• Title/Summary/Keyword: 허위통신

Search Result 47, Processing Time 0.026 seconds

True Position Determination Algorithm using Azimuth (방위를 이용한 진위 결정 알고리즘)

  • Youn, Jin-Young;Jeong, Seon-Jae;Yim, Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.4
    • /
    • pp.691-699
    • /
    • 2018
  • Astronomical positioning has been carried out from the past by using Sextant. The St. Hilaire method was mainly used by Nautical Almanac and Sight Reduction Tables For Marine Navigation. In modern times, it has been able to use the LOP(Line of Position) method smoothly by combining with IT technology. However, in comparison with the past method, the LOP method always shows two positions, True Position and False Position, which must be distinguished by the navigator. Therefore, in this paper, we proposed a method of using the azimuth to remove the false position generated by the LOP method. In particular, the theoretical considerations using azimuth are presented in various ways, and the validity of the theoretical considerations is confirmed. Simulations are presented to confirm that the theoretical basis of the thesis is valid.

Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments (CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안)

  • Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.5
    • /
    • pp.304-308
    • /
    • 2014
  • As users generate lots of contents anytime and anywhere with an explosive growth of the number of mobile devices, Content centric networking (CCN) has emerged as a new networking architecture. However, the efficient CCN routing scheme is required for ad hoc network support because of its one to one message exchange characteristics. So, this paper proposes the new CCN ad hoc routing scheme using on-demand approach, which includes the secure routing configuration scheme based on multiple hash operation. It is shown from the simulation that the proposed method can provide lower control overhead because of its two-fold routing configuration architecture.

An Analysis of Security Vulnerabilities Using 5G NAS COUNT (5G NAS COUNT 취약점을 이용한 보안 위협 분석)

  • Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.565-573
    • /
    • 2022
  • Current mobile communication system is in the mid-process of conversion from 4G LTE to 5G network. According to the generalization of mobile communication services, personal information such as user's identifiers and location information is transmitted through a mobile communication network. The importance of security technology is growing according to the characteristics of wireless mobile communication networks, the use of wireless shared channels is inevitable, and security technology cannot be applied to all network system elements in order to satisfy the bandwidth and speed requirements. In particular, for security threat analysis, researches are being conducted on various attack types and vulnerability analysis through rogue base stations or attacker UE to make user services impossible in the case of 5G networks. In this paper, we established a 5G network testbed using open sources. And we analyzed three security vulnerabilities related to NAS COUNT and confirmed the validity of two vulnerabilities based on the testbed or analyzing the 3GPP standard.

Stduy on Tracking Station of 112 Wired and Wireless, Letters Complainant's Location (112 유선·무선·문자 신고자의 위치 역추적 연구)

  • Moon, Soon-ho;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.244-247
    • /
    • 2015
  • People who live in the Republic of Korea the world's leading information technology, all use a smartphone. When all the people calling 112 to report an emergency many use smartphone. Accordingly, this paper is not to be put on the emergency police report arguing for a second location backtrack through the 112 complainant to report a smartphone and not wasted also Identifying a false declaration to become beneficial to all citizens.

  • PDF

A Study on the Radar Jamming Signal Simulator Design for the Test & Evaluation (시험평가용 레이다 재밍신호 시뮬레이터 설계 연구)

  • 최성린;이상훈;정회인
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.2B
    • /
    • pp.160-169
    • /
    • 2002
  • While radar operator recognizes and tracks threat targets through the scope, it is essential to overcome the jamming signal that disturbs the normal operation of the radar. Therefore, to train operator and test the EW capability of the radar, this paper proposed the jamming signal simulation algorithm and design results to generate the deception jamming(range, velocity, angle deception and multiple false targets) and noise jamming signals(spot, barrage, swept spot and cover pulse noise). And also, the radar jamming signal simulator composed of the 6 constituents is developed on basis of the proposed algorithm and digital circuit design technique and confirmed the validity of the developed simulator by means of the test results to generate the various jamming signal.

System Implementation for Automatic Inspection of Wind Pressure Sensor Based on Reliability Improvement (신뢰성 향상 기반의 풍압센서 자동검사 시스템구현)

  • Do, Nam Soo;Ryu, Conan K.R.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.775-778
    • /
    • 2017
  • This research describes system implementation for automatic inspection on wind pressure sensor production based on reliability improvement. The reliability is minimized by the automatic inspection system on the wind pressure sensor against the manual system. The system consists of the control system and monitoring system to be scanning the inspection processing. The inspection system for reliability is evaluated in Gage Repeatability and Reproducibility. The experimental results are improved about 2 times speed, measured error ${\pm}0.02V$, effectiveness 15%, missing probability 17% and false alarm 12% respectively. The system will be also improved by database and the product barcodes for the total quality control system based on the effective reliability in the future.

  • PDF

Signal-Space Jamming Scheme for Disturbing Target Localization of Bistatic MIMO Radar System (바이스태틱 MIMO 레이다 시스템의 위치탐지 무력화를 위한 신호공간 재밍 기법)

  • Yeo, Kwanggoo;Chung, Wonzoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.11
    • /
    • pp.878-883
    • /
    • 2018
  • A jamming design scheme to disturb target position estimation of a bistatic multiple-input multiple-output(MIMO) radar system is presented. The proposed method exploits the received signals from distributed multiple electronic sensors and combines them to produce a jamming signal. The proposed algorithm can eliminate the target by transmitting the delayed sum or the weighted sum of the received senor signals. Simulation results confirm the performance of the proposed method.

Analysis on GNSS Spoofing signal effects using SDR receiver (SDR 수신기를 이용한 위성항법 기만신호 효과도 분석)

  • Cho, Ji-haeng
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.97-102
    • /
    • 2019
  • The GNSS(Global Navigation Satellite System) provides important information such as Position and Navigation, Timing(PNT) to various weapon systems in the military. as a result, applications that employ satellite navigation systems are increasing. therefore, a number of studies have been conducted to deceive the weapon systems that employ GNSS. GNSS spoofing denotes the transmission of counterfeit GNSS-like signals with the intention to produce a false position and time within the victim receiver. In order to deceive the victim receiver, spoofing signal should be synchronized with GNSS signal in doppler frequency and code phase, etc. In this paper, Civilian GPS L1 C/A spoofing signals have been evaluated and analyzed by SDR receiver.

A Study on Minimize Method of EPIRB's Error Operation by Improve the Seawater Sensing (해수센싱 방법의 개선에 의한 EPIRB오동작의 최소화방안 연구)

  • Lee, Young-Soo;Choi, Jo-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.1978-1982
    • /
    • 2006
  • The EPIRB overcame the limitations of the conventional marine communication systems, the false distress calls by EPIRB systems internationally account for about 94 percent of the total calls because of the different usages of EPIRB systems with manufacturers, users' errors, and systems' faults. To resolve these problems, international bodies and manufacturers are developing many measures to reduce those error emissions. In conventional systems, the distress call was sent immediately after the EPIRB is removed from the automatic release system. Taking into account the properties of the system, however manufacturers improved the operation so that the distress call is sent only when the EPIRB is released and then immersed into water. In spite of these efforts, the error emissions have not significantly reduced. In this study, the domestic and international technical regulations and standards for the COSPAS-SARSAT and satellite EPIRB systems were reviewed, and a bridge-type water detection sensor was developed to minimize the error emission from EPIRB.

Automatic Access Management System Using Beacon (비콘을 활용한 자동화 출입관리 시스템)

  • Kim, Ho-Yoon;Kim, Hyo-Jong;Shin, Seung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.105-107
    • /
    • 2021
  • With the prolonged COVID-19 worldwide, it is essential to create a list of visitors when using various facilities to prevent the spread of COVID-19 and to investigate epidemiology in the event of confirmed cases. In the beginning, there were many problems due to the leakage of personal information and false preparation by making a list of visitors with a handwritten list. To compensate for the problems of handwritten lists, the KI-Pass system based on QR codes is mainly managed. However, KI-Pass systems have the disadvantages of issuing QR codes and abusing personal information. In this paper, we propose an access management system using beacon. Beacon is an close-range wireless communication device and visitors when they are near the facility and automatically registers their personal information on the cloud server for access management. It is expected that this will be effective in preventing and responding to the spread of new infectious diseases in the future.

  • PDF