• Title/Summary/Keyword: 안전채널

Search Result 324, Processing Time 0.031 seconds

An Implementation of the Dual Packet Seamless Transfer Protocol for Safety-related Railway Signaling System Network (철도 신호시스템의 Fail-Safe 네트워크를 위한 DPST(Dual Packet Seamless Transfer) 프로토콜의 구현)

  • Kim, Kyung-Shik;Ryu, Shin-Hyung;Kwon, Cheol;Lee, Jong-Seong
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.396-405
    • /
    • 2009
  • An interlocking equipment of railway signalling systems should have very high functional safety and reliability properties because of its vital railway protection functionality. In order to achieve the required safety and reliability level, an engineer, in general, designs and implements the interlocking equipment to operate under RTOS(Realtime Operating System) environment, and the control hardware architecture redundant to cope with the random failures of system or subsystem. In such an architecture, it's very difficult to implement the interlocking equipment to communicate with various interface systems including the signal operator's terminal. In this paper, we propose a dual ethernet network topology and dual packet seamless transfer protocol algorithm for railway signaling system such as the interlocking equipment. We verify in this paper that the proposed DPST protocol algorithm has the evidence of its robust properties against the random hardware faults and communication errors. The proposed communication structure and algorithm is implemented in the electronic interlocking equipment for the private railway system of Hyundai Steel Company and its performance and properties are validated on the guideline of European Railway Standard EN50159.

  • PDF

Design and realization of the passenger ship's MSP service system using ASM2.0 : focusing on captain's mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 여객선 MSP서비스 시스템 설계 및 구현)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.871-882
    • /
    • 2015
  • AIS-ASM is one of the studies to provide a variety of maritime safety information as well as the information on a ship's position that is their own function, and AIS-ASM has been implemented with adjustment of the relevant regulations since 2004. However, it was reported that the increased use of ASM message on the existing AIS channel affects the part of the existing AIS own function such as the transmission of the ship's position and safe-related information. Also, seamless MSP service is difficult to provide at a low transmission rate of the existing AIS channel. This study aims to reduce the marine officer's workload through automating captain's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and realized the ASM2.0 protocol through analyzing domestic regulations about passenger flight and AIS-ASM message.

Development of Rainfall Estimation Technology in the Korean Peninsula in the Event of Heavy Rain using COMS and GPM Satellites (천리안 위성과 GPM 위성을 활용한 한반도 호우사상 강우추정 기술 개발)

  • Cheon, Eun Ji;Lee, Dalgeun;Yu, Jung Hum
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.5_2
    • /
    • pp.851-859
    • /
    • 2019
  • The COMS satellites take image of the Korean Peninsula every 15 minutes, but due to the limitations of the observational channels, they tend to underestimate when estimating rainfall. In this study, we developed satellite-based rainfall estimation technology using COMS and GPM that can be used in the heavy rain on the Korean Peninsula. The time resolution and spatial resolution of COMS satellites and GPM satellites were matched to improve accuracy using GPM IMERG data. As a result, it showed that the number of correlations with the ASOS observations was more than 0.7, enabling the estimation of rainfalls that are more accurate than the estimates of rainfall by COMS satellites. It is believed that the application of the subsequent satellite(GK-2A) will provide more accurate rainfall estimation information in the future. Therefore, we expect greater utilization in disaster management for the ungauged areas.

Secure Direct Communication protocol Using Entanglement Swapping (Entanglement Swapping을 이용한 안전한 직접 통신 프로토콜)

  • Hong Chang-ho;Lee Hwa-yean;Kim Ji-in;Lim Jong-in;Yang Hyung-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.3-12
    • /
    • 2006
  • We propose a direct communication protocol using entanglement swapping. The safety of this protocol is guaranteed by the basic properties of entanglement swapping. This protocol is efficient to transmit two classical bits of information per one session. This efficiency is better than that of ping-pong protocol suggested by Bostrom and Felbinger. Even if an eavesdropper intervenes in midway, the eavesdropper will be detected with the probability of $75\%$ in the verification process of one bit. Therefore the perfect security is guaranteed if we use enough amount of bits for the verification process.

ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR (일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH)

  • 권정옥;황정연;김현정;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.93-112
    • /
    • 2002
  • Since the multicast group which is composed of various members is dynamic, members of the group frequently join or leave. So, for a new session, group keys are efficiently updated and distributed. In this paper, we describe very simple and new efficient logical key hierarchy(ELKH) protocol which is based on an one-way function. In the previous schemes, when the group controller distributes new created keys or updated keys to the members the information is usally encryted and then transmited over a multicast channel. But ELKH secretes the multicast message by using the one-way function and XOR operator instead of encrypting it. Hence our main construction improves the computational efficiency required from the group controller and group memebers while doesn't increase size of re-keying message when compared to $EHBT^{[12]}$. Assuming the security of an underlying one-way function, we prove that our scheme satisfies forward secrecy and backward secrecy.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

Design and Implementation of a Cryptograhic API considering a DRM Environment (DRM 환경을 고려한 보안 통신 API의 설계 및 구현)

  • Jung, In-Sung;Shin, Yong-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.163-170
    • /
    • 2004
  • The additional mechanism Is required to set up a secure connection among the communication subjects in the internet environment. Each entity should transfer and receive the encrypted and hashed data to guarantee the data integrity. Also, the mutual authentication procedure should be processed using a secure communication protocol. The SSL/TLS is a protocol which creates the secure communication channel among the communication subjects and sends/receives a data. Although the OpenSSL which implements the TLS is using by many developers and its stability and performance are proved, it has a difficulty in using because of its large size. So, this Paper designs and implements the secure communication which the users can use easily by modification works of OpenSSL library API. We proved the real application results using the DRM client/server case which supports a secure communication using the implemented API.

A Self-Recovering Key Management Scheme for Reliable Broadcast Encryption (신뢰성 있는 브로드캐스트 암호화를 위한 자가 키 복구 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.471-480
    • /
    • 2009
  • One of the principal impediments to the achievement of a scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during the transmission over an insecure broadcast channel, or transmitted to the receivers while it was off-line. In this study, we propose a novel group key management scheme that features a mechanism that allows the legitimate receivers to recover the current group key even if they lose key update messages for long-term sessions using short hint messages and member computation. The performance analysis result shows that the proposed scheme has advantages of the scalable and efficient rekeying compared with the previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast where there is no feedback channel from receivers to the broadcasting station.

Development of a Hash Function and a Stream Cipher and Their Applications to the GSM Security System (해쉬함수와 스트림 암호기의 개발 및 GSM 보안 시스템에의 적용)

  • Kim, Bun-Sik;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2421-2429
    • /
    • 2000
  • With the advance of wireless communications technology, mobile communications have become more convenient than ever. Nowadays, people can communicate with each other on any place at any time. However, because of the openness of wireless communications, the way to protect the privacy between communicating parties is becoming a very important issue. In this paper, we present a study on the authentication and message encryption algorithm to support roaming service to the GSM network. To propose an authentication and message encryption algorithm applicable to the GSM system, the security architecture of the GSM outlined in the GSM standard is briefly introduced. In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on Linear Feedback Shift Register(LFSR) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

  • PDF

Development of the Multichannel Vibration Monitoring System (다채널 진동 모니터링 장치 개발)

  • Hong, Tae-Yong;Park, Soo-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.7
    • /
    • pp.671-676
    • /
    • 2016
  • This study is about design for the Rotational Instrument of the Industry factory which is used management safety and maintenance. We developed the multichannel vibration monitering system of the self-diagnosis for middle level CMS(Condition Monitoring System) market, and that system are new features to the expandability and flexibility. Normally one channel is used for treating one signal, but developed instrument can treat four channel with one signal processing card. One rack have redundant power supply and displace and it can check vibration measurement value in field without computer. Bearing fault detection is fundamental of vibration surveillance, but sometimes can not check with vibration velocity and acceleration. So it need the filtering and the amplitude modulation on the acceleration enveloping technology when irregular vibration is happened. We developed the vibration analysis instrument which is applied such technology. And the development prototype shows activated within the vibration error limit.