• Title/Summary/Keyword: 보안 전송률

Search Result 48, Processing Time 0.042 seconds

The remote video monitoring system based on Android (안드로이드 기반의 원격 영상 모니터링 시스템 개발)

  • Kang, Dae-Cheol;Sin, Dong-Seok;Choi, Sung-Wook;Kim, Gwan-Hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.171-172
    • /
    • 2012
  • 최근 스마트폰의 보급률이 높아짐에 따라 생활 속에서 편리하게 쓸 수 있는 영상 서비스 어플리케이션들이 많이 개발되고 있다. 그에 따라 본 논문은 영상정보를 이용하면서 보안 및 기타 영상정보가 필요로 하는 환경에서 방문자에 대한 영상정보를 스마트폰(Smart-phone)으로 서비스하여 방문자를 인식하고 사용자 요구에 따라 필요한 메시지를 전송하거 원격지 디바이스를 원격에서 관리할 수 있는 원격 관리용 어플리케이션을 안드로이드(Android) 기반으로 개발하고자 한다. 이러한 어플리케이션의 구성은 블루투스(Bluetooth) 무선 통신모듈을 이용하거나 WiFi인 무선 TCP/IP 통신 기술을 이용하여 영상정보를 원격 서버에서 관리하도록 시스템을 구성하여 시스템의 활용 가능성을 제시하고자 한다.

  • PDF

Present Condition and View of Electronic Interlocking System for Signaling System Implementation on Train (신호설비구현을 위한 전자연동장치의 현황과 전망)

  • Lee, Jung-Geun;Lee, Hyang-Beom
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.361-365
    • /
    • 2007
  • 전자연동장치(Interlocking System)는 열차의 안전운행 확보와 함께 수송능력과 보호향상, 정확하고 신속한 운송과 더불어 이용률을 증대하는데 중요한 역할을 한다. 철도 신호보안 설비 중에서 그 핵심을 이루는 연동장치 설비에 첨단기술인 전자, 정보처리 및 정보전송기술을 철도 신호 시스템에 도입하여 신뢰성과 안정성이 확보된 신호설비를 구현하기 위해 최근에는 마이크로프로세서를 이용한 전자연동장치 기술이 개발되었다. 본 논문에서는 전자연동장치의 필요성 및 기존설비(기계 및 계전 연동장치)의 노후화에 따른 장애 및 호환성 결여 등의 문제점들을 해결하기 위하여 전자 연동장치와 기존 계전 연동장치의 차이점을 제시 및 문제 해결방안을 고찰하고, 전자연동장치 동향을 살펴보았다.

  • PDF

New Secure Network Coding Scheme with Low Complexity (낮은 복잡도의 보안 네트워크 부호화)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.295-302
    • /
    • 2013
  • In the network coding, throughput can be increased by allowing the transformation of the received data at the intermediate nodes. However, the adversary can obtain more information at the intermediate nodes and make troubles for decoding of transmitted data at the sink nodes by modifying transmitted data at the compromised nodes. In order to resist the adversary activities, various information theoretic or cryptographic secure network coding schemes are proposed. Recently, a secure network coding based on the cryptographic hash function can be used at the random network coding. However, because of the computational resource requirement for cryptographic hash functions, networks with limited computational resources such as sensor nodes have difficulties to use the cryptographic solution. In this paper, we propose a new secure network coding scheme which uses linear transformations and table lookup and safely transmits n-1 packets at the random network coding under the assumption that the adversary can eavesdrop at most n-1 nodes. It is shown that the proposed scheme is an all-or-nothing transform (AONT) and weakly secure network coding in the information theory.

Chaos based Communication System Using Reverse DCSK (역방향 DCSK를 이용한 카오스기반 통신 시스템)

  • Jang, Eun-Young
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.934-940
    • /
    • 2019
  • In this paper, we propose a Reverse Differential Chaos Shift Keying (RE-DCSK) system for low cost, high reliability and high data rate non-coherent chaos communication .In RE-DCSK, reference signals are transmitted in the first slot as in the conventional differential chaos shift modulation scheme (DCSK) and in the second slot a time inversion block strengthens the autocorrelation of the chaos signal and uses the orthogonality of the two signals to obtain the information signal. RE-DCSK enables relatively double the data rate compared to DCSK and also improves the security of communications without any additional cost of system complexity.To prove its effectiveness, we analyze it through Rayleigh fading channel and additional white Gaussian noise (AWGN) channel based on the derived BER expression. The BER performance of the proposed system is improved when compared with the CDSK and DCSK system using AWGN channel.

Prefetching Methods with Vehicle's Pattern in Location-Based Services (위치기반서비스에서 차량의 패턴을 고려한 프리페칭 기법)

  • Choi, In-Seon;Kim, Joo-Hwan;Lee, Dong-Chun
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.105-113
    • /
    • 2008
  • Mobile computing environment is known to be quite difficult to provide user with a stable Quality of Service (QoS) due to vehicle mobility nature. In order to protect the inherent characteristics of wireless network such as low bandwidth and high transmission delay along with the vehicle's mobility, many works are conducted to apply caching and prefetching methods. This paper presents a novel prefetching technique which is based on owner's profile. It is the scheme with the vehicle velocity, the visit frequency and resident time of specific region for vehicle owner's past given period, and the user profile which has owner's personal inclination about a certain place. The proposed scheme shown relatively superior performance in terms of the utilization ratio of prefetched information and the failure ratio of information retrieval than the previous methods.

  • PDF

Using Genetic Algorithms for Routing Metric in Wireless Mesh Network (무선 메쉬 네트워크에서 유전 알고리즘을 이용한 라우팅 메트릭 기법)

  • Yoon, Chang-Pyo;Shin, Hyo-Young;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.11-18
    • /
    • 2011
  • Wireless mesh network technology with transmission speeds similar to wired and wireless technology means to build, compared with wired networks, building a more efficient network to provide convenience and flexibility. The wireless mesh network router nodes in the energy impact of the mobility is less constrained and has fewer features entail. However, the characteristics of various kinds due to network configuration settings and the choice of multiple paths that can occur when the system overhead and there are many details that must be considered. Therefore, according to the characteristics of these network routing technology that is reflected in the design and optimization of the network is worth noting. In this paper, a multi-path setting can be raised in order to respond effectively to the problem of the router node data loss and bandwidth according to traffic conditions and links to elements of the hop count evaluation by using a genetic algorithm as a workaround for dynamic routing the routing metric for wireless mesh network scheme is proposed.

Vulnerability Analysis and Demonstration of WiFi Password Cracking in Drone Environment: Based on Products A and B (드론 환경에서의 WiFi 패스워드 크래킹 취약점 분석 및 실증 : A와 B 드론을 대상으로)

  • Wonbin Jeong;Jinwook Kim;Heewon Song;Sejun Hong;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.113-115
    • /
    • 2024
  • 최근 개발되는 드론은 사용자의 편의를 위하여, 사진이나 동영상과 같은 파일을 휴대 기기로 전송하거나 휴대 기기로 드론을 조종하는 것과 같은 휴대 기기를 통한 다양한 기능들을 제공하며, 이러한 기능들은 와이파이를 기반으로 이루어진다. 그러나, 와이파이는 인증 해제 공격이나 Evil Twin 공격과 같은 취약점이 존재하며, 이러한 취약점으로 인하여 드론에서 제공하는 다양한 기능들과 관련된 보안 위협이 발생할 가능성이 존재한다. 따라서, 본 논문에서는 와이파이를 사용하는 드론에서 발생 가능한 취약점을 미리 분석하고 방어하기 위한 목적으로, 와이파이에서 발생 가능한 취약점 중 하나인 패스워드 크래킹 취약점을 분석하였다. 실험 결과, 드론에서 제공하는 와이파이의 패스워드를 크래킹함으로써 공격자가 드론 네트워크 내부로 진입이 가능한 것을 실증하였다. 향후, 드론 환경에서 패스워드 크래킹 뿐만 아니라, 와이파이에서 발생 가능한 다양한 취약점을 분석하고 실증할 예정이다.

  • PDF

Performance Analysis of a TransferJet System (TransferJet 시스템의 성능분석)

  • Park, Kyung-Won;Wee, Jeong-Wook;Seo, Jeong-Wook;Jeon, Won-Gi
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.810-816
    • /
    • 2012
  • In this paper, BER(Bit Error Ratio) performances of the TransferJet system, which is the standard of a close proximity inductive wireless communication system, are presented and analyzed. Comparing to other wireless communication systems, the TransferJet system has some advantages such as short communication range(i.e., high security in the wireless communication environments), fewer effects of multipath distortion, and higher transmission rate. In order to demodulate the received signal, either SC(Soft-decision Combining) or HC(Hard-decision Combining) can apply to the despreader and demodulator of the receiver. When the spreading factor is more than 4, the SC scheme approximately has a minimum signal-to-noise ratio gain of 2 dB over the HC scheme. Moreover, from simulation results, we can conclude that the quantization bits of 3 bits are an optimum value for the SC scheme in the TransferJet system since the 3-bit quantization achieves nearly the performance as that attained by double-precision floating-point.

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

Design and Implementation of Convenience System Based on IoT (IoT를 기반한 편의 시스템 설계 및 구현)

  • Ui-Do Kim;Seung-Jin Yu;Jae-Won Lee;Seok-Tae Cho;Jae-Wook Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.165-172
    • /
    • 2024
  • In this paper, we designed a smart home system that can be used intuitively and easily in everyday life, such as sending text messages to users, providing various information and scheduling using smart AI, and providing lighting and atmosphere suitable for the atmosphere in situations such as listening to music using neopixels, as well as using ESP32, RFID, and Google Cloude Console using raspberry pie. As a result of the experiment, it was confirmed that security characters were normally sent to users when RFID was recognized on ESP32 connected to Wi-Fi even if the power was reconnected, and smart AI using Neopixel lighting, Raspberry Pie, and voice recognition, which calculated frequency, also changed the recognition rate over distance, but it worked.