• Title/Summary/Keyword: 무선추적기법

Search Result 132, Processing Time 0.029 seconds

Implementation of Publickey-based Key Distribution in Wireless Sensor Network (공개암호키를 사용한 센서네트워크에서의 키 분배 구현)

  • Oh, Kyung-Hee;Kim, Tae-Sung;Kim, Ho-Won
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.95-98
    • /
    • 2008
  • 센서네트워크는 넓은 지역에 무선 인프라로 묶여 설치된 센서들을 사용하여 상황 인지로 감지된 데이터를 응용서비스 서버와 연동하는 기술이다. 이는 환경 감시, 대상 추적, 환자 모니터링, 군사적 목적 등 매우 다양한 분야에 사용될 수 있다. 센서네트워크 역시 기존 네트워크에서 필요로 하는 보안 기능을 요구한다. 그러나 센서네트워크에 사용되는 노드들이 사용할 수 있는 자원에 제약이 있어, 기존의 암호기술을 그대로 적용하는데 어려움이 있다. 이러한 센서네트워크에서의 키 분배 문제를 해결하기 위하여 인증센터를 사용하는 기법, 랜덤 키 사전 분배 기법, q-합성수 랜덤 키 사전 분배 기법, Blom 스킴, 위치 기반 키 사전 분배 기법 등이 제안되어 있다. 한편, 공개키 연산의 많은 부하로 인하여 공개키 기법을 센서네트워크에 적용하기에 적합하지 않으리라 여겨져 왔으나, 최근의 연구결과들에 의하면 PKI처럼 복잡한 시스템을 구현하는 것은 부적합할지라도 공개키를 이용한 키 분배 기법을 센서네트워크에 적용하는 것이 실효성이 있다는 것을 보여준다. 본 논문에서는 TinyOS 플랫폼에서 공개키를 이용하여 센서 노드 간 상호 인증 및 세션키를 생성하여 암호 데이터 통신을 수행하는 센서네트워크 플랫폼을 구현한 결과를 제시한다.

  • PDF

Effect of weight of radio-transmitters on survival of Red-tongue viper snake (Gloydius ussuriensis) and Short-tailed viper snake (Gloydius saxatilis)in the radio-transmitter implantation (발신기 삽입시 발신기 무게가 쇠살모사(Gloydius ussuriensis)와 까치살모사(Gloydius saxatilis)의 생존에 미치는 영향)

  • Do, Min-Seock;Shim, Jae-Han;Choi, Young-Min;Yoo, Jeong-Chil
    • Journal of Wetlands Research
    • /
    • v.16 no.1
    • /
    • pp.85-92
    • /
    • 2014
  • In order to study the home range of the red-tongue viper snake (Gloydis ussuriensis) and the short-tailed viper snake (Gloydius saxatilis) belonging to the viperidae of squamat in Korea, we implanted radio-transmitters which were weighed less than 5% of individual mass in them and traced their location by radio-tracking. Surgeries for transmitter insertion were performed on 5 red-tongue viper snakes and 6 short-tailed viper snakes (total 11 individuals) and the average ratio of transmitter mass to body mass were 4.2% and 2.2%, respectively. After radio-transmitter implantation, all short-tailed viper snakes survived but 4 out of 5 red-tongue viper snakes did not survive during the convalescence stage, showing only 20% of survival rate. The results suggest that the ratio of transmitter mass to body mass should be less than 3.6% at least in these species, although previous studies have recommended various ranges from 1% to 7% as the acceptable ratios.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Improved Equalization Technique of OFDM Systems Using Block Type Pilot Arrangement (Block Type 파일럿 배치를 적용한 OFDM 시스템의 등화 기법 개선)

  • Kim Whan-Woo;Kim Ji-Heon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.3
    • /
    • pp.113-120
    • /
    • 2006
  • This paper is concerned with a equalization technique for Orthogonal Frequency Division Multiplexing (OFDM) systems based on a block type pilot arrangement over slow fading channels. The bit rates obtained in underwater channels are relatively modest compared to some other communication channels such as cellular phones or indoor wireless systems. Consequently. the Doppler effect is the important parameter in tracking a channel. In case of a coherent demodulation scheme, the residual mean phase errors due to Doppler frequency may be fatal for the performance of the system. The equalizer could not solely handle mean Doppler shift. To account for the common Doppler effect a phase error tracking loop is used with the frequency equalizer. so that the rotation errors are avoided. Furthermore. simulations show that we can reduce the computational load of the tracking loop with negligible effect on performance.

Design and Implementation of Robustness Distributed RTLS in Dense Environment (밀집 환경에 적합한 신뢰성 있는 분산형 RTLS 시스템의 설계 및 구현)

  • Jang, Hyun-Sung;Choi, Hoon;Jung, Yeon-Su;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.287-295
    • /
    • 2010
  • RTLS used to track the location of object or person in real time. However, if there are a lot of tags and readers, the conventional single RTLS server may fail to estimate location of tags. And if the server cannot receive the tags signal due to pass-loss or NLOS from more than three readers, the server fail to estimate location of tags. In this paper, we propose a special reader which embeds RTLS location engine for distributed RTLS. And by using multi-directional antenna, alleviating multi-path effect and allowing estimate tag's location only using two readers. We also implement the system, we can reduce server packet 16times and get the all results of location estimate in single second. We achieved the location error within 1m.

A Study on DDoS Attack Mitigation Technique in MANET (MANET 환경에서 DDoS 공격 완화 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.3-8
    • /
    • 2012
  • MANET composed wireless nodes without fixed infrastructure provides high flexibility, but it has weak disadvantage to various attack. It has big weakness to DDoS attack because every node perform packet forwarding especially. In this paper, packet transmission information control technique is proposed to reduce damage of DDoS attack in MANET and search location of attacker when DDoS attacks occur. Hierarchical structure using gateway node is adopted for protect a target of attack in this study. Gateway node in cluster is included like destination nodes surely when source nodes route path to destination nodes and it protects destination nodes. We confirmed efficiency by comparing proposed method in this study with CUSUM and measured the quantity consumed memory of cluster head to evaluate efficiency of information control using to location tracing.

WSN Safety Monitoring using RSSI-based Ranging Technique in a Construction Site (무선센서 네트워크를 이용한 건설현장 안전관리 모니터링 시스템)

  • Jang, Won-Suk;Shin, Do Hyoung
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.49-54
    • /
    • 2009
  • High incident of accidents in construction jobsite became a social problem. According to the International Labour Organization (ILO), more than 60,000 fatal accidents occur each year in construction workplace worldwide. This number of accidents accounts for about 17 percent of all fatal workplace accidents. Especially, accidents from struck-by and falls comprise of over 60 percent of construction fatalities. This paper introduces a prototype of a received signal strength index (RSSI)-based safety monitoring to mitigate the potential accidents caused by falls and struck-by. Correlation between signal strength and noise index is examined to create the distance profile between a transmitter and a receiver. Throughout the distributed sensor nodes attached on potential hazardous objects, the proposed prototype envisions that construction workers with a tracker-tag can identify and monitor their current working environment in construction workplace, and early warning system can reduce the incidents of fatal accident in construction job site.

  • PDF

Implementation of IEEE 802.15.4a Software Stack for Ranging Accuracy Based on SDS-TWR (SDS-TWR 기반의 거리측정 정확도를 위한 IEEE 802.15.4a 소프트웨어 스택 구현)

  • Yoo, Joonhyuk;Kim, Hiecheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.6
    • /
    • pp.17-24
    • /
    • 2013
  • The localization accuracy in wireless sensor networks using ranging-based localization algorithms is greatly influenced by the ranging accuracy. Software implementation of HAL(Hardware Abstraction Layer) and MAC(Medium Access Layer) should seamlessly deliver the raw performance of ranging-based localization provided by hardware capability fully to the applications without degrading the raw performance. This paper presents the design and implementation of the software stack for IEEE 802.15.4a which supports normal ranging mode of the Nanotron's NA5TR1 RF chip. The experiment results shows that average ranging error rate with our implementation is 24.5% for the normal mode of the SDS-TWR ranging scheme.

Construction of a Radio map for WPS Resistant to Signal Strength Fluctuation (신호 세기 변동에 강인한 WPS용 라디오 맵 구축 기법)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2685-2690
    • /
    • 2014
  • WPS determines position via a two-step process. In the construction phase, a radio map is constituted by collecting radio information signals. Positioning procedure is a step of comparing the radio signal newly acquired with the radio map. If the signals collected and the radio map are different the accuracy decreases. Even though the rate of accuracy is different according to positioning algorithms, accuracy drop is an issue common to all WPS systems. Signal strength fluctuation is caused by the malfunction of the device that receives positioning signals, obstruction and channel interference, etc. In this paper, in order to solve the problem caused by signal strength change, we propose a new radio map construction technique. The proposed method is intended to constitute a strong radio map to changes in the signal strength and updated by collecting the signal strength changes to the radio map. The use of this method is expected to enhance the accuracy of WPS by actively counteracting signal fluctuation.