• Title/Summary/Keyword: 안전채널

Search Result 324, Processing Time 0.031 seconds

A Design of 5G-based Many-to-One Cell Broadcast Service (5G 기반 긴급재난문자 답신서비스 설계)

  • Jeon, Inchan;Kwon, Ki Bong
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2022.10a
    • /
    • pp.55-56
    • /
    • 2022
  • 긴급재난문자는 재난상황을 전달할 때 가장 선호도가 높은 매체이다. 그러나 전송 채널의 용량이 비교적 작아 텍스트만 보낼 수 있고, 리턴 채널이 없어서 수신자의 응답을 받을 수 없다는 한계가 있다. 이 문제를 해결하기 위해서 다대일 통신 기법 연구가 있었으나 이를 위해서는 5G 표준 개정이 필요하다는 문제가 있다. 본 논문에서는 5G 재난문자환경에서 활용하기 위한 긴급재난문자 답신서비스를 설계하였다. 표준 개정 없이 서비스를 제공하기 위하여 재난문자에 링크를 추가하고 답신서비스 웹페이지에 접근하여 수신자의 상태 또는 재난현장의 상태를 텍스트와 사진으로 신고할 수 있도록 하였다.

  • PDF

Implementation of PQC-based Secure Channel for Drone Services (드론 서비스를 위한 PQC 기반 보안채널 통신기술 구현)

  • Seungyong Yoon;Joungil Yun;Byoungkoo Kim;Keonwoo Kim;Yousung Kang
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.1177-1178
    • /
    • 2023
  • 드론은 초기에 주로 군사적 목적으로 사용되었으나, ICT 기술이 발전함에 따라 다양한 산업 서비스에 활용되고 있다. 그러나 드론이 네트워크에 연결됨으로써 많은 보안위협과 취약점에 노출되었으며, 이는 드론 탈취, 정보유출, 서비스 장애 등의 심각한 피해를 야기할 수 있다. 따라서, 본 논문에서는 기존 드론의 보안위협 뿐만 아니라 다가올 양자시대의 보안위협에 대비하여 안전한 드론 서비스를 제공할 수 있는 PQC 기반 보안채널 통신기술을 제안하고 구현한다.

Efficient and Secured Media Access Mechanism in IEEE 802.15.4 Networks (IEEE 802.15.4 네트워크에서 효율적이고 안전한 미디어 액세스 메커니즘)

  • Heo, Joon;Hong, Choong-Seon
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1042-1044
    • /
    • 2007
  • IEEE 802.15.4 표준을 기반으로 하는 무선 액세스 기술은 진화된 컴퓨팅 시스템을 구축하는 데 있어 광범위하게 사용될 수 있을 것이다. 이러한 기술의 활용은 보안성과 공정성이 보장되어야 하지만, 무선 환경에서 악의적인 디바이스는 불공정한 방법을 사용하여 채널 대역폭을 차지할 수 있다. 본 논문에서는 이러한 공격에 대응할 수 있도록 코디네이터의 결정에 의해 정상적인 디바이스가 채널에 우선적으로 액세스 할 수 있는 메커니즘을 제안하고, 이를 위해 기존의 IEEE 802.15.4 표준을 활용할 수 있는 방안을 제시한다. 시뮬레이션 결과는 본 논문에서 제안하는 메커니즘이 MAC 레이어에서의 공격을 효과적으로 방지할 수 있음을 보여준다.

Secure Configuration Scheme for Internet of Things using NFC as OOB Channel (NFC를 OOB 채널로 활용한 사물인터넷 보안 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.

Secure Binding of Identity Reference and Biometric Reference (개인식별정보와 바이오인식정보의 안전한 결합방법)

  • You, Mi-Kyeong;Kwon, Man-Jun;Lee, Sang-Ho;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.610-616
    • /
    • 2010
  • This paper describes how to securely bind the identity reference and biometric reference for satisfying security requirements. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person has been adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular it vidual when combining with other identity information. As a result, a son, anb it canmethod is required for manipulat canthese information. Consider canthese issues, this paper proposes a biit canmethod uiter son, anand uisecure channels for generating the common identifier and ensuring security of identity reference and biometric reference that are stored in the separated DBs.

Adaptive Hangul Steganography Based on Chaotic Encryption Technique (혼돈 암호화 기법에 기반한 적응된 한글 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.3
    • /
    • pp.177-183
    • /
    • 2020
  • Steganography uses digital images as a medium for sending secret messages over insecure networks. There is also a least significant bit(LSB) that is a popular method of embedding secret messages in digital images. The goal of steganography is to securely and flawlessly transmit secret messages using stego media over a communication channel. There is a need for a method to improve resistance to reduce the risk of exposure to third parties. To safely hide secret messages, I propose new algorithms that go through crossing, encryption, chaos and concealment steps. After separating Hangul syllables into choseong, jungseong and jongseong, the bitwised message information is encrypted. After applying the logistic map, bitwised information is reconstructed using the position of the chaotic sequence. The secret message is inserted into the randomly selected RGB channel. PSNR and SSIM were used to confirm the effectiveness of the applied results. It was confirmed as 44.392(dB) and 0.9884, respectively.

LoRa LPWAN Sensor Network for Real-Time Monitoring and It's Control Method (실시간 모니터링을 위한 LoRa LPWAN 기반의 센서네트워크 시스템과 그 제어방법)

  • Kim, Jong-Hoon;Park, Won-Joo;Park, Jin-Oh;Park, Sang-Hyun
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.31 no.6
    • /
    • pp.359-366
    • /
    • 2018
  • Social infrastructure facilities that have been under construction since the country's high-growth period are undergoing rapid aging, and safety assessments of large structures such as bridge tunnels, which can be directly linked to large-scale casualties in the event of an accident, are necessary. Wireless smart sensor networks that improve SHM(Structural Health Monitoring) based on existing wire sensors are difficult to construct economical and efficient system due to short signal reach. The LPWAN, Low Power Wide Area Network, is becoming popular with the Internet of Things and it is possible to construct economical and efficient SHM by applying it to structural health monitoring. This study examines the applicability of LoRa LPWAN to structural health monitoring and proposes a channel usage pre-planning based LoRa network operation method that can efficiently utilize bandwidth while resolving conflicts between channels caused by using license - exempt communication band.

Implementation and Evaluation of Secure VoIP Conference System (DTLS 기반의 안전한 VoIP 컨퍼런스 시스템 구현 및 평가)

  • Kang, Seong-Ku;Kim, Kyou-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.45-57
    • /
    • 2009
  • In this paper, we implemented the conference system based on DTLS for saving securely the VoIP, which is served sprightly in the latest, securely and tested (and also analyzed) the system. As VoIP technology development, demand of conference system is increased and the related technologies are growed. But Security protocol to protect conference service is getting late than conference technology. In this paper, we studied based on DTLS protocol that can provide function of signaling, channel security, media channel security and application of group key and apply to VoIP conference system based UDP unchanged. In this paper, we searched suggested security protocols based on DTLS can apply to conference system and implement and apply the protocol to conference system. And we tested (and also alayzed) overhead of encryption and key management mechanism.

Displacement mapping using an image pyramid based multi-layer height map (이미지 피라미드 기반 다층 높이 맵을 사용한 변위 매핑 기법)

  • Chun, Young-Jae;Oh, Kyoung-Su
    • Journal of the Korea Computer Graphics Society
    • /
    • v.14 no.3
    • /
    • pp.11-17
    • /
    • 2008
  • Many methods which represent complex surfaces using height map without a number of vertex have been researched. However, a single layer height map cannot present more complex objects because it has only one height value on each position. In this paper, we introduce the new approach to render more complex objects, which are not generated by single layer height map, using multi layer height map. We store height values of the scene to each texture channel by the ascending order. A pair of ordered height values composes a geometry block and we use this property. For accurate ray search, we store the highest value in odd channels and the lowest value in even channels to generate quad tree height map. Our ray search algorithm shows accurate intersections between viewing ray and height values using quad tree height map. We solve aliasing problems on grazing angles occurred in previous methods and render the result scene on real-time.

  • PDF

A Study on the Channel Converting and Monitoring of the Remote Control Transceiver (원격제어 송수신기의 채널변환과 모니터용 모듈의 구현)

  • 조학현;최조천;김기문
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.347-354
    • /
    • 1999
  • Generally, transceiver is operated to the remote control for the purpose of breading the traffic zone which is established on a mountain peak, island and building top using private line. Therefor, the remote control system of public radio station have been the very important role that is decision the quality relate to the quickness, accuracy, safety of communication on old type transceiver of SSB, VHF etc. In the case of using the only 1 private line which is exchanged voice signal with data signal had mixed or interrupted for up/down of channel, PTT control and monitoring of transmission channel and power. The up/down of channel and PTT control is according to the ASK and the data of monitoring is transfered to the FSK modulation, additional algorithm is studied on the serial protocol and traffic sequence using the MCS-51 processor in the simplex communication methode.

  • PDF