• Title/Summary/Keyword: 안전채널

Search Result 324, Processing Time 0.028 seconds

USN Channel Establishment Algorithm for Sensor Authentication and Anti-collision (센서 인증과 충돌 방지를 위한 USN 채널 확립 알고리즘)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.74-80
    • /
    • 2007
  • Advances in electronic and computer technologies have paved the way for the proliferation of WSN(wireless sensor networks). Accordingly, necessity of anti-collusion and authentication technology is increasing on the sensor network system. Some of the algorithm developed for the anti-collision sensor network can be easily adopted to wireless sensor network platforms and in the same time they can meet the requirements for sensor networks like: simple parallel distributed computation, distributed storage, data robustness and auto-classification of sensor readings. To achieve security in wireless sensor networks, it is important to be able to establish safely channel among sensor nodes. In this paper, we proposed the USN(Ubiquitous Sensor Network) channel establishment algorithm for sensor's authentication and anti-collision. Two different data aggregation architectures will be presented, with algorithms which use wavelet filter to establish channels among sensor nodes and BIBD (Balanced Incomplete Block Design) which use anti-collision methods of the sensors. As a result, the proposed algorithm based on BIBD and wavelet filter was made for 98% collision detection rate on the ideal environment.

Implementation of multi-channel IPCC platform for RBAC based CRM service (RBAC기반의 CRM 서비스를 위한 멀티 채널 IPCC 플랫폼 구현)

  • Ha, Eunsil
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1751-1758
    • /
    • 2018
  • An integrated medical information system that integrates systems consisting of different environments centered on hospital information systems should be provided as a system that prioritizes the improvement of the quality of medical services, customer satisfaction, and patient safety. The RBAC-based medical information system is granted the access right according to task type, role, and rules. Through this, it is possible to use SMS channel, medical reservation and cancellation, customized statistics, and CRM / EMR interworking service using multi-channel to enable communication service without help of counselor and reduce the default rate of reservation patient, Operational improvement services can be extended to medical staff, patients and their families, as well as expanding to important decisions for patients.

A Study on ZigBee-Based Routing Algorithm (스마트그리드를 위한 지그비 기반의 라우팅 알고리즘에 관한 연구)

  • Kang, Hyung-Seok;Im, Song-Bin;Oh, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.137-148
    • /
    • 2012
  • In this paper, we proposed the location-aware coordinate routing algorithm for improving the performance of routing algorithm by using ZigBee in Smart Grid environment. A distributed address allocation scheme used an existing algorithm that has wasted in address space. The x, y and z coordinate axes from divided address space of 16 bit to solve this problems. However, coordinate routing does not take account of wireless link condition. If wiress link condition is not considered, when the routing table is updated, the nodes with bad link conditions are updated in the routing table and can be chosen as the next hop. This brings out the retransmissions because of received packet's errors. Also, because of these retransmissions, additional power is consumed. In this paper, we propose the location-aware coordinate routing algorithm considering wiress link condition, where reliable data transmission is made and the consumed enegy is minimize. and we compared and connected region and transition region of ZigBee location based routing in the aspect of average number of multi hops, subordinate packet delivery ratio, delay time, and energy consumption of proposed algorithm. It turned out that there were improvements in performances of each items.

Research on optimization of traffic flow control at intersections (교차로 교통 흐름 제어 최적화에 관한 연구)

  • Li, Qiutan;Song, Jeong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.15-24
    • /
    • 2022
  • At present, there are few studies on signal control of pedestrian traffic flow and non-motor traffic flow at intersections. Research on the optimization scheme of mixed traffic flow signal control can coordinate and control the overall traffic flow of pedestrians, non-motor vehicles and motor vehicles, which is of great significance to improve the congestion at intersections. For the traffic optimization of intersections, this paper starts from two aspects: channelization optimization and phase design, and reduces the number of conflict points at intersections from spatial and temporal right-of-way allocation respectively. Taking the classical signal timing method as the theoretical basis, and aiming at ensuring the safety and time benefit of traffic travelers, a channelization optimization and signal control scheme of the intersection is proposed. The channelization and phase design methods of intersections with motor vehicles, non-motor vehicles and pedestrians as objects are discussed, and measures to improve the channelization optimization of intersections are proposed. A multi-objective optimization model of intersection signal control was established, and the model was solved based on NSGA-II algorithm.

Vulnerabilities and Attack Methods in Visible Light Communications Channel (가시광 통신 채널의 취약성 및 공격 방법)

  • Park, So-Hyun;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.469-471
    • /
    • 2021
  • As wireless communication technology advances to ensure high accuracy and safety at high speeds, research and development of Visible Light Communication (VLC) technology has been accelerated as an alternative to traditional radio frequency (RF) technology. As the radio spectrum of RF communication becomes more congested and demand for bandwidth continues to increase, VLCs that can use unlicensed frequency band are proposed as a solution. However, VLC channels have broadcasting characteristics that make them easily exposed to eavesdropping and jamming attacks, and are vulnerable to MITM (Man-In-The-Middle) due to their line of sight (LOS) propagation characteristics. These attacks on VLC channels compromise the confidentiality, integrity, and availability of communications links and data, resulting in higher data retransmission rates, reducing throughput and increasing power consumption, resulting in lower data transmission efficiency. In this work, we model vulnerable VLC channels to analyze the impact of attacks and communications vulnerabilities by malicious jammers.

  • PDF

Pre-Coding Method for Underwater Digital Communications in a Multipath Channel (다중 전달 경로 채널에서의 수중 디지털 통신을 위한 선 처리 기법)

  • Kim, Tae-Woo;Hwang, A-Rom;Seong, Woo-Jae;Lim, Young-Kon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.3
    • /
    • pp.154-162
    • /
    • 2008
  • Signals in an underwater channel get distorted by multipath propagation. In this paper, pre-coding method is suggested which helps comprehending the signals with minimum equalization. The signals are transformed based on the knowledge of the impulse response of the channel. Proposed pre-coding method is tested by simulations based on the ray theory and through water tank experiments. In weak multipath environment, in case of an SNR of about 20 dB, BER is $10^{-3}{\sim}10^{-4}$, while in strong multipath environment, similar BER is achieved with SNR of about 30 dB. In order for the pre-coding method to be used for underwater vehicles, channel prediction method utilizing the waveguide invariant is suggested and tested.

Remote field Eddy Current Technique Development for Gap Measurement of Neighboring Tubes of Nuclear Fuel Channel in Pressurized Heavy Water Reactor (중수로 핵연료채널과 인접관의 간격측정을 위한 원거리장 와전류검사 기술개발)

  • Jung, H.K.;Lee, D.H.;Lee, Y.S.;Huh, H;Cheong, Y.M.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.2
    • /
    • pp.164-170
    • /
    • 2004
  • Liquid Injection Nozzle(LIN) tube and Calandria tube(CT) in pressurized Heavy Water Reactor (PHWR) are .ross-aligned horizontally. These neighboring tubes can contact each other due to the sag of the calandria tube resulting from the irradiation creep and thermal creep, and fuel load, etc. In order to judge the contact which might be the safety concern, the remote field eddy current (RFEC) technology is applied for the gap measurement in this paper. LIN can be detected by inserting the RFEC probe into pressure tube (PT) at the crossing point directly. To obtain the optimal conditions of the RFEC inspection, the sensitivity, penetration and noise signals are considered simultaneously. The optimal frequency and coil spacing are 1kHz and 200mm respectively. Possible noises during LIN signal acquisition are caused by lift-off, PT thickness variation, and gap variation between PT and CT. The simulated noise signals were investigated by the Volume Integral Method(VIM). Signal analysis on the voltage plane describes the amplitude and shape of LIN and possible defects at several frequencies. All the RFEC measurements in the laboratory were done in variance with the CT/LIN gap and showed the relationship between the LIN gap and the signal parameters by analyzing the voltage plane signals.

Design of an RFID Communication Protocol Using Synchronized Chaotic Systems (동기화된 혼돈시스템을 이용한 RFID 통신 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.451-457
    • /
    • 2016
  • To improve security in the data communication field, many studies on the application of chaotic signals to encryption have been conducted in recent years. In this study, a new security protocol where the initial value sensitivity and noise similarity of chaotic signals have been applied to an RFID communication channel was designed. In the case of chaotic systems, if the initial values become identical, the same signals are generated at the same time after that point even though the two systems have been calculated independently. Therefore, an unpredictable security channel can be produced based on such characteristics. However, a security channel can be produced only when an initial value is shared in advance, and thus there is a potential problem of infringement during the transmission of the initial value. To resolve this problem, a method in which a certain proportion of new chaotic signals are applied to two chaotic systems for communication and are then synchronized after some time was proposed. This new method can conceal the initial value, and thus can resolve the problem of the existing communication method using chaotic signals. The designed method was verified with the encryption and decryption of images. It is expected that a more secure RFID system could be established by applying the communication protocol proposed in this study to insecure RFID communication channels.

Enhanced Reputation-based Fusion Mechanism for Secure Distributed Spectrum Sensing in Cognitive Radio Networks (인지 라디오 네트워크에서 안전한 분산 스펙트럼 센싱을 위한 향상된 평판기반 퓨전 메커니즘)

  • Kim, Mi-Hui;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.61-72
    • /
    • 2010
  • Spectrum scarcity problem and increasing spectrum demand for new wireless applications have embossed the importance of cognitive radio technology; the technology enables the sharing of channels among secondary (unlicensed) and primary (licensed) users on a non-interference basis after sensing the vacant channel. To enhance the accuracy of sensing, distributed spectrum sensing is proposed. However, it is necessary to provide the robustness against the compromised sensing nodes in the distributed spectrum sensing. RDSS, a fusion mechanism based on the reputation of sensing nodes and WSPRT (weighted sequential probability ratio test), was proposed. However, in RDSS, the execution number of WSPRT could increase according to the order of inputted sensing values, and the fast defense against the forged values is difficult. In this paper, we propose an enhanced fusion mechanism to input the sensing values in reputation order and exclude the sensing values with the high possibility to be compromised, using the trend of reputation variation. We evaluate our mechanism through simulation. The results show that our mechanism improves the robustness against attack with the smaller number of sensing values and more accurate detection ratio than RDSS.

Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach (증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법: 안전성 모델 및 변환모듈)

  • Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.69-78
    • /
    • 2004
  • During the last decade, security models have been defined for two- and three-parity key exchange protocols. Currently there is a growing research interest in security models for group key management schemes. While various security models and provably secure protocols have been proposed for distributed group key exchange schemes, no results are hewn for centralized group key distribution schemes in spite of their theoretical and practical importance. We describe security requirements and a formal security model for centralized group key distribution scheme: we define the model on the channel controlled by adversaries with the ability of strong user corruption. In the security model, we propose a conversion module which can transform centralized tree-based group key distribution schemes in the literature to provably secure centralized tree-based group key distribution schemes.