• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.026 seconds

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

  • Lim, Meng-Hui;Goi, Bok-Min;Lee, Sang-Gon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.822-839
    • /
    • 2011
  • Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.

Simulation Performance Evaluation of KNX and LnCP network (Konnex 와 LnCP 네트워크의 시뮬레이션 성능 평가)

  • 최병훈;하경남;김현희;이경창;이석
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.203-206
    • /
    • 2004
  • Recently home network has been developed in the field of Information Technology. And there are many protocols for smart home, such as Lonworks, Echonet, KNX, LnCP etc. However, the performance evaluation has not been nearly known between the protocols. Hence, this paper evaluates the performance of KNX by Konnex Association and LnCP(Living network Control Protocol) by LG Electronics. We developed simulation model using flowchart of KNX and LnCP and simulation scenario through analysis of message to be generated in the home network. Furthermore, we evaluate simulation performance, such as mean transmission delay, maximum transmission delay, and collision rate of both protocols.

  • PDF

Implementation of ISDN User/Network Protocol Analyzer on PC-based System (PC 환경에서 ISDN 사용자/망 프로토콜 분석기의 개발)

  • 정중수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1068-1073
    • /
    • 1999
  • On the emergence of ISDN which has been introduced in the year 1980, various services are supported. This paper presents implementation of ISDN user/network protocol analyzer based on PC-extension card. Firmware and software are loaded on the PC-extension card using PC 05. The performance analysis on D-channel signalling on this system is surveyed. The monitoring results satisfiy with ISDN BRI or PRI interfaces.

  • PDF

Performance Analysis of TCP Using ErrorModel (에러 모델을 적용한 TCP의 성능 분석)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.31-36
    • /
    • 2007
  • TCP (Transmission Control Protocol) is one of the protocols which are widely used from the Internet environments. Through the flow control of TCP, it could be increased efficiency for the loss and a re-transmission of data and the flow control become accomplished through window technique which puts the limit of size. By the flow control, TCP divided in various versions. In this paper, it is analyzed the simulation result which applies the error model in the Newreno which is an improved model of the representative Tahoe, Reno.

  • PDF

Performance analysis of Mobile Hosts based on On-Demand Ad-Hoc Networks (On-Demand Ad-Hoc망에서의 이동 호스트의 성능분석)

  • 하윤식;송창안;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.213-217
    • /
    • 2003
  • An Ad-Hoc networks is a set of wireless mobile host which forms temporary networks without any concentrated controls or any helps of standard support services. Mobile host' routers are operated by their mobile hosts without fixed routers, therefore, the original routing protocol algorithm are not effective. There are two major Protocols in Ad-Hoc Network. A Table-Driven algorithm and an On-Demand, but the latter is presented more effective. We try to compare and analyze the performances of each protocol's host in this thesis.

  • PDF

Analytic Model for Performance Evaluation of B-MAC Protocol under Contention Transmission Condition of Two Senders (두 개의 송신 노드가 경쟁하는 상황의 B-MAC 무선 센서 네트워크 프로토콜 성능 분석을 위한 분석적 모델)

  • Jung, Sung-Hwan;Kwon, Tae-Kyoung
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.3
    • /
    • pp.137-153
    • /
    • 2009
  • In this paper, we present an analytic model that evaluates the performance of B-MAC protocol under contention transmission conditions of two senders in a single-hop wireless sensor network. Our model considers the impact of several important factors such as sleep cycle, the backoff mechanism and incoming traffic loads. After obtaining the service delay distribution of a sending node and expected delay of a receiving node, an iterative algorithm is presented for calculating the performance measures such as expected energy consumption usage per packet and latency. Simulation results show that the proposed analytic model can accurately estimate the performance measures under different traffic conditions.

Analysis of Optimistic Cache Protocols based on broadcasting for Mobile Computing Environments (이동 컴퓨팅 환경에서 방송기반의 낙관적 캐쉬 프로토콜들에 대한 분석)

  • Cho, Sung-Ho
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.177-185
    • /
    • 2005
  • Caching in mobile computing environments Is an important technique that will reduce the effects such as limitation of bandwidth, restriction of resources and frequent disconnection. To reduce limitation and disconnection problems in mobile computing, a new form of caching system have been proposed based on a broadcast approach. This paper proposes a broadcast based cache protocol and examines the behaviors of the proposed scheme and well known schemes such as multiversion based scheme and Certification Reports. By a detailed simulation, we show some characteristics of different approaches to detect and resolve conflicts. We also show proposed scheme out performs other schemes with a low space and operation overhead.

  • PDF

OFSA: Optimum Frame-Slotted Aloha for RFID Tag Collision Arbitration

  • Lee, Dong-Hwan;Choi, Ji-Hoon;Lee, Won-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1929-1945
    • /
    • 2011
  • RFID technologies have attracted a lot of attention in recent years because of their cost/time-effectiveness in large-scale logistics, supply chain management (SCM) and other various potential applications. One of the most important issues of the RFID-based systems is how quickly tags can be identified. Tag collision arbitration plays a more critical role in determining the system performance especially for passive tag-based ones where tag collisions are dealt with rather than prevented. We present a novel tag collision arbitration protocol called Optimum Frame-Slotted Aloha (OFSA). The protocol has been designed to achieve time-optimal efficiency in tag identification through an analytic study of tag identification delay and tag number estimation. Results from our analysis and extensive simulations demonstrate that OFSA outperforms other collision arbitration protocols. Also, unlike most prior anti-collision protocols, it does not require any modification to the current standards and architectures facilitating the rollout of RFID systems.