• Title/Summary/Keyword: protocol Analysis

Search Result 2,541, Processing Time 0.029 seconds

Cross-Layer Analysis of Wireless TCP/ARQ Systems over Correlated Channels

  • Wu Yi;Niu Zhisheng;Zheng Junli
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • In this paper, we present a cross-layer analysis of wireless TCP systems over correlated channels. The effects of error correlation on the behavior of link retransmission strategy and the end-to-end throughput of TCP layer are investigated. Based on the cross-layer analysis, an efficient refinement of link layer protocol is proposed by consciously utilizing the information of channel correlations, which leads to the performance improvement of wireless TCP systems.

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.

The Modified Aviation TDMA Protocol for an Improvement in Aeronautical RF Spectrum Utilization (항공통신에서 효율적인 RF 주파수 활용을 위한 항공용 TDMA 변형 프로토콜)

  • Park, Hyo Dal
    • Journal of Advanced Navigation Technology
    • /
    • v.1 no.1
    • /
    • pp.47-58
    • /
    • 1997
  • In this paper, the modified aviation TDMA protocol that can improve the aeronautical communication spectrum utilization is studied to satisfy the increasing air traffic demands. Currently European states proposed the scheme reducing the channel spacing from current 25 kHz to 8.33 kHz and U. S. FAA proposed the system using TDMA technique that divides access into four parallel circuits. The modified aviation TDMA protocol can complement the defects of these current systems. In modified aviation TDMA protocol, message channel that is used between aircraft and ground station is divided into uplink channel and downlink channel. After receiving the acknowledgement of the reservation request, aircraft sends messages at the allocated slots. Numerical analysis and simulation results show that the modified aviation TDMA scheme has high channel efficiency in the aviation environment.

  • PDF

Media Access Control Protocol Considering MANET of Underwater Environment (수중 환경의 MANET을 고려한 매체 접근 제어 프로토콜)

  • Shin, Seung-Won;Yun, Nam-Yeol;Lee, Jin-Young;Lee, Seung-Joo;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.4
    • /
    • pp.97-107
    • /
    • 2013
  • Underwater wireless communication systems can be useful for underwater environment observation, catastrophe prevention, ocean resources exploration, ocean organism research, vessel sinking exploration, and so on. However, unlike terrestrial wireless communication, underwater wireless communication should consider factors such as long propagation delay, limited transmission capacity, high bit-error rate due to potential loss in power, ambient noise, man-made noise, multi-path, etc., because of the inherent characteristics of water. Thus, in this paper, we propose a suitable media access control(MAC) protocol that applies a combination of the ALOHA MAC protocol and the CSMA/CA MAC protocol to underwater environment. We further propose a mathematical analysis model to evaluate performance. We also verify performance improvement in the proposed scheme in comparison with existing MAC protocols.

Intelligent Intrusion Detection and Prevention System using Smart Multi-instance Multi-label Learning Protocol for Tactical Mobile Adhoc Networks

  • Roopa, M.;Raja, S. Selvakumar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2895-2921
    • /
    • 2018
  • Security has become one of the major concerns in mobile adhoc networks (MANETs). Data and voice communication amongst roaming battlefield entities (such as platoon of soldiers, inter-battlefield tanks and military aircrafts) served by MANETs throw several challenges. It requires complex securing strategy to address threats such as unauthorized network access, man in the middle attacks, denial of service etc., to provide highly reliable communication amongst the nodes. Intrusion Detection and Prevention System (IDPS) undoubtedly is a crucial ingredient to address these threats. IDPS in MANET is managed by Command Control Communication and Intelligence (C3I) system. It consists of networked computers in the tactical battle area that facilitates comprehensive situation awareness by the commanders for timely and optimum decision-making. Key issue in such IDPS mechanism is lack of Smart Learning Engine. We propose a novel behavioral based "Smart Multi-Instance Multi-Label Intrusion Detection and Prevention System (MIML-IDPS)" that follows a distributed and centralized architecture to support a Robust C3I System. This protocol is deployed in a virtually clustered non-uniform network topology with dynamic election of several virtual head nodes acting as a client Intrusion Detection agent connected to a centralized server IDPS located at Command and Control Center. Distributed virtual client nodes serve as the intelligent decision processing unit and centralized IDPS server act as a Smart MIML decision making unit. Simulation and experimental analysis shows the proposed protocol exhibits computational intelligence with counter attacks, efficient memory utilization, classification accuracy and decision convergence in securing C3I System in a Tactical Battlefield environment.

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Effect of Accession to OPRC-HNS Protocol on Korean Industry (OPRC-HNS 의정서 가입이 국내 산업계에 미치는 영향)

  • Choi, Jong-Wook;Lee, Seung-Hwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.4
    • /
    • pp.37-42
    • /
    • 2007
  • Since the OPRC-HNS Protocol entered into forced in the June of 2007, the potential effects on industrial circles are encouraged to be analyzed according to the obligatory regulations listed in the Protocols. This study was conducted on the quantitative analysis of the possible effect on the industrial circles if Korea accedes to OPRC-HNS Protocol. In spite of any burdens caused by keeping "accident emergency program memorandum" and performing "education and any training program for the crews", potential decrease of insurance fee is in possibility provided it follows. In addition, the oil refinery and petrochemical industries may also have burdens for potential costs for acquiring any materials including equipments and fees for education and training related to HNS. However, minimizing any costs by swift response against accidents would be big advantage that comes with paying of small amounts of expense by international convention related to HNS.

  • PDF

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

A Study on the Performance Analysis of the DOCSIS 1.1 Protocol for Digital CATV Broadcasting (디지털 유선방송을 위한 DOCSIS 1.1 프로토콜의 성능분석에 관한 연구)

  • Kim Soo-Hee;Sohn Won;Kim Young-Soo;Hong Een-Kee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11A
    • /
    • pp.1253-1262
    • /
    • 2004
  • The Data Over Cable System Interface Specification (DOCSIS) protocol enables the delivery of Internet Protocol(IP) traffic over Cable TV networks with significantly higher data rates. In this paper, we assessed the performance of the DOCSIS protocol using the OPNET. The simulation can be used to predict the upstream system throughput, mean access delay and channel utilization on varying packet size and transmission stream and wid/without concatenation, and it has shown that maximum system throughput is 4.6 Mbps for channel capacity of 5.12 Mbps and packet size of 1500 bytes. The mean access delay varies depending on the offered load, and it is assumed that the offered load does not exceed the capacity of the channel. Excess offered load causes service starvation according to the assigned priority.

Strong Yoking Proof Protocols for RFID Tags (RFID tag를 위한 강력한 Yoking Proof Protocols)

  • Cho, Jung-Sik;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.310-318
    • /
    • 2007
  • The RFID system is a non-contact automatic identification system that identifies tags through a reading device by attaching small, inexpensive tags on goods. This system is expected to supplant barcodes, the contactless reading technique that is most widely used at present. The RFID system can be applied in a variety of areas. Among those, Ari Juels proposed an environment to prove that a pair of tags has been scanned simultaneously And he presented a yoking proof protocol for this. But the yoking-proof protocol is vulnerable to replay attack. Although modified yoking-proof protocols for alleviating this drawback have been proposed, they are not immune to replay attack, either. In this paper, we analyze problems of existing yoking-proof protocols and present a new protocol, which will make replay attack difficult, based on this analysis. We have also extend this protocol so that it can provide yoking proofs for n tags.