• Title/Summary/Keyword: 안전채널

Search Result 324, Processing Time 0.027 seconds

Study on Improvement for selecting the optimum voice channels in the radio voice communication (무전기 음성통신에서 최적음성채널 선택을 위한 개선방안에 관한 연구)

  • Lew, Chang-Guk;Lee, Bae-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.171-178
    • /
    • 2016
  • An aircraft in flight and ATC(: Air Traffic Controllers) working in the Ground Control Center carry out a voice communication using the radio. Voice signal to be transmitted from the aircraft is received to a plurality of terrestrial sites around the country at the same time. The ATC receives the various quality of voice signal from the aircraft depending on the distance, speed, weather conditions and adjusted condition of the antenna and the radio. The ATC carries out a voice communication with aircraft in the optimal conditions finding the best voice signal. However, the present system chooses the values of the CD(: Carrier Dectect) which is determined to be superior to, based on the input voice level, as optimal channel. Thus this system can not be seen to select the optimal channel because it doesn't consider the effect of the noise which influences on the communication quality. In this paper, after removing the noise in the voice signal, we could give the digitized information and an improved voice signal quality, so that users can select an optimal channel. By using it, when operating the training eavesdropping system or the aircraft control, we can expect prevention accident and improvement of training performance by selecting the improved quality channel.

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.

A Lightweight Key Agreement Protocol between Smartcard and Set-Top Box for Secure Communication in IPTV Broadcasting (IPTV환경에서 스마트카드와 셋톱박스간의 안전한 통신을 위한 경량화된 키 동의 프로토콜)

  • Lee, Hoon-Jung;Son, Jung-Gap;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.67-78
    • /
    • 2010
  • CAS(Conditional Access System) is used in Pay-TV System to prohibit unauthorized user(s) accessing the contents in IPTV broadcasting environment. In the CAS, Smartcard transfers CW which is necessary in the process of descrambling the scrambled program to STB. CW hacking problem is one of the most serious problems in pay-TV system. There have been many researches on generating secure communication channel between smartcard and STB for secure transmitting, But they had problems in efficiency and security. In this paper, we propose a lightweight key agreement protocol based on a symmetric key algorithm. We show that our proposed protocol is more efficient than existing protocols by comparing the amount of computations, and analyzing the security requirement of the proposed protocol.

A Study on big data utilization for implementation of the resident participation type safe community planning of the smart city (스마트시티의 주민참여형 안전도시 계획을 위한 빅데이터 활용에 관한 고찰)

  • Chang, Hye-Jung;Kim, Do-Nyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.478-495
    • /
    • 2016
  • The existing city planning was performed by internal few decision-maker, but the information that an individual could contact with through the evolution of the ICT technology increased in the smart city, and a channel diversified and came to be able to participate in a decision making process by various methods. I show that it is in the collaborative planning process to come to a mutual understanding with residents directly or indirectly if utilize big data in a process of the safe community planning of the smart city. Therefore, I compare the utilization contents between data of Matsubara-shi,Japan and data of certification city of Korea which received the certification of the WHO international safe community. In the area where this study prepares for the approval of the international safe community, it wants you to use it though you utilize the data as the supporting role of the residents participation plan.

Secure Bootstrapping Methods of a Mobile Node on the Mobile IPv6 Network (IPv6기반 이동인터넷 환경에서 이동노드의 안전한 시동에 관한 방법)

  • Nah Jaehoon;Chung Kyoil;Han Chi-Moon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.1-8
    • /
    • 2005
  • At IETF (Internet Engineering Task Force), recently RFC3775, RFC3776 documents about the mobile IPv6 were standardized by IETF (Internet Engineering Task Force). Those specifications propose that during the roaming, the mobile node sends securely the binding update to the home agent and the correspondent node after setting the security association between Mobile Node and Home Agent. But there is no secure bootstrapping method between a mobile node and a home agent at the two RFC documents. This paper proposed a method for the secure bootstrapping between a mobile node and a home agent. This makes the authentication, binding update, home agent assignment, security association distribution through the AAA-based secure channel between mobile node and home agent. And the proposed method was analyzed in the view of the procedure, round trip and security strength.

The Effect of the Improvement of the Sales Regulation of General Medicine and Political Proposals (일반의약품 판매규제 완화효과와 정책제언)

  • Yeom, Min-Sun
    • Journal of Distribution Research
    • /
    • v.15 no.5
    • /
    • pp.237-255
    • /
    • 2010
  • The Korean Pharmacist Law has limited the sales of medicine to pharmacies. This has caused difficulty in purchasing medicine late at night or on holidays, which has limited the range of customers' selections and accelerated customers' discomfort, accordingly. Also, the rapid progress of aging has quickly boosted medical expenses for seniors, and has served as a factor that aggravates the budget of national medical insurance. Meanwhile, advanced countries, including the USA and Japan, have allowed the sales of general medicine, of which the safety and efficacy have been tested, in general retail stores such as convenience stores or super markets from the perspective of supporting self-medication. In particular, Japan, which has a strong tendency of pursuing safety in the world, diversified sales channels for general medicine in order to control quickly rising medical expenses. As a result, Japan has achieved the effect of easing various regulations as follows in the economic and social fields. First, the increasing distribution channels of general medicine from pharmacies to general retail stores provoked a potential demand, which also expanded related markets. Second, the competition between sales channels resulted in the reduction of the price of medicine. Third, the growing sales channels of medicine have extended the options of consumers and, subsequently, the convenience in the use of consumers has increased. Fourth, the creation of a competitive environment owing to the diversification of sales channels has accelerated an effort to enhance corporate competitiveness. Fifth, the foundation of enhancing the financial soundness of medical expenses has been prepared through the formation of a self-medication environment. In 2000, the Korean population aged 65 or over exceeded 7%, and it is anticipated to be over 14% by 2018; thus, the increase of national medical expenses will be sped up. As a way of being prepared for the era of aging, we, just as other advanced countries, need to create a self-treatment environment by diversifying the sellers of general medicine, and, thus, reduce spending on personal medical expenses, enhance the financial soundness of national medical insurance, and, further, promote the welfare of consumers.

  • PDF

Fabrication of Three-Dimensional Scanning System for Inspection of Mineshaft Using Multichannel Lidar (다중채널 Lidar를 이용한 수직갱도 조사용 3차원 형상화 장비 구현)

  • Soolo, Kim;Jong-Sung, Choi;Ho-Goon, Yoon;Sang-Wook, Kim
    • Tunnel and Underground Space
    • /
    • v.32 no.6
    • /
    • pp.451-463
    • /
    • 2022
  • Whenever a mineshaft accidentally collapses, speedy risk assessment is both required and crucial. But onsite safety diagnosis by humans is reportedly difficult considering the additional risk of collapse of the unstable mineshaft. Generally, drones equipped with high-speed lidar sensors can be used for such inspection. However, the drone technology is restrictively applicable at very shallow depth, failing in mineshafts with depths of hundreds of meters because of the limit of wireless communication and turbulence inside the mineshaft. In previous study, a three-dimensional (3D) scanning system with a single channel lidar was fabricated and operated using towed cable in a mineshaft to a depth of 200 m. The rotation and pendulum movement errors of the measuring unit were compensated for by applying the data of inertial measuring unit and comparing the similarity between the scan data of the adjacent depths (Kim et al., 2020). However, the errors grew with scan depth. In this paper, a multi-channel lidar sensor to obtain a continuous cross-sectional image of the mineshaft from a winch system pulled from bottom upward. In this new approach, within overlapped region viewed by the multi-channel lidar, rotation error was compensated for by comparing the similarity between the scan data at the same depth. The fabricated system was applied to scan 0-165 m depth of the mineshaft with 180 m depth. The reconstructed image was depicted in a 3D graph for interpretation.

A Study on NOx Removal Efficiency Depending on Electrode Configurations of Silent Discharges (무성방전 플라즈마 전극구조에 대한 질소산화물 제거효율 연구)

  • Hyung-Taek Kim;Young-Sik Chung;Myung-Whan Whang;Elena. A. Filimonova
    • Journal of the Korean Society of Safety
    • /
    • v.17 no.3
    • /
    • pp.112-117
    • /
    • 2002
  • A comparative investigation of an experimental and a simulation of chemical kinetics for NOx removal from silent(dielectric-barrier) discharges is presented. Several types of dielectric-barrier discharges were implemented depending upon the configuration of electrodes. The simulation was based on an approximate mathematical model for plasma cleaning of waste gas. The influence of non-uniform distributions of species due to the production of primary active particles in the streamer channel was taken into account. A comparison of observed experimental to the calculated removal efficiency of NOx showed acceptable agreement.

HAN(Home Area Network) in Zigbee Safety Authentication Mechanism for Zigbee Device (홈 네트워크 디바이스에서 ZigBee기반의 안전한 인증 메커니즘)

  • Choi, Ji-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.267-271
    • /
    • 2010
  • Zigbee는 단말에 대한 경제성이 뛰어나고 저 전력통신을 이용하기 때문에 수명이 길다. Mesh, Tree, Star 등 다양한 방식의 토플리지 구조를 지원 하며 확장성이 뛰어나 군사적인 용도, 환경 모니터링 시스템 등 많은 분야에 사용되고 있다. 최근 스마트그리드환경을 구축함에 있어 Zigbee는 HAN(Home Area Network)에 표준으로 사용될 예정이며 현재는 Zigbee를 이용한 AMR(Automatic Meter Reading)을 시범 중에 있다. 일반적으로 ZIgbee Network은 ZC(Zigbee Coordinator), ZCH(Zigbee Cluster Head), ZE(Zigbee End Device) 3가지로 구성되며, Zigbee Network에서 발생할 수 있는 취약점은 허가되지 않은 디바이스의 접근, 라우터의 흐름을 조작하는 방법, ZC(Zigbee Coordinator)와 ZE(Zigbee End Device)사이의 키 전송 시 안전하지 않은 채널을 이용하여 전송되는 문제가 발생된다. 본 논문에서는, TCP(Third Party Center)를 이용함으로써, ZE와 ZC간의 키 생성 시 발생하는 취약점을 보완하였다. 또한 인증절차를 강화함으로써 ZE(Zigbee End Device)에서 발생 할 수 있는 취약점을 보완하고자 하였으며 RS(Register Server)를 이용하여 HAN에 존재하는 디바이스에 대하여 실시간 모니터링이 가능하게 하였다.

  • PDF