol is superior to the PRMA protocol when traffic becomes higher. The proposed protocol and the results can be utilized for the design of the wireless access systems and future broadband wireless LANs.

  • PDF

Implementation of a Fieldbus System Based on EIA-709.1 Control Network Protocol (EIA-709.1 Control Network Protocol을 이용한 필드버스 시스템 구현)

  • Park, Byoung-Wook;Kim, Jung-Sub;Lee, Chang-Hee;Kim, Jong-Bae;Lim, Kye-Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.7
    • /
    • pp.594-601
    • /
    • 2000
  • EIA-709.1 Control Network Protocol is the basic protocol of LonWorks systems that is emerg-ing as a fieldbus device. In this paper the protocol is implemented by using VHDL with FPGA and C program on an Intel 8051 processor. The protocol from the physical layer to the network layer of EIA-709.1 is im-plemented in a hardware level,. So it decreases the load of the CPU for implementing the protocol. We verify the commercial feasibility of the hardware through the communication test with Neuron Chip. based on EIA-709.1 protocol which is used in industrial fields. The developed protocol based on FPGA becomes one of IP can be applicable to various industrial field because it is implemented by VHDL.

  • PDF

ECDH based authentication protocol for the Apple Bonjour protocol (애플 Bonjour 프로토콜을 위한 ECDH 기반 인증 프로토콜)

  • Kwon, Soonhong;Lee, Jong-Hyouk
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.9-16
    • /
    • 2019
  • Apple provides its own protocol, the Bonjour protocol, for convenient file transmission and reception between device. Airdrop is a Bonjour-based, representative service that is widely used as a simple data transmission/reception protocol for Apple's desktops, laptops and smartphones. However, it was demonstrated in Black Hat, a hacking security conference in 2016, that it is possible to commence a Man-in-the-Middle attack by exploiting the Bonjour protocol's weak points. In this paper, we explain the Bonjour protocol's such vulnerability for secure file transmission/reception between devices and propose an ECDH (Elliptic Curve Diffie-Hellman) based authentication protocol to enhance the protocol's security. The proposed protocol is described along with detailed operational procedures, demonstrating that it is possible to reduce the possibility of Man-in-the-Middle attack and its masquerade variant.

Design and Implementation of NNI Interworking Protocol of OBP Satellite B-ISDN (OBP 탑재 위성 B-ISDN 중계망 연동 프로토콜의 설계 및 구현)

  • 박석천;김성주;서동운;강성용
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.81-84
    • /
    • 2000
  • This paper has been studied a interworking signalling protocol between two hybrid networks by analyzing Satellite B-ISDN architecture, DSS2 Layer 3 Signalling protocol B-ISUP protocol, S-BISUP protocol stack and so on. Also in the paper, messages and primitives have been defined for B-ISDN's Connection Type, Ownership and each protocol in order to connect point-to-multipoint. And then this paper has designed basic call procedures for OBP Satellite B-ISDN NNI inter-working protocol, verified and implemented them.

  • PDF