• Title/Summary/Keyword: protocol Analysis

Search Result 2,510, Processing Time 0.033 seconds

Secure Membership Protocol for ZigBee Network (ZigBee 네트워크에서의 안전한 멤버쉽 프로토콜)

  • Kim, Bong-Hwan;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.405-416
    • /
    • 2013
  • ZigBee is a wireless sensor network protocol recognized as a next-generation standard infrastructure for WBAN and Smart Grid. Security plays an important role in several ZigBee applications. Especially, strict membership control should be enforced when the membership is changed during the join and leave operations in ZigBee. In this paper, we investigate the security weakness of the current leave operation in ZigBee and propose a new security scheme to address it as well as its security and performance analysis.

OPF considering CO2 emission constraints and the emission trading mechanism (CO2 배출제약 조건과 배출권 거래제를 고려한 OPF)

  • Kim, Yang-Il;Han, Seok-Man;Chung, Koo-Hyung;Park, Kyung-Han;Kim, Bal-Ho H.
    • Proceedings of the KIEE Conference
    • /
    • 2006.07a
    • /
    • pp.343-344
    • /
    • 2006
  • Consumption of fossil fuel has been increasing steadily, and it has seriously affected environment. Due to this situation, UN establish ed UNFCC (United rations Framework Convention on Climate Change), and since Feb. 2005, Kyoto Protocol has come into effect for UNFCC obligation. In Korean power system, coal and oil thermal generation emitting large CO2 form about 46% of total generation. Moreover since electricity dem and has been increasing continuously, various alternatives should be designed to comply with Kyoto Protocol. In this paper, we analyze changes of each GENCO's generation pattern and resource planning under CO2 emission constraints. For this analysis, we incorporate CO2 emission constraints and the emission trading mechanism into the conventional OPF model.

  • PDF

A Performance Analysis of the Reliable Multipeer Protocol(ReMP) for dynamic Multimedia Group communications (동적 멀티미디어 그룹 통신을 위한 신뢰성 있는 다자간 전송 프로토콜 (ReMP)의 성능 분석)

  • Son, Ji-Yeon;Won, Yu-Jae;O, Su-Hyeong;Im, Gyeong-Sik;Hwang, Seung-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.1
    • /
    • pp.149-160
    • /
    • 1998
  • ReMP(Reliable Multipeer Protocol)는 멀티미디어 그룹 통신을 지원하기 위해 설계된 신뢰성 있는 다자간 전송 프로토콜이다ㅣ. 본 논문에서는 ReMP가 제한된 환경에서도 올바르게 동작함을 증명하였으며, 호스트에서의 처리량 관점에서 데이터 전송에 대한 성능 분석을 시도하였다. 또한 이를 토대로 ReMP는 성능이나 메모리 요구량 관점에 비추어 볼 때, 다른 비교 대상 프로토콜들보다 광범위한 용도의 멀티미디어 그룹 통신에 적용되어질 수 있음을 알 수 있다.

  • PDF

Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.4 no.2
    • /
    • pp.103-114
    • /
    • 2020
  • A new optical asymmetric cryptosystem is proposed by modifying the asymmetric RSA public-key protocol required in a cryptosystem. The proposed asymmetric public-key algorithm can be optically implemented by combining a two-step quadrature phase-shifting digital holographic encryption method with the modified RSA public-key algorithm; then two pairs of public-private keys are used to encrypt and decrypt the plaintext. Public keys and ciphertexts are digital holograms that are Fourier-transform holograms, and are recorded on CCDs with 256-gray-level quantized intensities in the optical architecture. The plaintext can only be decrypted by the private keys, which are acquired by the corresponding asymmetric public-key-generation algorithm. Schematically, the proposed optical architecture has the advantage of producing a complicated, asymmetric public-key cryptosystem that can enhance security strength compared to the conventional electronic RSA public-key cryptosystem. Numerical simulations are carried out to demonstrate the validity and effectiveness of the proposed method, by evaluating decryption performance and analysis. The proposed method shows feasibility for application to an asymmetric public-key cryptosystem.

The Study on Security Vulnerabilities in IPv6 Autoconfiguration

  • Kim, Myung-Eun;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1545-1549
    • /
    • 2005
  • According as computer is supplied in a lot of homes and offices and Internet use increases, various service based on the Internet. Including wireless PDA in the future, many devices such as Internet telephone, TV, refrigerator and oven will be connected on the Internet and Internet address exhaustion will be raised to serious problem gradually. Today, the IPv4 address exhaustion problem has been solved partially using NAT (Network Address Translation) however, the transition to next Generation Internet will be accelerated because of advantages such as mobility, security service, QoS, and abundant IP addresses. In IPv6, all hosts are designed to create and set their address automatically without manager's intervention using Neighbor Discovery Protocol. But, when an IPv6 host sets its address automatically, there are serious security vulnerabilities. In this paper, we analysis security vulnerabilities in auto-configuration and provide security requirements for secure auto-configuration.

  • PDF

Multi-Homing RTP (mhRTP) for QoS-guaranteed Vertical Handover in Heterogeneous Wireless Access Networks

  • Kim, Igor;Kim, Young-Tak
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.185-194
    • /
    • 2010
  • In this paper, we propose an application layer-based vertical handover management protocol, called multihoming RTP (mhRTP), for real-time applications with seamless mobility across heterogeneous wireless access networks. The proposed multi-homing RTP provides a soft handover by utilizing multiple available wireless access network interfaces simultaneously. The newly available path is dynamically added to the ongoing session by the mhRTP session manager. Also the decision making of QoS-improving or QoS-guaranteed handover is possible based on the estimation of available bandwidth in each candidate network. The performances of the proposed mhRTP have been analyzed through a series of simulations on OPNET network simulator. From the performance analysis, we confirmed that the proposed mhRTP can provide QoS-guaranteed vertical handover with efficient session managements.

An Analysis for Efficient Appliance of TDL Protocol and IP on Link-K System (한국형전술데이터링크(Link-K)에서 TDL 프로토콜과 IP의 효과적인 적용방안 분석)

  • Jee, Seung-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.25-32
    • /
    • 2008
  • In this paper, we propose how to efficiently apply IP and TDL(Tactical Datalink) protocol to the Link-K network for using their applications on the host system. We classify 3 kinds of communication method between IP network and TDL network. We explain the concepts of Like-to-Like communication (Link-K over IP, IP over Link-K) and Any-to-Any communication. We describe the characteristics and the implementation range of tactical datalink processor for each communication method.

Outage Capacity Analysis for Cooperative DF and AF Relaying in Dissimilar Rayleigh Fading Channels

  • Shrestha, Suchitra;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.4A
    • /
    • pp.361-370
    • /
    • 2008
  • Cooperative relaying permits one or more relay to transmit a signal from the source to the destination, thereby increasing network coverage and spectral efficiency. The performance of cooperative relaying is often measured as outage probability. However, appropriate measure for the channel quality is outage capacity. Although the outage probability for cooperative relaying protocol has been analyzed before, very little research has been addressed for the outage capacity. This paper is the first of its kind to derive a closed-form analytical solution of outage capacity using fixed decode and forward relaying and amplify and forward relaying in dissimilar Rayleigh fading channels, considering channel coefficients known to the receiver side. The analytical results show a tradeoff between the SNR and the number of relays for specific outage capacity. A comparison between decode and forward relaying and amplify and forward relaying shows that decode and forward relaying outperforms amplify and forward relaying for a large number of relays.

Analysis of a finite buffer with service interruption in a network interface unit (서비스 가로채기가 있는 네트워크 접속장치내의 유한버퍼의 분석)

  • 김영한
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.2
    • /
    • pp.1-7
    • /
    • 1996
  • In this paper, we analyzed the packet blocking probability of a finite buffer in a network interface unit. In general, a network interface unit which provides a means of interface between the network and computer has a microprocessor and a protocol processor for the network access protocols. It also has a receive buffer for the arriving packets from the network which is served by the microprocessor with service interruption by the protocol processor. In this paper, we modeled the receive buffer as a discrete time server with service interruption, and obtained the packet blocking probability using the mini-slot approximation.

  • PDF

Sampling and Analysis of Parathion in the Air and Urinary p-Nitrophenol for Parathion Manufacturing Workers (작업장 공기 중 파라티온과 작업자 소변 중 p-니트로페놀의 시료채취 및 분석)

  • Han, Don-Hee
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.17 no.4
    • /
    • pp.300-309
    • /
    • 2007
  • Although parathion is an organophosphate pesticide being legally applied for the purpose of agriculture and is being manufactured, parathion in the air and urinary p-nitrophenol, a metabolite of parathion, were not analysed in Korea. Air of the parathion manufacturing workplace was sampled by OVS-2 tubes using NIOSH 5600 and spot urine of workers was sampled at the end of shift. Parathion and urinary p-nitrophenol were analysed by GC/MS (5973 MSD connected with Agilent 6890 GC) and the protocol was included in this study. It was found that this protocol should be so sensitive that determining parathion in the air and urinary p-nitrophenol below level of ACGIH TLV and BEI be adequate. Another finding was that total sampling volume of air of NIOSH 5600 of 240 L should be adjusted to be less than 120 L due to breakthrough.