• Title/Summary/Keyword: 제한수신

Search Result 504, Processing Time 0.021 seconds

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Rectangular Region-based Selective Enhancement (RSE) for MPEG-4 FGS Video (MPEG-4 FGS 비디오를 위한 사각영역 기반의 선택적 향상기법)

  • 서광덕;신창호;김재균
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.634-647
    • /
    • 2003
  • In MPEG-4 FGS (fine granular scalability) video, SE (selective enhancement) function is adopted to enhance the subject quality of the region of interest (ROI). However, it has the problem of excessive bit-rate increase in the enhancement layer. We present a new rectangular region-based SE (RSE) algorithm to significantly reduce the overhead bits resulting from the standard SE. The proposed RSE is based on two new algorithms. The first is to apply the SE function to a rectangular region. By doing so, we can reduce the required bits for describing the selectively enhanced region. The second is to use constrained bit-plane scanning (CBS) to encode bit-planes of the enhancement layer. By using CBS, we can efficiently encode the ALL-ZERO symbols that are generated by applying the SE. It Is shown by simulation that the proposed RSE can provide a good visual quality for the selected rectangular region with significantly reduced overhead bits.

Design of A Stateless Minimum-Bandwidth Binary Line Code MB46d (Stateless 최소대역폭 2진 선로부호 MB46d의 설계)

  • Lee, Dong-Il;Kim, Dae-Young
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.10
    • /
    • pp.11-18
    • /
    • 1998
  • A binary line code, called MB46d, is designed by use of the BUDA(Binary Unit DSV and ASV) cell concept to retain the property of being runlength limited, DC tree, and with a power spectral null at the Nyquist frequency. This new code is a stateless line code with a simple encoding and a decoding rule and enables efficient error monitoring. The power spectrum and the eye pattern of the new line code are simulated for a minimum-bandwidth digital transmission system where the sinc function is used as a basic pulse. The obtained power null at the Nyquist frequency is wide enough to enable easy band-limiting as well as secure insertion of a clock pilot where necessary. The eye is also substantially wide to tolerate a fair amount of timing jitter in the receiver.

  • PDF

Public Key Encryption with Keyword Search for Restricted Testability (검증 능력이 제한된 검색 가능한 공개키 암호시스템)

  • Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.3-10
    • /
    • 2011
  • To provide efficient keyword search on encrypted data, a public key encryption with keyword search (PEKS) was proposed by Boneh et al. A sender encrypts an e-mail and keywords with receiver's public key, respectively and uploads them on a server. Then a receiver generates a trapdoor of w with his secret key to search an e-mail related with some keyword w. However, Byun et al. showed that PEKS and some related schemes are not secure against keyword guessing attacks. In this paper, we propose a public key encryption with keyword search for restricted testability (PEKS-RT) scheme and show that our scheme is secure against keyword guessing attacks.

A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System (IPTV 시스템에서의 효과적인 콘텐츠 보호를 위한 일회성 암호와 수신제한시스템을 사용한 보안 모델)

  • Seo, Ki-Taek;Kim, Tae-Hun;Kim, Jung-Je;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2010
  • The evolution of internet have opened the world of IPTV. With internet protocol, IPTV broadcasts contents stream. The IP protocol doesn't provide secure service due to IP characteristics. So, it is important to provide both connect and secure service. Conditional Access System and/or Digital Right Management are being used to protect IPTV contents. However, there exist restrictions in the view of security. In this paper, we analyse existing security technologies for IPTV and propose a novel method to enforce security efficiently. In the proposed method, OTP is used for encryption/decryption contents and CAS controls key for encryption/decryption and the right of user. With this scheme, it reduces the load of the system and provides more security.

An Efficient Flooding Algorithm for Position-based Wireless Ad hoc Networks (위치 기반 무선 애드 혹 네트워크에서의 효율적인 플러딩 기법)

  • JaeGal, Chan;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.17-28
    • /
    • 2008
  • Rapid transmission of packets is important in mobile ad hoc networks. Therefore, a flooding algorithm which can guarantee a short delay is useful in various ways of packet transmission. Flooding algorithm is one of the packet transmission methods that broadcasts a packet to all nodes within a transmission range. It does not rebroadcast the same packet which is already received from other nodes. Basically, flooding algorithm's advantages are that it simply writes an address and a sequence number in a packet, and it can be adapted for topological changes easily. However, the basic flooding algorithm has a shortcoming that causes excessive traffic because all nodes transmit a packet at least once. To solve this problem, research about flooding algorithms that constrains duplicated transmission of packets based on probabilistic and geographical information is going on. However, the existing algorithm cannot guarantee short delay and low traffic. To reduce a delay, in this paper we propose a flooding scheme where a node which receives a broadcasted packet chooses and allocates a priority to one of its neighbor nodes and then the node transmits the packet promptly to the node to whom the priority was given. Moreover, we propose a totally fresh a roach to constrain duplicated transmission by searching a node that already received the same packet by using node's geographical position information. Lastly, we compare the performance of the proposed algorithm with the existing algorithm through simulation. The results show that the proposed algorithm can distribute packets through a lower number of total packet transmissions and faster delivery time than the existing algorithm.

Signal Coverages of DGPS Beacon Stations in Korea (우리나라 DGPS 보정국의 위치보정신호의 이용범위)

  • Ahn, Jang-Young;Choi, Chan-Moon
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.40 no.1
    • /
    • pp.47-53
    • /
    • 2004
  • For the purpose of comparison between the designed coverage and actual coverage of Korean DGPS (Differential Global Position System) beacon stations, we have received the ship‘s positions with states and IDs of their stations on the navigation route of Jeju-Tianjin by automatic selection mode of DGPS receiver and on them of Jeju-Inchun and Jeju-Vladibostok by manual mode. Also in case that some obstructions were on propagation routes from DGPS beacon stations to receiving positions, a restriction on available ranges of DGPS beacon signals was investigated. The results obtained are as follows : 1. The coverage of Korean DGPS beacon stations was designed 100NM (Nautical mails) at 40.0dB(over ${\mu}$V/m). But the actual coverages of them according to their stations and propagation routes were 0.3-3.6 times as wide as designed coverage. 2. In case that the propagation route of beacon signals from DGPS beacon stations was on the sea, the propagation distance of north direction from the stations was longer than south direction. 3. The coverages of Echongdo and Ulungdo stations were 366NM on the yellow sea and 342.3NM on the east sea of Korea respectively, and were widest than any other stations. 4. The coverage of Marado station on the south and yellow seas of Korea was very unstable because of the Halla mountain on the propagation route. Maximum receiving range to be measured by automatic selection mode of DGPS receiver was 145NM on the route of Jeju-Tianjin on June 22-July 1, 2002. Minimum receiving range to be not measured by manual selection mode was 28.7NM on the route of Jeju-Inchun on June 26-28, 2003

Performance Analysis of DS-CDMA System using Space-Time Beamformers (시공간 빔포머를 이용한 DS-CDMA 시스템의 성능 분석)

  • 변건식;김성곤;이성신;박미선
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.34-41
    • /
    • 2003
  • As a channel of a DS-CDMA system is shared among several users, the receivers face the problem of MAI. Also the bandlimited channel leads to ISI. Both components are undesired, but unlike the additive noise process, which is usually completely unpredictable, their space-time structure helps to estimate and remove them. This paper investigates a DS-CDMA system with a fading multipath channel. The investigations have been separated into a channel estimation part and a reception part. In the estimation part of seperated two parts, the multipath parameters such as DOA and TOA are evaluated in this paper. In the part of receiver, we used these parameters and tested the performance of this receiver about space-time beamformers(Decorrelating, Match-Filter, Wiener-Hopf, Subspace-Based). To assess many different estimation techniques and beamformers, the simulation compared with theoretical values is performed.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

Study for the Enhancement of Signal Characteristics using Matched Filter Array Processing in the Water-Tank (정합필토배열처리를 이용한 수조내에서의 음원 특징 개선에 관한 연구)

  • Ro Yong-ju;Son Geun-young;Yoon Jong-rak
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • autumn
    • /
    • pp.189-192
    • /
    • 1999
  • 수중소음체의 음원 특징을 해석하기 위해서는 배경잡음과 해면$\cdot$해저반사파의 영향이 적은 심해에서 측정하여 분석하여야 한다. 그러나 측정의 어려움으로 인공 수조에서 측정하여 수면과 수조벽에 의해 발생되는 반사파들을 제거하여 신호 고유의 특징을 해석한다 이러한 반사파들의 부가효과를 보상하여 수중소음체의 신호특징을 해석하기 위하여 정합필터배열처리(Matched Filter Array Process : MFAP)기법을 적용하고자 할 때 각 센서에 적용되는 정합필터는 처리시간의 문제로 인해 필터길이를 제한하여 구성되게 된다 정합필터는 수조의 임펄스응답함수의 시역전함수로 정의되는데 필터길이에 따라 수신신호 특징 개선 정도가 좌우된다 본 연구에서는 인공수조에서 부가되는 반사파들의 효과를 보상하여 수신신호 특징 개선을 위해 정합필터배열처리기법을 적용할 때 각 센서의 정합필터의 시간길이가 특징 개선에 미치는 영향을 신호대잡음비(SNR)로 정의하여 분석하였고 수조의 특성에 따른 최적의 정합필터 시간길이를 제안하고자 한다.

  • PDF