• 제목/요약/키워드: protocol Analysis

검색결과 2,510건 처리시간 0.033초

ZigBee 네트워크에서의 안전한 멤버쉽 프로토콜 (Secure Membership Protocol for ZigBee Network)

  • 김봉환;박창섭
    • 정보보호학회논문지
    • /
    • 제23권3호
    • /
    • pp.405-416
    • /
    • 2013
  • ZigBee는 WBAN이나 스마트 그리드를 위한 차세대 표준 인프라로 인정받는 무선네트워크 통신프로토콜이다. 보안은 몇몇의 ZigBee 어플리케이션에서 중요한 역할을 한다. 특히, ZigBee안에서 멤버가 가입이나 탈퇴를 하는 상황에서는 엄격한 멤버관리가 필요하다. 본 논문에서, 우리는 현재 ZigBee에서 사용 중인 탈퇴 과정의 보안 취약점에 대하여 조사하고, 문제 해결을 위한 새로운 보안 스키마를 제시하고 그것의 보안능력 및 성능을 분석한다.

CO2 배출제약 조건과 배출권 거래제를 고려한 OPF (OPF considering CO2 emission constraints and the emission trading mechanism)

  • 김양일;한석만;정구형;박경한;김발호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 A
    • /
    • pp.343-344
    • /
    • 2006
  • Consumption of fossil fuel has been increasing steadily, and it has seriously affected environment. Due to this situation, UN establish ed UNFCC (United rations Framework Convention on Climate Change), and since Feb. 2005, Kyoto Protocol has come into effect for UNFCC obligation. In Korean power system, coal and oil thermal generation emitting large CO2 form about 46% of total generation. Moreover since electricity dem and has been increasing continuously, various alternatives should be designed to comply with Kyoto Protocol. In this paper, we analyze changes of each GENCO's generation pattern and resource planning under CO2 emission constraints. For this analysis, we incorporate CO2 emission constraints and the emission trading mechanism into the conventional OPF model.

  • PDF

동적 멀티미디어 그룹 통신을 위한 신뢰성 있는 다자간 전송 프로토콜 (ReMP)의 성능 분석 (A Performance Analysis of the Reliable Multipeer Protocol(ReMP) for dynamic Multimedia Group communications)

  • 손지연;원유재;오수형;임경식;황승구
    • 한국정보처리학회논문지
    • /
    • 제5권1호
    • /
    • pp.149-160
    • /
    • 1998
  • ReMP(Reliable Multipeer Protocol)는 멀티미디어 그룹 통신을 지원하기 위해 설계된 신뢰성 있는 다자간 전송 프로토콜이다ㅣ. 본 논문에서는 ReMP가 제한된 환경에서도 올바르게 동작함을 증명하였으며, 호스트에서의 처리량 관점에서 데이터 전송에 대한 성능 분석을 시도하였다. 또한 이를 토대로 ReMP는 성능이나 메모리 요구량 관점에 비추어 볼 때, 다른 비교 대상 프로토콜들보다 광범위한 용도의 멀티미디어 그룹 통신에 적용되어질 수 있음을 알 수 있다.

  • PDF

Optical Asymmetric Cryptography Modifying the RSA Public-key Protocol

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • 제4권2호
    • /
    • pp.103-114
    • /
    • 2020
  • A new optical asymmetric cryptosystem is proposed by modifying the asymmetric RSA public-key protocol required in a cryptosystem. The proposed asymmetric public-key algorithm can be optically implemented by combining a two-step quadrature phase-shifting digital holographic encryption method with the modified RSA public-key algorithm; then two pairs of public-private keys are used to encrypt and decrypt the plaintext. Public keys and ciphertexts are digital holograms that are Fourier-transform holograms, and are recorded on CCDs with 256-gray-level quantized intensities in the optical architecture. The plaintext can only be decrypted by the private keys, which are acquired by the corresponding asymmetric public-key-generation algorithm. Schematically, the proposed optical architecture has the advantage of producing a complicated, asymmetric public-key cryptosystem that can enhance security strength compared to the conventional electronic RSA public-key cryptosystem. Numerical simulations are carried out to demonstrate the validity and effectiveness of the proposed method, by evaluating decryption performance and analysis. The proposed method shows feasibility for application to an asymmetric public-key cryptosystem.

The Study on Security Vulnerabilities in IPv6 Autoconfiguration

  • Kim, Myung-Eun;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1545-1549
    • /
    • 2005
  • According as computer is supplied in a lot of homes and offices and Internet use increases, various service based on the Internet. Including wireless PDA in the future, many devices such as Internet telephone, TV, refrigerator and oven will be connected on the Internet and Internet address exhaustion will be raised to serious problem gradually. Today, the IPv4 address exhaustion problem has been solved partially using NAT (Network Address Translation) however, the transition to next Generation Internet will be accelerated because of advantages such as mobility, security service, QoS, and abundant IP addresses. In IPv6, all hosts are designed to create and set their address automatically without manager's intervention using Neighbor Discovery Protocol. But, when an IPv6 host sets its address automatically, there are serious security vulnerabilities. In this paper, we analysis security vulnerabilities in auto-configuration and provide security requirements for secure auto-configuration.

  • PDF

Multi-Homing RTP (mhRTP) for QoS-guaranteed Vertical Handover in Heterogeneous Wireless Access Networks

  • Kim, Igor;Kim, Young-Tak
    • 대한임베디드공학회논문지
    • /
    • 제5권4호
    • /
    • pp.185-194
    • /
    • 2010
  • In this paper, we propose an application layer-based vertical handover management protocol, called multihoming RTP (mhRTP), for real-time applications with seamless mobility across heterogeneous wireless access networks. The proposed multi-homing RTP provides a soft handover by utilizing multiple available wireless access network interfaces simultaneously. The newly available path is dynamically added to the ongoing session by the mhRTP session manager. Also the decision making of QoS-improving or QoS-guaranteed handover is possible based on the estimation of available bandwidth in each candidate network. The performances of the proposed mhRTP have been analyzed through a series of simulations on OPNET network simulator. From the performance analysis, we confirmed that the proposed mhRTP can provide QoS-guaranteed vertical handover with efficient session managements.

한국형전술데이터링크(Link-K)에서 TDL 프로토콜과 IP의 효과적인 적용방안 분석 (An Analysis for Efficient Appliance of TDL Protocol and IP on Link-K System)

  • 지승배
    • 한국군사과학기술학회지
    • /
    • 제11권1호
    • /
    • pp.25-32
    • /
    • 2008
  • In this paper, we propose how to efficiently apply IP and TDL(Tactical Datalink) protocol to the Link-K network for using their applications on the host system. We classify 3 kinds of communication method between IP network and TDL network. We explain the concepts of Like-to-Like communication (Link-K over IP, IP over Link-K) and Any-to-Any communication. We describe the characteristics and the implementation range of tactical datalink processor for each communication method.

Outage Capacity Analysis for Cooperative DF and AF Relaying in Dissimilar Rayleigh Fading Channels

  • 스레스타;장경희
    • 한국통신학회논문지
    • /
    • 제33권4A호
    • /
    • pp.361-370
    • /
    • 2008
  • Cooperative relaying permits one or more relay to transmit a signal from the source to the destination, thereby increasing network coverage and spectral efficiency. The performance of cooperative relaying is often measured as outage probability. However, appropriate measure for the channel quality is outage capacity. Although the outage probability for cooperative relaying protocol has been analyzed before, very little research has been addressed for the outage capacity. This paper is the first of its kind to derive a closed-form analytical solution of outage capacity using fixed decode and forward relaying and amplify and forward relaying in dissimilar Rayleigh fading channels, considering channel coefficients known to the receiver side. The analytical results show a tradeoff between the SNR and the number of relays for specific outage capacity. A comparison between decode and forward relaying and amplify and forward relaying shows that decode and forward relaying outperforms amplify and forward relaying for a large number of relays.

서비스 가로채기가 있는 네트워크 접속장치내의 유한버퍼의 분석 (Analysis of a finite buffer with service interruption in a network interface unit)

  • 김영한
    • 전자공학회논문지A
    • /
    • 제33A권2호
    • /
    • pp.1-7
    • /
    • 1996
  • In this paper, we analyzed the packet blocking probability of a finite buffer in a network interface unit. In general, a network interface unit which provides a means of interface between the network and computer has a microprocessor and a protocol processor for the network access protocols. It also has a receive buffer for the arriving packets from the network which is served by the microprocessor with service interruption by the protocol processor. In this paper, we modeled the receive buffer as a discrete time server with service interruption, and obtained the packet blocking probability using the mini-slot approximation.

  • PDF

작업장 공기 중 파라티온과 작업자 소변 중 p-니트로페놀의 시료채취 및 분석 (Sampling and Analysis of Parathion in the Air and Urinary p-Nitrophenol for Parathion Manufacturing Workers)

  • 한돈희
    • 한국산업보건학회지
    • /
    • 제17권4호
    • /
    • pp.300-309
    • /
    • 2007
  • Although parathion is an organophosphate pesticide being legally applied for the purpose of agriculture and is being manufactured, parathion in the air and urinary p-nitrophenol, a metabolite of parathion, were not analysed in Korea. Air of the parathion manufacturing workplace was sampled by OVS-2 tubes using NIOSH 5600 and spot urine of workers was sampled at the end of shift. Parathion and urinary p-nitrophenol were analysed by GC/MS (5973 MSD connected with Agilent 6890 GC) and the protocol was included in this study. It was found that this protocol should be so sensitive that determining parathion in the air and urinary p-nitrophenol below level of ACGIH TLV and BEI be adequate. Another finding was that total sampling volume of air of NIOSH 5600 of 240 L should be adjusted to be less than 120 L due to breakthrough.