• Title/Summary/Keyword: 한국정보인증

Search Result 5,285, Processing Time 0.055 seconds

Design and Implementation of Interference-Immune Architecture for Digital Transponder of Military Satellite (군통신위성 디지털 중계기의 간섭 회피 처리 구조 설계 및 구현)

  • Sirl, Young-Wook;Yoo, Jae-Sun;Jeong, Gun-Jin;Lee, Dae-Il;Lim, Cheol-Min
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.7
    • /
    • pp.594-600
    • /
    • 2014
  • In modern warfare, securing communication channel by combatting opponents' electromagnetic attack is a crucial factor to win the war. Military satellite digital transponder is a communication payload of the next generation military satellite that maintains warfare networks operational in the presence of interfering signals by securely relaying signals between ground terminals. The transponder in this paper is classified as a partial processing transponder which performs cost effective secure relaying in satellite communication links. The control functions of transmission security achieve immunity to hostile interferences which may cause malicious effects on the link. In this paper, we present an efficient architecture for implementing the control mechanism. Two major ideas of pipelined processing in per-group control and software processing of blocked band information dramatically reduce the complexity of the hardware. A control code sequence showing its randomness with uniform distribution is exemplified and qualification test results are briefly presented.

A Design and Implementation of Traceability System of Black Pigs using RFID (RFID를 활용한 흑돼지 출하이력관리 시스템 설계 및 구현)

  • Lee, Sung-Chul;Kwon, Hoon;Kim, Hyu-Chan;Kwak, Ho-Young
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.32-40
    • /
    • 2008
  • After Freer trade, it is increasing to import crops, aquatic products, and livestock which are produce in a foreign land. But it is affect negatively to trust relationships and markets of Jeju's goods because of breaking it out that foreign productions exchange domestic. We need to traceability system. Therefore, this paper designed and implemented the traceability system of black pigs using RFID. To enhance more the Jeju's fresh image, this proposed system is designed to manage all process which are breeding, butchery, industrial processes, and traceability of black pigs, a local speciality, using RFID tags. also the user can provide the traceability system which is using webs anywhen and anywhere. The results is to provide farm's income rise and to make for steady supply and guarantee the quality of Jeju's goods with FCS, FCG, HACCP quotation.

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.

Design and Implementation of Wireless standby Power Control System for Energy Saving (에너지 절감을 위한 무선 대기전력 제어 시스템 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.19-27
    • /
    • 2013
  • This paper implements the standby power control system composed of a master device and slave devices. The standby power is managed by cutting power supply after controlling the relay of a slave device based on the authentication of master device's RFID card. RFID interface and wireless communication module are embedded in a master device, and one master device is linked with many slave devices in wireless. Each slave device executes the operation needed in power control independently. We implements the function of manual power on/off system in a slave device, and the function of user ID enrollment by switch manipulation in a master device. Also this system can communicate bidirectionally in wireless and runs on TinyOS. The result of experiment shows that the user authentication is executed in a master device and this authenticated information is transmitted to a slave device in wireless, and standby power is cutted by controlling the relay of a slave device. Installing this system in a building or an office, we can expect energy saving.

Design and Implementation of Engineering Qualification Model of S-Band Transmitter for STSAT-3 (과학기술위성 3호 S-대역 송신기 인증모델 설계 및 제작)

  • Oh, Seung-Han;Seo, Gyu-Jae;Oh, Dae-Soo;Lee, Jung-Soo;Oh, Chi-Wook
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.1
    • /
    • pp.80-86
    • /
    • 2010
  • This paper describes the development result of S-band Transmitter of STSAT-3 by satellite research center(SaTReC), KAIST. STSAT-3 has two kinds of communication channels, S- band for Telemetry & Command and X-band for mission payload. S-band Transmiiter(STX) consist of modulator, frequency synthesizer, power amp and DC/DC converter. The modulation scheme of STX is FSK(Frequency Shift Keying). The interface between spacecraft OBC and STX is RS-422. The STX is based on modular design. The RF output power of STX is 1.5W(31.7dBm) and BER of STX is under 1E-5. The Test of STX is completed successfully such as functional Test and environmental(vibration, thermal vacuum) Test.

Telemedicine Conference System for Realtime Transfer of Heart Sound (실시간 심음 전송을 위한 원격 의료상담시스템)

  • Lee, Byung-Mun;Cho, Won-Hee;Yoon, Young-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.158-165
    • /
    • 2009
  • Counselling between a patient and a doctor is crucial in telemedicine. In order for the doctor to examine the patient accurately, it needs an auscultation, at least. Currently, some video conference systems are implemented but it is hard to use them in the case of an cardiac disorder, because the patients suffering from cardiac disorder cannot be examined by a stethoscope over Internet. To solve this problem, the remote counselling service has to support real time transmission of the heart sound of the patient. In this paper, we present a remote counselling system with stethoscope. We also design and implement the system in order for health monitor to connect the patient with his attending physician for the environment of u-healthcare service. The proposed system supports a mobility for doctor and patient by exchanging IP addresses at an user authentication protocol. The system implemented by this paper can be used for cardiac patients in remote clinical setting in the future.

Design and Implementation of App Control System for Improving the Security of the Mobile Application (모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현)

  • Lee, Yu-Jun;Jang, Young-Hwan;Park, Seok-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.243-250
    • /
    • 2016
  • Recently, with the rise of the mobile device, from mobile devices the user who owns the security, speed up the implementation of the guarantee management environment as businesses and individual equipment for the effcient management of the existing system, but the introduction of the MDM MDM App management features administrators to register the App until you can't prvent the security threat. Therefore, this paper addresses these issues in order to improve the security of your application for the control system. The proposed system is a function of the MDM authentication technology to design analysis, and system architecture to help prevent information disclosure within the design and implementation of Mobile-based application control system. Implementation of the control system to assess the security of the international common criteria security evaluation complete the test scenarios on the basis of the test items. An average of 40% of the test results to verify the results of this enhanced security.

Critical Path Analysis for Codesign of Public Key Crypto-Systems (공개키 연산기의 효율적인 통합 설계를 위한 임계 경로 분석)

  • Lee Wan bok;Roh Chang hyun;Ryu Dae hyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.79-87
    • /
    • 2005
  • In e-commerce applications, a public key cryptosystem is an important and indispensible element for the basic security operations such as authentication, digital signaturing, and key distribution. In wired network environments, the public key infrastructure certificate, which is based on X.509 specification, has been widely used. On the other hand, it still remains difficult to use the certificate information in wireless network environments due to the inherent limitations of the hand-held devices such as low computational power and short battery life. In this paper, we facilitate a codesign approach by implementing a software public-key cryptosystem and classifying its internal computation overheads quantitatively using a software profiling technique. Moreover, we propose a method to analyze the profiled data and apply it to the problem of software/hardware partitioning in a codesign approach. As an illustrative example, we analyze the computational overheads of an EC-Elfagamal application and examine a critical computational path.

  • PDF

A Study of Service Middleware for Application Based on USN/RFID/GPS (USN/RFID/GPS 응용을 위한 서비스 미들웨어 연구)

  • Moon, Kyeung-Bo;Lee, Chang-Young;Kim, Do-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1284-1288
    • /
    • 2008
  • Recently, there is increasing the development requirement of middleware and interface for GPS(Global Positioning System), RFID(Radio Frequency IDentification), sensor networks. GPS supports a useful location based service. RFID supports products logistic and distribution services through the identification. A sensor network collects a context information, such as humidity, temperature and atmospheric pressure. This paper implements and verifies a integrated service middleware for supporting efficiently process of sensing data collected from RFID, GPS and sensor network. This middleware have the temporary store function, the redundancy exclusion function, certification function, the classification function and the database storage function. Additionary, this middleware connects with low-level adaptor using socket interface and supports the high-level application services using database connection. Therefore, user can develop easily various many ubiquitous application system using proposed middleware instead of each RFID middleware, GPS middleware and, middleware based on sensor network.

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF