• Title/Summary/Keyword: 은밀 통신

Search Result 16, Processing Time 0.021 seconds

Analysis of Transceiver Structure and Experimental Results of Underwater Acoustic Communication Using the Sub-band (부 대역을 이용한 수중 음향 통신 송수신 구조 및 실험 결과 분석)

  • Jeong, Hyun-Woo;Shin, Ji-Eun;Jung, Ji-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.545-555
    • /
    • 2020
  • This paper presented efficient transceiver structure using sub-band processing for underwater communication in terms of covertness and performance improvement. In aspect of covertness, encrypted coded-bits are divided into groups, and center frequency and sub band are determined by coded-bits of each group. Therefore, as center frequencies are changed randomly, it maintain the covertness effectively. In aspect of performance improvement, the performance of underwater communication mainly depends on multi-path propagation characteristics, Doppler-spread, and frame synchronization. Accordingly, in order to overcome these effects, non-coherent energy detector and turbo equalization method are employed in receiver side. Furthermore, optimal frame synchronization was proposed. Through the simulation and lake experiment, performance analysis was conducted. Especially in the lake experiment, as a result of applying optimal frame synchronization method to receiver structure, errors are corrected in most frames.

A Multi Modal Interface for Mobile Environment (모바일 환경에서의 Multi Modal 인터페이스)

  • Seo, Yong-Won;Lee, Beom-Chan;Lee, Jun-Hun;Kim, Jong-Phil;Ryu, Je-Ha
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.666-671
    • /
    • 2006
  • 'Multi modal 인터페이스'란 인간과 기계의 통신을 위해 음성, 키보드, 펜을 이용, 인터페이스를 하는 방법을 말한다. 최근 들어 많은 휴대용 단말기가 보급 되고, 단말기가 소형화, 지능화 되어가고, 단말기의 어플리케이션도 다양해짐에 따라 사용자가 보다 편리하고 쉽게 사용할 수 있는 입력 방법에 기대치가 높아가고 있다. 현재 휴대용 단말기에 가능한 입력장치는 단지 단말기의 버튼이나 터치 패드(PDA 경우)이다. 하지만 장애인의 경우 버튼이나 터치 패드를 사용하기 어렵고, 휴대용 단말기로 게임을 하는데 있어서도, 어려움이 많으며 새로운 게임이나 어플리케이션 개발에도 많은 장애요인이 되고 있다. 이런 문제점들은 극복하기 위하여, 본 논문에서는 휴대용 단말기의 새로운 Multi Modal 인터페이스를 제시 하였다. PDA(Personal Digital Assistants)를 이용하여 더 낳은 재미와 실감을 줄 수 있는 Multi Modal 인터페이스를 개발하였다. 센서를 이용하여 휴대용 단말기를 손목으로 제어를 가능하게 함으로서, 사용자에게 편리하고 색다른 입력 장치를 제공 하였다. 향후 음성 인식 기능이 추가 된다면, 인간과 인간 사이의 통신은 음성과 제스처를 이용하듯이 기계에서는 전통적으로 키보드 나 버튼을 사용하지 않고 인간처럼 음성과 제스처를 통해 통신할 수 있을 것이다. 또한 여기에 진동자를 이용하여 촉감을 부여함으로써, 그 동안 멀티 모달 인터페이스에 소외된 시각 장애인, 노약자들에게도 정보를 제공할 수 있다. 실제로 사람은 시각이나 청각보다 촉각에 훨씬 빠르게 반응한다. 이 시스템을 게임을 하는 사용자한테 적용한다면, 능동적으로 게임참여 함으로서 좀더 실감나는 재미를 제공할 수 있다. 특수한 상황에서는 은밀한 정보를 제공할 수 있으며, 앞으로 개발될 모바일 응용 서비스에 사용될 수 있다.

  • PDF

Performance analysis and experiment results of multiband FSK signal based on direct sequence spread spectrum method (직접 수열 확산 방식 기반 다중 밴드 FSK 신호의 성능 분석 및 실험 결과)

  • Jeong, Hyun-Woo;Shin, Ji-Eun;Jung, Ji-Won
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.4
    • /
    • pp.370-381
    • /
    • 2021
  • This paper presented an efficient transceiver structure of multiband Frequency Shift Keying (FSK) signals with direct sequence spread spectrum for maintaining covertness and performance. In aspect to covertness, direct sequence spread spectrum method, which multiplying by Pseudo Noise (PN) codes whose rate is much higher than that of data sequence, is employed. In aspect to performance, in order to overcome performance degradation caused by multipath and Doppler spreading, we applied multiband, turbo equalization, and weighting algorithm are applied. Based on the simulation results, by applying 4 number of multiband and number of chips are 8 and 32, experiments were conducted in a lake with a distance of moving from 300 m to 500 m between the transceivers. we confirmed that the performance was improved as the number of bands and chips are increased. Furthermore, the performance of multiband was improved when the proposed weighting algorithm was applied.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

Comparison & Analysis of Drones in Major Countries based on Self-Driving in IoT Environment (사물인터넷 환경에서 자율주행 기반의 주요국 드론 특성 비교/분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2020
  • The remarkable change in the automobile industry, which is a traditional industrial field, is now evolving into a form of moving toward autonomous functions rather than humans due to various convenience functions and automatic driving or autonomous driving technologies if the person was central when driving the car. This situation is expanding to various industries such as the aviation industry and the drone market, as well as the robot market. The drone market in the aviation industry is being used in various fields due to the unmanned nature of drone operation. Among them, military drones are secret and due to the specificity of technology, details are not disclosed, but as a collection of advanced technologies, they have played a key role in drone development. In this study, the current status of China and the European Union, including the United States, which are major competitors in the drone field, was investigated, and the technologies of major countries were compared and analyzed through the characteristics and operational specifications of the drones currently in operation.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.