A Secure Real-time Internal and External Network Data Exchange Method Based on Web Service Protocol

Author(s):  
Zhenfei Qi ◽  
Yi Wu ◽  
Feilu Hang ◽  
Linjiang Xie ◽  
Yue He
2017 ◽  
Vol 171 (4) ◽  
pp. 211-214
Author(s):  
Michał ŚMIEJA ◽  
Sławomir WIERZBICKI ◽  
Jarosław MAMALA

The network system of data exchange between the various components is an inherent element of every car. Because of the specific and different requirements for data transfer between specific devices, currently used communication protocols have different properties of performance, security, and degree of determinism. The paper presents the increasing complexity of the data exchange system based on the example of the latest requirements for digital tachographs. The article describes also the data transmission initialization methods in the context of network data exchange organization. The hybrid use of time triggering and event triggering mechanisms has been presented in relation to the operation of the CAN network under increased real-time conditions requirements implemented as TTCAN (time triggered CAN).


2017 ◽  
Vol 13 (07) ◽  
pp. 140 ◽  
Author(s):  
Yuankun Yang ◽  
Yongqing Ji

<p><span style="font-size: medium;"><span style="font-family: 宋体;">To explore the wireless sensor network data exchange model, an addressing strategy is applied to the Internet of Things, and the real-time communication between the underlying wireless sensor network and the Internet based on the IEEE 802.15.4 protocol is realized. In addition, Hierarchical address auto configuration strategy is adopted. First of all, inside the bottom network, it allows nodes to use link local address derived by 16-bit short address for data packet transmission. Secondly, Sink node in each underlying network accesses to the global routing prefix through the upper IP router, and combined with interface identifier, it forms Sink node global address, and realizes wireless sensor network and Internet data exchange. The research results show that the strategy has certain superiority in network cost, throughput, energy consumption and other performances. In summary, the proposed addressing strategy has the characteristics of effectively integrating heterogeneous networks, reducing system energy consumption, increasing network throughput and ensuring real-time system performance for the future Internet of things.</span></span></p>


2012 ◽  
Vol 241-244 ◽  
pp. 1392-1395
Author(s):  
Kun Qi Wang ◽  
Jing Wei Yang ◽  
Li Qun Lei

A new real-time control method for software CNC based on PC is proposed, and the data exchange methods are given. Both external and system clock interrupt are adopted as interpolation cycle to make up software CNC on PC. The data between the front procedures, interpolation module, and background procedures, application module, is exchanged by WDM. The method is verified in experiment, and the resolves show that the speed control and the interpolation operator are right, and whole software CNC is significantly improved.


Author(s):  
Faisal Al Isfahani ◽  
Fuji Nugraha ◽  
Rifki Mubarok ◽  
Alam Rahmatulloh

The SARS-CoV-2 coronavirus outbreak, or commonly abbreviated as Covid-19, is currently almost paralyzing human life in various sectors. Compared to other coronaviruses such as SARS-Cov and MERS-Cov, Covid-19 spreads very quickly in multiple countries and regions. Also, the difficulty of information obtained accurately and in real-time for the community. The role of information technology is vital for the community in monitoring the coronavirus. This research utilizes web service technology to collect data and integrate services from various sources. The protocol and web service architecture used is representational state transfer (REST), with independent data exchange using the JSON format. Web service is made with node.js as well as android applications using an android studio. The results of this study have obtained a mobile-based android application that can present covid-19 data accurately and in real-time. Data recapitulation coronaviruses distribution from four service sources that have been integrated can display globally and locally in Indonesia.


2019 ◽  
Vol 3 (122) ◽  
pp. 19-24
Author(s):  
Elena Aleksandrovna Kavats ◽  
Artem Aleksandrovich Kostenko

The paper analyzes the methods of interaction of robotic applications with Telegram servers. A comparison was made between the standard polling method (Long Polling) and Webhook, both from the speed of application interaction with the end user and the complexity of the installation from the point of view of the developer. The interaction mechanism of telegrams-bot with Webhook-enabled telegram servers, which significantly improves the performance of the program as a whole, saving the user’s query execution time and increasing fault tolerance.The purpose of the study is to compare the methods of interaction between the application-work Telegrams written in Python, as well as the implementation of these methods in practice, in order to identify the complexity of writing both solutions.The Webhook method is a way to deliver real-time data to applications. Unlike traditional APIs, where you need to specify data more often to get information in real time, Webhook sends data immediately.It is proposed to consider the two most common communication options work and the Telegram server. The most common option is to periodically poll the Telegram servers for new information. All this is done through Long Polling, that is, the use opens for a short time and all updates immediately arrive bot.In the work, an alternative communication option was proposed for the application to work with Telegram servers using Webhook. During the work on changing the data exchange method from standard polling (Long Polling) to Webhook, its indisputable advantage in loaded applications, namely on the number of incoming requests over a thousand, was proved (Long Polling).


2017 ◽  
Vol 8 (1) ◽  
pp. 1-10
Author(s):  
Is Mardianto ◽  
Kuswandi Kuswandi

Security issues have become a major issue on the Internet. One of the security methods that are widely used today is to implement a digital certificate. Digital certificates have evolved over time, one of which is the X.509 digital certificate. Digital certificates have been widely used as authentication applications, web network authentication and other authentication systems that require digital certificates. This research is carried out by implementing an X.509 digital certificate technology as a mobile web service with its client. Secure Hash Algorithm (SHA), Diffie-Hellman, and Advanced Encryption Standard (AES) are used to secure the data exchange transaction between the web service and mobile phone. SHA algorithm will be used for user authentication, Diffie-Hellman algorithm will be used for public key exchange and AES algorithms will be used for symmetric cryptography data. The results of the application of digital certificates, the SHA algorithm, Diffie-Hellman, and AES in mobile phone applications, provide security application running on web service. Index Terms—Digital Certificate, X.509, SHA, Diffie Hellman, AES


Author(s):  
Kreshnik Musaraj ◽  
Tetsuya Yoshida ◽  
Florian Daniel ◽  
Mohand-Said Hacid ◽  
Fabio Casati ◽  
...  
Keyword(s):  

Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1043
Author(s):  
Abdallah A. Smadi ◽  
Babatunde Tobi Ajao ◽  
Brian K. Johnson ◽  
Hangtian Lei ◽  
Yacine Chakhchoukh ◽  
...  

The integration of improved control techniques with advanced information technologies enables the rapid development of smart grids. The necessity of having an efficient, reliable, and flexible communication infrastructure is achieved by enabling real-time data exchange between numerous intelligent and traditional electrical grid elements. The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and information technologies. Although smart grid technologies bring about valuable economic, social, and environmental benefits, testing the combination of heterogeneous and co-existing Cyber-Physical-Smart Grids (CP-SGs) with conventional technologies presents many challenges. The examination for both hardware and software components of the Smart Grid (SG) system is essential prior to the deployment in real-time systems. This can take place by developing a prototype to mimic the real operational circumstances with adequate configurations and precision. Therefore, it is essential to summarize state-of-the-art technologies of industrial control system testbeds and evaluate new technologies and vulnerabilities with the motivation of stimulating discoveries and designs. In this paper, a comprehensive review of the advancement of CP-SGs with their corresponding testbeds including diverse testing paradigms has been performed. In particular, we broadly discuss CP-SG testbed architectures along with the associated functions and main vulnerabilities. The testbed requirements, constraints, and applications are also discussed. Finally, the trends and future research directions are highlighted and specified.


Sign in / Sign up

Export Citation Format

Share Document