• Title/Summary/Keyword: 은밀 통신

Search Result 16, Processing Time 0.02 seconds

은밀 수중음향통신

  • Kim, Gi-Man
    • Information and Communications Magazine
    • /
    • v.33 no.8
    • /
    • pp.82-88
    • /
    • 2016
  • 본고에서는 은밀 수중음향통신과 관련한 연구동향과 수중 채널 환경의 특징들에 대해 소개한다. 육상 무선통신 환경과 마찬가지로 수중 채널에서도 전달 손실, 다중경로 전달, 도플러 효과 및 잡음이 장애 요인으로 작용하나 물 속의 상황을 정확히 예측하기 어렵고 시간에 따른 변동성이 매우 심하기 때문에 통신 시스템 설계를 어렵게 한다. 이러한 장애 요인들을 극복하면서 은밀 수중음향통신으로써 대표적인 대역확산 기법과 함께 수중 생체 모방형 신호를 사용하는 방법을 소개하고, 실제 국내 해역에서 획득한 데이터를 이용한 결과들을 제시한다.

Research trends of biomimetic covert underwater acoustic communication (생체모방 은밀 수중 음향 통신 연구 동향)

  • Seol, Seunghwan;Lee, Hojun;Kim, Yongcheol;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.2
    • /
    • pp.227-234
    • /
    • 2022
  • Covert Underwater Communication (CUC) signals should not be detected by other unintended users. Similar to the method used in Radio Frequency (RF), covert communication technique sending information underwater is designed in consideration of the characteristics of Low Probability of Detection (LPD) and Low Probability of Intercept (LPI). These conventional methods, however, are difficult to be used in the underwater communications because of the narrow frequency bandwidth. Unlike the conventional methods of reducing transmission power or increasing the modulation bandwidth, a method of mimicking the acoustic signal of an underwater mammal is being studied. The biomimetic underwater acoustic communication mainly mimics the click or whistle sound produced by dolphin or whale. This paper investigates biomimetic communication method and introduces research trends to understand the potential for the development of such biomimetic covert underwater acoustic communication and future research areas.

Turbo Equalization for Covert communication in Underwater Channel (터보등화를 이용한 직접대역확산통신 기반의 은밀 수중통신 성능분석)

  • Ahn, Tae-Seok;Jung, Ji-Won;Park, Tae-Doo;Lee, Dong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1422-1430
    • /
    • 2016
  • Researches for oceans are limited to military purpose such as underwater sound detection and tracking system. Underwater acoustic communications with low-probability-of-interception (LPI) covert characteristics were received much attention recently. Covert communications are conducted at a low received signal-to-noise ratio to prevent interception or detection by an eavesdropper. This paper proposed optimal covert communication model based on direct sequence spread spectrum for underwater environments. Spread spectrum signals may be used for data transmission on underwater acoustic channels to achieve reliable transmission by suppressing the detrimental effect of interference and self-interference due to jamming and multipath propagation. The characteristics of the underwater acoustic channel present special problems in the design of covert communication systems. To improve performance and probability of interception, we applied BCJR(Bahl, Cocke, Jelinek, Raviv) decoding method and the direct sequence spread spectrum technology in low SNR. Also, we compared the performance between conventional model and proposed model based on turbo equalization by simulation and lake experiment.

OFDM based mimicking dolphin whistle for covert underwater communications (OFDM 기반 돌고래 휘슬음 모방 수중 은밀 통신 기법)

  • Lee, Hojun;Ahn, Jongmin;Kim, Yongcheol;Seol, Seunghwan;Kim, Wanjin;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.3
    • /
    • pp.219-227
    • /
    • 2021
  • This paper proposed an Orthogonal Frequency Division Multiplexing (OFDM) based biomimetic communication method using a dolphin whistle which covertly transmits communication signals to allies. The proposed method divides the dolphin whistle into several time slots corresponding to a number of OFDM symbols, and modulates the communication signal by mapping differential phase shift keying (DPSK) symbols into subcarriers that have the frequency bands of the dolphin whistle in each slot. The advantages of the proposed method are as follows: In the conventional Chirp Spread Spectrum (CSS) and Frequency Shift Keying (FSK) based biomimetic communication methods, the discontinuity of the frequency contour is large, but the proposed method can reduce the discontinuity. Even if the modulation order is increased, the degradation of the mimicking performance is small. The computer simulations demonstrate that the Bit Error Rate (BER) and mimicking performance of the proposed method are better performance than those of the conventional CSS and FSK.

Detection Performance Analysis of Underwater Vehicles by Long-Range Underwater Acoustic Communication Signals (장거리 수중 음향 통신 신호에 의한 수중 운동체 피탐지 성능 분석)

  • Hyung-Moon, Kim;Jong-min, Ahn;In-Soo, Kim;Wan-Jin, Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.11-22
    • /
    • 2022
  • Unlike a short-range, a long-range underwater acoustic communication(UWAC) uses low frequency signal and deep sound channel to minimize propagation loss. In this case, even though communication signals are modulated using a covert transmission technique such as spread spectrum, it is hard to conceal the existence of the signals. The unconcealed communication signal can be utilized as active sonar signal by enemy and presence of underwater vehicles may be exposed to the interceptor. Since it is very important to maintain stealthiness for underwater vehicles, the detection probability of friendly underwater vehicles should be considered when interceptor utilizes our long-range UWAC signal. In this paper, we modeled a long-range UWAC environment for analyzing the detection performance of underwater vehicles and proposed the region of interest(ROI) setup method and the measurement of detection performance. By computer simulations, we yielded parameters, analyzed the detection probability and the detection performance in ROI. The analysis results showed that the proposed detection performance analysis method for underwater vehicles could play an important role in the operation of long-range UWAC equipment.

A biomimetic communication method based on time shift using dolphin whistle (돌고래 휘슬을 이용한 지연시간 기반 생체 모방 통신 기법)

  • Lee, Hojun;Ahn, Jongmin;Kim, Yongcheol;Lee, Sangkug;Chung, Jaehak
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.5
    • /
    • pp.580-586
    • /
    • 2019
  • In this paper, we propose a biomimetic communication method using a dolphin whistle to covertly transmit the communication signal. A conventional CSS (Chirp Spread Spectrum) modulation technique divides dolphin whistle into several slots and modulates with up and down chirp signals. That causes the time-frequency characteristic difference between the original dolphin whistle and the camouflage performance is degraded. In this paper, we propose a delay based modulation scheme to eliminate distortions. The simulation results show that the bit error rate of the proposed method is better performance than that of the conventional CSS modulation method by about 3.5 dB to 8 dB. And the camouflage performance that evaluated through the cross correlation in the time-frequency domain is also better than that of the CSS modulation method.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

Analyses and considerations for security requirement of PKI for user experience data (사용자 경험 데이터를 위한 PKI의 보안 요구 사항 분석 및 고찰)

  • Im, Hyungjin;Lee, Deok Gyu;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.409-411
    • /
    • 2015
  • 최근 사물인터넷에 대한 발전이 빠르게 이루어짐에 따라서 인터넷 상의 보안 이슈 또한 증가하고 있다. 이에 따라 데이터를 안전하고 은밀하게 통신하기 위한 공개키 기반 구조 (public-Key Infrastructure: PKI) 기술이 발전하고 있다. PKI는 신뢰할 수 있는 기관에서 개인이나 기관을 식별할 수 있는 인증서를 저장하고 있으며 이를 활용할 수 있도록 돕는 디렉토리 서비스를 제공한다. 특히 기존의 PKI 구조에는 사용자의 경험이 담겨있는 패스워드 기반으로 개인키를 암호화 하고 있다. 이는 사용자 인증과 데이터 암호화와 같은 강력한 보안 서비스를 제공하고 있지만 이 또한 취약점을 내포하고 있다. 본 논문에서는 공개키 기반 구조의 핵심 요소에 대해 논의하며 보안 취약점을 분석한다. 이를 통해 안전한 사물인터넷 환경을 위한 연구 방향을 제시한다.

Private Pseudonym Retrieval with Controlled Traceability (추적 가능한 가명 은밀 획득 프로토콜)

  • Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.113-118
    • /
    • 2006
  • Pseudonyms must be maintained anonymously even to the organization that issues the pseudonyms, but when some event occurs that policy defines the real identity for the pseudonym must be able to be traced. We propose a private pseudonym retrieval protocol with controlled traceability using m-out-of-n oblivious transfer and cut-and-choose technique.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF