• Title/Summary/Keyword: 펌웨어 분석

Search Result 53, Processing Time 0.026 seconds

A Bluetooth Protocol Analyzer including Simulation Function based on PC Environment (PC 환경에서 시뮬레이션 기능을 포함한 블루투스 프로토콜 분석장비)

  • 정중수
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.95-99
    • /
    • 2003
  • In addition to wired communication technology, wireless communication technology has had communication revolution nowadays. Bluethooth technology carries out data/voice communication within pico-net. Nowadays the various services are supported by access network connected to public network. This paper presents implementation of bluetooth protocol analyser which simulates bluetooth protocol. MS window98 and visual C are used for development environment and application program is operated over the firmware loaded on the bluetooth device connected to the PC through UART which of the maximum transmission rate is 115kbps because transmission rate less than 20kbps affects rarely the performance. The performance analysis on the propose system is carried out as simulating the signalling information for the voice test and the traffics between two bluetooth systems for file transfer. The throughput analysis for file transfer service and call processing capacity for voice service are considered as performance analysis parameters. File access time is very important parameter and throughput is 13 kbps in case breakpoint time to file access is 0.04sec. Also call processing time is about 16.6ms in case of communication with the headset. The performance analysis of simulation results satisfies with bluetooth device development.

Design of Communication Board for Communication Network of Nuclear Safety Class Control Equipment (원자력 안전등급 제어기기의 통신망을 위한 통신보드 설계)

  • Lee, Dongil;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.185-191
    • /
    • 2015
  • This paper suggest the safety class communication board in order to design the safety network of the nuclear safety class controller. The reactor protection system use the digitized networks because from analog system to digital system. The communication board shall be provided to pass the required performance and test of the safety class in the digital network used in the nuclear safety class. Communication protocol is composed of physical layer(PHY), data link layer(MAC: Medium Access Control), the application layer in the OSI 7 layer only. The data link layer data package for the cyber security has changed. CRC32 were used for data quality and the using one way communication, not requests and not responses for receiving data, does not affect the nuclear safety system. It has been designed in accordance with requirements, design, verification and procedure for the approving the nuclear safety class. For hardware verification such as electromagnetic test, aging test, inspection, burn-in test, seismic test and environmental test in was performed. FPGA firmware to verify compliance with the life-cycle of IEEE 1074 was performed by the component testing and integration testing.

Vibration Pattern Editor and Controller for Sound-driven Vibration System (사운드 기반 진동 시스템을 위한 진동 패턴 에디터와 컨트롤러)

  • Oh, Sung-Jin;Cho, Dong-Hyun;You, Yong-Hee;Sung, Mee-Young;Jun, Kyung-Koo
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.564-568
    • /
    • 2008
  • In this paper, we develop a vibration pattern editor and a vibration pad controller for a sound-driven vibration system, which can generate diverse vibration effects in realtime by analyzing signals from the sound output of PC. It consists of a DSP system to analyze the sound, a wrist-wearable vibration pad, and its controller. For the vibration pattern editor, we define four elements to describe the pattern the locations of vibrating elements, start time, duration, and vibration intensity. The editor provides a GUI through which users can create such patterns fast and easily, and store them for reuse. We also propose a pattern-interpreting controller. It is able to interpret patterns created by the editor and control the pad accordingly. It can avoid the need to change the controller firmware whenever desired patterns change.

  • PDF

A Modeling of Realtime Fuel Comsumption Prediction Using OBDII Data (OBDII 데이터 기반의 실시간 연료 소비량 예측 모델 연구)

  • Yang, Hee-Eun;Kim, Do-Hyun;Choe, Hoseop
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.2
    • /
    • pp.57-64
    • /
    • 2021
  • This study presents a method for realtime fuel consumption prediction using real data collected from OBDII. With the advent of the era of self-driving cars, electronic control units(ECU) are getting more complex, and various studies are being attempted to extract and analyze more accurate data from vehicles. But since ECU is getting more complex, it is getting harder to get the data from ECU. To solve this problem, the firmware was developed for acquiring accurate vehicle data in this study, which extracted 53,580 actual driving data sets from vehicles from January to February 2019. Using these data, the ensemble stacking technique was used to increase the accuracy of the realtime fuel consumption prediction model. In this study, Ridge, Lasso, XGBoost, and LightGBM were used as base models, and Ridge was used for meta model, and the predicted performance was MAE 0.011, RMSE 0.017.

Conceptual Design and Flight Testing of a Synchropter Drone (Synchropter 드론의 개념설계 및 비행시험)

  • Chung, Injae;Moon, Jung-ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.12
    • /
    • pp.997-1004
    • /
    • 2020
  • A synchropter is a type of rotorcraft in which a pair of blades inclined with each other rotates in synchronization. Removing the tail rotor enables an efficient and compact configuration similar to a coaxial-rotor helicopter. This paper describes the design and flight test results of a small synchropter to examine the suitability of a drone system for the army. The synchropter in this paper is a small vehicle with a rotor diameter of 1.4m and a weight of 7kg and was assembled based on commercial parts to examine flight characteristics effectively. The flight control system adopted Pixhawk, which is designed based on an open-architecture. The model-based design technique is applied to develop the control law of the synchropter and a new firmware embedded on the Pixhawk. Through qualitative flight tests, we analyzed the flight characteristics. As a result of the analysis, we confirmed the possibility of application as a drone system of the synchropter.

Bluetooth Audio Gateway and Headset including Connection Function to the Mobile Phone (휴대폰 접속 기능을 포함한 블루투스 오디오 게이트웨이 및 헤드셋)

  • Chung, J.S.;Chung, T.Y.;Jung, K.W.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.539-544
    • /
    • 2004
  • This paper presents the implementation of the bluetooth headset and the audio gateway connected to the mobile Phone in the embedded environment. The bluetooth module includes the BC02 processor chip, the BCSP02 firmware and the bluelab software Including bluetooth protocol stack. The above components in the bluetooth module developed at CSR company are used as the development environment. The application program using API functions supported by bluelab is coded by C language and loaded on the flash ROM of the bluetooth module. The cail processing capacity measuring the call setup time and the clearing time between the audio gateway and the headset is considered as the performance parameter of the developed systems. As a call setup and clearing time between the audio gateway and the headset is about 88.8ms, the call processing capacity is about 11 calls per second. Therefore the performance result is satisfied in the aspect of the call processing time.

Secure Boot + Measured Boot: Guaranteeing the Integrity of the Linux Booting Process (보안부팅+측정부팅: 리눅스 부팅 과정의 무결성 보장)

  • Lee, Yunjae;Yoo, Seehwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.504-509
    • /
    • 2017
  • Preserving the integrity of the booting process is important. Recent rootkit attacks and subverting OS attacks prove that any post-OS security mechanism can be easily circumvented if the booting process is not properly controlled. Using an actual case as an example, the hacker of the Se-jong government office simply bypassed the user's password authentication by compromising the normal booting process. This paper analyzes existing pre-OS protection using secure boot and measured boot, and proposes another bootloader that overcomes the limitations. The proposed bootloader not only guarantees the integrity of all the pre-OS binaries, bootloaders, and kernel, it also makes explicit records of integrity in the booting process to the external TPM device, so that we can track modifications of BIOS configurations or unintended booting process modifications.

Implementation of a very small 13.56[MHz] RFID Reader ensuring machine ID recognition in a noise space within 3Cm (3Cm 이내의 잡음 공간 속 기계 ID 인식을 보장하는 초소형 13.56[MHz] RFID Reader의 구현)

  • Park, Seung-Chang;Kim, Dae-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.10 s.352
    • /
    • pp.27-34
    • /
    • 2006
  • This paper has implemented a very small($1.4{\times}2.8[Cm^2]$) 13.56[MHz] RFID reader ensuring machine ID recognition correctly in a noise space of Tag-to-Reader within 3Cm. For operation of the RFID system, at first, this paper has designed the loop antenna of a reader and the fading model of back-scattering on microwave propagation following to 13.56[MHz] RFID Air Interface ISO/IEC specification. Secondly, this paper has proposed the automatically path selected RF switching circuit and the firmware operation relationship by measuring and analyzing the very small RFID RF issues. Finally, as a very small reader main body, this paper has shown the DSP board and software functions made for extraction of $1{\sim}2$ machine ID information and error prevention simultaneously with carrying of 13.56[MHz] RFID signals that the international standard specification ISO/IEC 18000-3 defined.

A Study about Implementation Method of Multi-Interface Multi-Channel 2.4GHz Active RFID Reader Protocol (다중인터페이스 다중채널 2.4GHz 능동형 RFID 리더 프로토콜 구현방법에 관한 연구)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-Doek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1005-1014
    • /
    • 2010
  • When reader collect tags, we found that they tend to get together to specific interface in Multi-Interface Multi-Channel 2.4GHz Active RFID system. To solve this problem, we designed the LP-Combind and AP-Balanced protocol for load distribution between interfaces, then verified its superiority of the performance through the simulation. There are three problems to implement designed protocols in hardware of firmware-level. first, tag selects randomly the channel of reader and reader need the method which can change the channel of tags. second, reader has the synchronization problem between reader and tag. third, reader has problem that MCU of reader have to operate simultaneously dual interface. To slove this problems, we designed the message and implemented method for tag channel change and the protocol in order to adjust synchronization between reader and tag, Therefore, we compared and analyzed the performance of protocols by experiment. If LP windows size is same, the performance of LP-Combined protocol and AP-Balanced protocol which lower collision probability by its load distribution is more outstanding than single interface protocol performance.

Design and Implementation of Secure UART based on Digital Signature and Encryption (디지털 서명과 암호화 기반 보안 UART의 설계와 구현)

  • Kim, Ju Hyeon;Joo, Young Jin;Hur, Ara;Cho, Min Kyoung;Ryu, Yeon Seung;Lee, Gyu Ho;Jang, Woo Hyun;Yu, Jae Gwan
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.29-35
    • /
    • 2021
  • UART (Universal asynchronous receiver/transmitter) is a hardware device that converts data into serial format and transmits it, and is widely used for system diagnosis and debugging in most embedded systems. Hackers can access system memory or firmware by using the functions of UART, and can take over the system by acquiring administrator rights of the system. In this paper, we studied secure UART to protect against hacker attacks through UART. In the proposed scheme, only authorized users using the promised UART communication protocol are allowed to access UART and unauthorized access is not allowed. In addition, data is encrypted and transmitted to prevent protocol analysis through sniffing. The proposed UART technique was implemented in an embedded Linux system and performance evaluation was performed.