• Title/Summary/Keyword: sender

Search Result 466, Processing Time 0.025 seconds

A Study on XML/EDI System Security using XML Signature (XML 전자서명을 이용한 XML/EDI 시스템 보안에 관한 연구)

  • 이경록;서장훈;박명규
    • Journal of the Korea Safety Management & Science
    • /
    • v.4 no.1
    • /
    • pp.57-68
    • /
    • 2002
  • As Internet spreads rapidly, the industrial structure is changing to a new paradigm. The previous EDI system was asked to change and WEB EDI, E-Mail EDI, FTP EDI etc. which are based on the internet appeared. These days the XML/EDI which has XML document appeared. The XML/EDI consider advantages and disadvantages of VAN/EDI and EDI which based on the internet. Also, EDI system has to assure a safe exchange between sender and receiver. But, the internet has security problems because it uses a open TCP/IP protocol. Although there are many methods for security, it is being studied with XML concept. On this paper, we will suppose the XML/EDI system model with XML Signature, and build a procedure of electronic signature and delivery of document between sender and receiver.

Energy-Aware Node Selection Scheme for Code Update Protocol (코드 업데이트 프로토콜에서 에너지 잔존량에 따른 노드선정 기법)

  • Lee, Seung-Il;Hong, Won-Kee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.1
    • /
    • pp.39-45
    • /
    • 2010
  • As wireless sensor network are being deployed in a wide variety of application areas, the number of sensor nodes in a sensor filed becomes larger and larger. In the past, ISP (In-System Programming) method have been generally used for code update but the large number of sensor nodes requires a new code update method called network reprogramming. There are many challenging issues for network reprogramming since it can make an impact on the network lifetime. In this paper, a new sender selection scheme for network reprogramming protocol is proposed to decrease energy consumption for code update by minimizing overlapped area between sender nodes and reducing data contention. Simulation results show that the proposed scheme can reduce the amount of message traffic and the overall data transmission time.

The study of preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient

  • Kim, Hyun-Ji;Kang, Jung-Ae;Lee, Sang-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.57-63
    • /
    • 2016
  • The purpose of the study is to investigate the preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient. Results show that women mostly prefer to use dynamic and imaged emoticon than men. However, the preference of using text messages increases when both men and women express uncomfortable emotion. Especially, when users send family messages, they tend to prefer for text message. And when users send close friends messages, the preference for dynamic and imaged emoticon is high. When users send distant friends messages, the similar tendency is shown regardless of emotion. These results can provide the information to use emoticon in the filed of education and take advantage in digital education and mobile education.

Group Key Agreement From Signcryption

  • Lv, Xixiang;Li, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3338-3351
    • /
    • 2012
  • There is an intuitive connection between signcryption and key agreement. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. In this paper, we present a primary approach for constructing an authenticated group key agreement protocol from signcryption. This approach introduces desired properties to group key agreement. What this means is that the signcryption gives assurance to a sender that the key is available only to the recipient, and assurance to the recipient that the key indeed comes from the sender. Following the generic construction, we instantiate a distributed two-round group key agreement protocol based on signcryption scheme given by Dent [8]. We also show that this concrete protocol is secure in the outsider unforgeability notion and the outsider confidentiality notion assuming hardness of the Gap Diffie-Hellman problem.

Energy Efficient and Multimedia Traffic Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 에너지 효율적이고 멀티미디어 트래픽에 적합한 MAC 프로토콜)

  • Kim, Seong Cheol;Kim, Hye Yun;Kim, Joong Jae
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1460-1465
    • /
    • 2016
  • In this paper, we propose an energy efficient and multimedia traffic friendly MAC protocol (EEMF-MAC) that controls sender's wakeup period based on the data packet's transmission urgency and the receiver's wakeup periods based on the received data packet traffic loads. The protocol is useful for applications such as object tracking, real time data gathering, in which priority-based packet transmission is required. The basic idea of EEMF-MAC is that it uses the priority concept with transmission urgency of sender's data packet to reduce the transmission delay of the urgent data and it also uses duty cycling technique in order to achieve energy efficiency. EEMF-MAC showed a better performance in energy efficiency and packet transmission delay compared to existing protocols, RI-MAC and EE-RI-MAC.

MKIPS: MKI-based protocol steganography method in SRTP

  • Alishavandi, Amir Mahmoud;Fakhredanesh, Mohammad
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.561-570
    • /
    • 2021
  • This paper presents master key identifier based protocol steganography (MKIPS), a new approach toward creating a covert channel within the Secure Real-time Transfer Protocol, also known as SRTP. This can be achieved using the ability of the sender of Voice-over-Internet Protocol packets to select a master key from a pre-shared list of available cryptographic keys. This list is handed to the SRTP sender and receiver by an external key management protocol during session initiation. In this work, by intelligent utilization of the master key identifier field in the SRTP packet creation process, a covert channel is created. The proposed covert channel can reach a relatively high transfer rate, and its capacity may vary based on the underlying SRTP channel properties. In comparison to existing data embedding methods in SRTP, MKIPS can convey a secret message without adding to the traffic overhead of the channel and packet loss in the destination. Additionally, the proposed covert channel is as robust as its underlying user datagram protocol channel.

SB-MAC : Energy efficient Sink node Based MAC protocol for Wireless Sensor Networks (무선 센서 네트워크 에서 에너지 효율적인 싱크노드 기반 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.177-182
    • /
    • 2014
  • In this paper, we propose an energy efficient sink node based MAC protocol for Wireless Sensor Networks (WSNs). The proposed sink node-based MAC (SB-MAC) protocol uses a RB(rapid beacon) frame to save sender's energy consumption and to reduce transmission delay. The RB frame is a modified IEEE 802.15.4 beacon frame. The RB frame contains the length of the sender nodes data. Using this information other nodes except sender and receiver nodes can be stay sleep mode long time to reduce energy consumption. Results have shown that the SB-MAC protocol outperformed other protocols like X-MAC and RI-MAC in terms of packet delivery delay and energy consumption. The SB-MAC protocol is especially energy efficient for the networks with one sink node and many senders.

Study on the Influence of Online WOM Information Characteristics on the Intention of Information Acceptance and also Re-WOM: Focused on the Receiver's Expertis (온라인 구전정보특성이 정보수용의도와 재구전 의도에 미치는 영향에 관한 연구: 수신자의 전문성을 중심으로)

  • Kim, Ji-Sook;Kwon, Hyeok-Gi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.81-93
    • /
    • 2016
  • An actual analysis was made regarding how different the effect of the online WOM information characteristics on the expansion of the WOM information characteristics was depending on the level of the receiver's expertise in consideration of the sender's expertise, the vividness and Consensus of WOM information which can affect the acceptance of WOM information in this study. To begin with, the analysis results showed that the online WOM information characteristics had the positive effect on the information acceptance intention in proportion to the sender's expertise and the vividness and Consensus of WOM information. Secondly, the information acceptance intention was found to have a positive effect on the re-WOM intention. Finally, the level of receiver's expertise was found to control the effect of the online WOM information characteristics on the information acceptance intention.

Gender Role Identity and Egalitarianism Consciousness among Adolescents (남녀 청소년의 성역할 정체감과 양성평등의식)

  • Kim, Young-Sook;Jeong, Bok-Rae
    • Research in Community and Public Health Nursing
    • /
    • v.18 no.2
    • /
    • pp.310-319
    • /
    • 2007
  • Purpose: This study intends to investigate gender role identity and egalitarianism consciousness among adolescents and to determine the relationship between the two factors. Method: Data were collected from 376 middle and high school students in U City. Tools used were the Korean Sexual Role Identity (Kim, J. H., 2005) and the Gender Egalitarianism Consciousness among Adolescents (Kim, 2002). Data were analyzed using SPSS 12.0 for t-test, one-way ANOVA and Pearson correlation coefficient. Results: There was no significant difference between boys and girls in sender role identity. Boys' gender role identity was different according to school grade (t=-3.19, p= .00), frequency of mother's hugging (t=-2.28, p= .02) and girls' according to religion (t=-2.24, p= .03) mother's job (F=3.59, p= .02), father's education level (F=3.20, p= .04), mother's education level (F=3.24, p= .04), family harmony (F=7.28, p= .00), and frequency of mother's hugging (t=-2.41. p= .02). There was significant difference in egalitarianism consciousness according to sender (t=-12.70. p= .00) Boys' egalitarianism consciousness was different according to school type (t= .02, p= .00) and father's education level (F=4.97, p= .02), and girls' according to school grade (t=-4.21 p= .00), school type (t=-3.12, p= .00), father's level of education (F=3.78. p= .02), decision maker of important domestic matter (F=4.95, p= .00) and frequency of mother's hugging (t=2.53, p= .01). In Girls, sexual role identity and sender egalitarianism consciousness were significantly correlated with each other (r= .01, p= .04). Conclusion: Through the study, it was found that boys' concern for sexual equality of was remarkably lower than girls. Therefore, it is necessary to offer curriculums for boys and to start social education for parents.

  • PDF

Prevention of Buffer Overflow in the Mobility Support Router for I-TCP (I-TCP를 위한 이동성 지원 라우터에서의 버퍼 오버플로우 방지)

  • 김창호;최학준;장주욱
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.20-26
    • /
    • 2004
  • A congestion control algorithm to prevent buffer overflow in MSR(Mobility Support Router) for I-TCP is proposed. Due to high bit error rate and frequent hand-offs over wireless environment, the current congestion control scheme in TCP Reno over mixed(wired and wireless) network exhibits lower throughput than the throughput achieved over wired only network. I-TCP has been proposed to address this by splitting a TCP connection into two TCP connections over wired section and wireless section, respectively. However, buffer overflow in MSR may occur whenever there are excessive bit errors or frequent hand-offs. This may lead to the loss of packets acked by MSR(resident in buffer) to the sender, but not received by the receiver, breaking TCP end-to-end semantics. In this Paper, a new scheme is proposed to prevent the MSR buffer from overflow by introducing “flow control” between the sender and the MSR. Advertised window for the TCP connection between the sender and the MSR is tied to the remaining MSR buffer space, controlling the flow of packets to the MSR buffer before overflow occurs.