• 제목/요약/키워드: Protocol analysis

검색결과 2,483건 처리시간 0.035초

Security Analysis of Cryptographic Protocols Based on Trusted Freshness

  • Chen, Kefei;Dong, Ling;Lai, Xuejia
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.219-232
    • /
    • 2008
  • A novel idea of protocol security analysis is presented based on trusted freshness. The idea has been implemented not only by hand but also by a belief muitisets formalism for automation. The key of the security analysis based on trusted freshness is a freshness principle: for each participant of a cryptographic protocol, the security of the protocol depends only on the sent or received one-way transformation of a message, which includes a trusted freshness. The manual security analysis method and the belief multisets formalism are all established on the basis of the freshness principle. Security analysis based on trusted freshness can efficiently distinguish whether a message is fresh or not, and the analysis results suggest the correctness of a protocol convincingly or the way to construct attacks intuitively from the absence of security properties. Furthermore, the security analysis based on trusted freshness is independent of the idealization of a protocol, the concrete formalization of attackers' possible behaviors, and the formalization of concurrent runs of protocols.

해시 기반 NFC 모바일 쿠폰 프로토콜 (NFC Mobile Coupon Protocol Based on Hash)

  • 이재동
    • 한국멀티미디어학회논문지
    • /
    • 제20권5호
    • /
    • pp.782-790
    • /
    • 2017
  • As most of the recent smart devices have NFC function the NFC mobile coupon will become one of the pervasive NFC applications. We need the secure NFC coupon protocols to issue and use NFC mobile coupon. In this paper, we analyze the security of the previous protocols and point out the problems of security. As the result of analysis, Premium M-coupon Protocol proposed by A. Alshehri and S. Schneider is the most secure but has unnecessary operations. We propose the Modified Premium M-coupon Protocol-1 with the unnecessary operations removed and show this protocol is secure by security analysis. Most of NFC mobile coupon protocols use the cryptography with the shared secret keys. We propose the Modified Premium M-coupon Protocol-2 without the shared secret keys and show this protocol is secure by security analysis.

철도신호용 통신 프로토콜 성능해석 및 검증 (Performance Analysis and Validation of Railway Signalling Communication Protocol)

  • 황종규;이재호;신덕호
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2003년도 춘계학술대회 논문집
    • /
    • pp.462-467
    • /
    • 2003
  • According to the computerization of railway signalling system, necessity of communication protocol for interface between these equipments is increasing. Therefore the research on communication protocol structure that is required according to computerization trend of these signalling goes. In our research the existed protocol currently used was analyzed, and the simulation modeling for performance analysis is deduced. Based on this simulation model the performance analysis and comparison is carried out, and also validation test is executed about new suggested protocol.

  • PDF

열차제어용 통신프로토콜 구조분석 및 성능검증 시험 (Performance Analysis and Testing of Railway Signalling Communication Protocol)

  • 황종규;이재호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2003년도 하계학술대회 논문집 B
    • /
    • pp.1318-1320
    • /
    • 2003
  • According to the computerization of railway signalling system, necessity of communication protocol for interface between these equipments is increasing. Therefore the research on communication protocol structure that is required according to computerization trend of these signalling goes. In our research the existed protocol currently used was analyzed, and the simulation modeling for performance analysis is deduced. Based on this simulation model the performance analysis and comparison is carried out, and also validation test is executed about new designed protocol.

  • PDF

프로토콜 분석모듈 설계에 의한 TCP 패킷 분석 (Analysis of TCP packet by Protocol Analysis module Design)

  • 엄금용
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 학술대회 논문집 정보 및 제어부문
    • /
    • pp.234-236
    • /
    • 2004
  • Transmission control protocol(TCP) is protocol used in internet. TCP is seldom transmission error and is protocol based on wire environment. TCP uses 3 way handshake ways, data transmission control through windows size, data transmission control through reception confirmation, sliding window for packet delivery. In this study, designed TCP packet ion module for analyze the TCP segments & correct information about TCP. TCP capture in internet using designed TCP module and analysed TCP segments composition. Through this, could analyze the correct information of protocol in network.

  • PDF

무선 근거리 통신망에서의 BRAM(The Broadcast Recognizing Access Method) 프로토콜 성능 분석 (Performance Analysis of a BRAM (The Broadcast Recognizing Aceess Method) Protocol in a Wireless LAN)

  • 김재현;이종규
    • 전자공학회논문지A
    • /
    • 제31A권1호
    • /
    • pp.1-8
    • /
    • 1994
  • In this paper, we have analyzed the performance of a BRAM (The Broadcasting Recognizing Access Method) protocol, as a CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) scheme, which is widely used in wireles LAN systems. We have selected a Fair BRAM protocol among CSMA/CA schemes, considering the fairness of channel usage and the simplicity of the protocol. We have compared the performance of BRAM protocol to that of CSMA/CD. to research the characteristics of BRAM in wireless LAN system. In order to analyze the performance of this system, we have set up an imbedded Markov chain and calculated state transition probabilities. Then we have calculated steady state probabilities and finally derived the throughput of a Fair BRAM moder. To verify our analysis, we have simulated practical models. Then, we have found that analytic results are very close to simulation ones. Our analysis of the BRAM protocol will be expected to be very helpful to design and evaluate a MAC (Media Access Control) protocol in wireless LAN systems.

  • PDF

무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜 (A Novel Authentication Protocol based on the Password scheme for Wireless Mesh Network)

  • 이규환;이주아;김재현
    • 대한전자공학회논문지TC
    • /
    • 제44권5호
    • /
    • pp.54-62
    • /
    • 2007
  • 본 논문에서는 무선 메쉬 네트워크에서 사용자의 편의를 위하여 패스워드에 기반한 방식의 인증 프로토콜을 제안한다. 제안하는 프로토콜의 성능 분석을 위해서 GNY Logic 분석, Security 분석, 전송지연시간 분석을 하였다. 우선 GNY logic 분석을 통하여 프로토콜의 신뢰성을 증명하였으며, 다양한 공격에 대한 Security 분석을 통하여 인증 프로토콜이 여러 가지 공격에 대하여 강한 면모를 가지고 있는 것을 보였다. 또한 전송지연시간 분석으로 제안하는 인증 프로토콜이 무선 메쉬 네트워크 내에서 데이터 전송 지연에 큰 영향을 미치지 않음을 증명하기 위해 Linux 시스템에서 구현하여 전송지연시간을 측정하였다. 이러한 세 가지 분석 결과 제안하는 인증 프로토콜은 무선 메쉬 네트워크의 성능에 큰 영향을 미치지 않으면서도 안전한 무선 메쉬 네트워크 환경을 제공한다는 것을 보였다.

프로토콜 검증시스템의 설계 및 구현 (DESIGN AND IMPLEMENTATION OF A PROTOCOL VERIFICATION SYSTEM)

  • 김용진
    • ETRI Journal
    • /
    • 제11권4호
    • /
    • pp.22-36
    • /
    • 1989
  • In this paper, a design and implementation of an efficient protocol verification system named LOVE has been described. The LOVE has been developed specifically for LOTOS. It performs not only protocol syntax validation (PSV) but also protocol functional verification(PFV). The PSV is a test to check if a protocol is free from protocol syntax errors such as deadlocks and livelocks. The PFV confirms whether or not a protocol achieves its functional objectives. For the PSV, the reachability analysis is employed, and the observational equivalence test is used for the PFV. For protocol verification using the LOVE, a schematic protocol verification methodology has been outlined.

  • PDF

TICN 전술백본망을 위한 라우팅 프로토콜 분석 (Analysis of Routing Protocol for Tactical Backbone of TICN)

  • 장동기;권태욱
    • 한국군사과학기술학회지
    • /
    • 제13권4호
    • /
    • pp.650-658
    • /
    • 2010
  • Recently Korea Army developed the TICN which is the next army tactical communication system. The TICN will support ability from under environment, strategy maneuver communication system of integrated army dimension overcome and NCW. If the IER(Information Exchange Requirement) phases 3 of the future application system, the analysis that a transmission ability of the TICN is the uncapable is govern. The TICN tactical backbone's ability is very important. Therefore, network efficiency index in application and analysis of the standard protocol for the data transmission guarantee are obliged. For the TICN tactical backbone, this paper analyzes of routing protocol efficiency index and compares to superiority of the OSPF(v2) and integrated IS-IS protocols in the tactical environment. Conclusively we proposed that integrated IS-IS protocol is more suitable for TICN backbone routing protocol.

항공용 이동 무선 데이터 통신에 적합한 매체접속제어 프로토콜에 관한 연구 (A study on the MAC protocol for an aeronautical mobile data communication)

  • 이은주;박효달
    • 한국통신학회논문지
    • /
    • 제22권11호
    • /
    • pp.2604-2612
    • /
    • 1997
  • 현재 항공기에서 사용중인 ACARS의 항공기국과 지상 통신국 사이의 MAC 프로토콜인 CSMA는 고정 터미날 라디오 통신이나 유선 LAN에서는 적합하지만 무선 이동 라디오 환경에는 부적합한 면이 있다. 본 논문에서는 이 문제의 해결을 위해 제안된 ICMA/CD를 살펴보고 이를 개선하기 위하여 별도의 제어 채널을 두지 않고 제어 신호를 메세지 신호에 삽입시키는 변형된 ICMA/CD를 제한하고 이의 성능을 분석한 후 시뮬레이션을 통해 검증하였다. 결과적으로 변형된 ICMA/CD는 CSMA의 성능을 저하시키는 잠복 터미날 문제를 해결하는것과 동시에 ICMA/CD의 성능을 저하시키는 패킷 감지 지연 시간이 제거되므로 유선통신에서 사용되는 CSMA/CD와 같은 좋은 채널 효율을 얻을 수 있다는 결론을 얻었다. 따라서, 이 결과는 변형된 ICMA/CD 프로토콜이 항공통신에서 사용하기에 적합하다는 것을 보여준다.

  • PDF