• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.034 seconds

Design and implementation of blockchain-based anti-theft protocol in Lora environment (Lora 환경에서 블록체인 기반 도난방지 프로토콜 설계 및 구현)

  • Park, Jung-oh
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • With the development of communication infrastructure, the number of network equipment owned by one person is gradually increasing. General-purpose devices such as smartphones can implement theft/loss prevention function by implementing S/W. However, other small devices lack practicality such as long-distance communication problems due to standard communication technology specifications or H/W limitations, and lack of functions(authentication and security). This study combines the Lora communication protocol in the LPWA standard environment and the blockchain technology. Anti-theft and security functions were added to the protocol, and the PBFT consensus algorithm was applied to build a blockchain network. As a result of the test, the effectiveness of safety(authentication and trust network) and performance(blockchain processing performance) were confirmed. This study aims to contribute to the future development of portable or small device anti-theft products as a 4th industrial convergence research.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

A Design of Current-Mode Analog FIR Filter for Wireless Home Network (주파수가변형 무선PAN단말을 위한 전류모드 아날로그 FIR 필터의 설계)

  • Kim, Seong-Kweon;Kim, Kwang-Ho;Cho, Ju-Phil;Cha, Jae-Sang
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.10
    • /
    • pp.35-40
    • /
    • 2006
  • In this paper, a current-mode analog variable finite-impulse-response (FIR) filter with variable tap coefficient circuits is proposed for frequency selective wireless personal area network(WPAN) system or terminals. From the circuit simulation the operation of the 7-tap FIR filter is confirmed. The 0.0625-step tap coefficient circuit is designed and fabricated with $0.8[{\mu}m]$ CMOS technology. The proposed FIR filter has a variable length of taps and variable coefficients, so it has a potential for being used to frequency selective WPAN system or frequency selective wireless communication terminals.

Research on Countermeasures of Controller Area Network Vulnerability (Controller Area Network 취약점 분석 및 대응 방안 연구)

  • Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.115-120
    • /
    • 2018
  • As the number ofconnected cars grows, the security of the connected cars is becoming more important. There are also increasing warnings about the threat of attacks via the CAN bus used for in-vehicle networks. An attack can attack through a vulnerability in the CAN bus because the attacker can access the CAN bus remotely, or directly to the vehicle, without a security certificate on the vehicle, and send a malicious error message to the devices connected to the CAN bus. A large number of error messages put the devices into a 'Bus-Off' state, causing the device to stop functioning. There is a way to detect the error frame, or to manage the power of the devices related to the bus, but eventually the new standard for the CAN bus will be the fundamental solution to the problem. If new standards are adopted in the future, they will need to be studied.

A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area (특정 IP 영역 제한정책 설정에 따른 보안 취약점 공격에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.625-630
    • /
    • 2010
  • With regard to the examples of establishing various sorts of information security, it can be seen that there are gradual, developmental procedures including Firewall and VPN (Virtual Private Network), IDS (Intrusion Detection System), or ESM(Enterprise Security Management). Each of the security solutions and equipments analyzes both defense and attack for information security with the criteria of classifying the problems of security policies by TCP/IP layers or resulted from attack patterns, attack types, or invasion through specialized security technology. The direction of this study is to examine latency time vulnerable to invasion which occurs when L2-stratum or lower grade equipments or policies are applied to the existing network through TCP/IP layer's L3-stratum or higher grade security policies or equipments and analyze security holes which may generate due to the IP preoccupation in the process of establishing policies to limit particular IP area regarding the policies for security equipments to figure out technological problems lying in it.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

R3: A Lightweight Reactive Ring based Routing Protocol for Wireless Sensor Networks with Mobile Sinks

  • Yu, Sheng;Zhang, Baoxian;Yao, Zheng;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5442-5463
    • /
    • 2016
  • Designing efficient routing protocols for a wireless sensor network with mobile sinks (mWSN) is a challenging task since the network topology and data paths change frequently as sink nodes move. In this paper, we design a novel lightweight reactive ring based routing protocol called R3, which removes the need of proactively maintaining data paths to mobile sinks as they move in the network. To achieve high packet delivery ratio and low transmission cost, R3 combines ring based forwarding and trail based forwarding together. To support efficient ring based forwarding, we build a ring based structure for a network in a way such that each node in the network can easily obtain its ring ID and virtual angle information. For this purpose, we artificially create a virtual hole in the central area of the network and accordingly find a shortest cycled path enclosing the hole, which serves as base ring and is used for generating the remaining ring based structure. We accordingly present the detailed design description for R3, which only requires each node to keep very limited routing information. We derive the communication overhead by ring based forwarding. Extensive simulation results show that R3 can achieve high routing performance as compared with existing work.

Evaluation of the Implementation of ISO 11783 for 250 kbps Transmission Rate of Tractor Electronic Control Unit

  • Lee, Dong-Hoon;Lee, Kyou-Seung;Moon, Jae-Min;Park, Seung-Je;Kim, Cheol-Soo;Kim, Myeong-Ho;Cho, Yong-Jin;Kim, Seong-Min
    • Journal of Biosystems Engineering
    • /
    • v.37 no.4
    • /
    • pp.225-232
    • /
    • 2012
  • Purpose: Accurate monitoring of information from various agricultural vehicles is one of the most important factors for appropriate management strategy of field operations. While there has been a number of study and design on applications of sensors and actuators for data acquisition and control system in tractor, incompatibility between various customized hardware and software has become a major obstacle to the universal deployment in real field operation. International standard for implementation of electronic control unit (ECU) in agricultural vehicles has becoming a mandatory requirement for inter-operation compatibility in the international trade of agricultural vehicle industries. The ISO 11783 standard is basically based upon well known communication technology designated using the controller area network (CAN) bus. While CAN bus could provide 1.0 Mbps of communication speed, the standard only recommended 250 kbps. Methods: This study presents the implementation and evaluation of ISO 11783 for tractor electronic control units (TECU)with a higher transmission rate from multiple ECU than 250 kbps. Throughput and loss rate of the developed prototype were calculated across manipulated bus load for laboratory experimental tests, and the maximum requirement of transmission rate by ISO 11873 was satisfied with lower than 60% of bus load. Results: Field tests with a TECU implemented to process messages from global positioning system (GPS) receiver resulted that the root mean square error of position information was lower than 4 m with 0.5 m/s as a travelling speed. Conclusions: Results of this study represent the utilization of the international standard ISO 11783 to providepractical developments in terms with the inter-operability of TECU.

Implementation and Measurement of Spectrum Sensing for Cognitive Radio Networks Based on LoRa and GNU Radio

  • Tendeng, Rene;Lee, YoungDoo;Koo, Insoo
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.23-36
    • /
    • 2018
  • In wireless communication, efficient spectrum usage is an issue that has been an attractive research area for many technologies. Recently new technologies innovations allow compact radios to transmit with power efficient communication over very long distances. For example, Low-Power Wide Area Networks (LPWANs) are an attractive emerging platform to connect the Internet-of-Things (IoT). Especially, LoRa is one of LPWAN technologies and considered as an infrastructure solution for IoT. End-devices use LoRa protocol across a single wireless hop to communicate to gateway(s) connected to the internet which acts as a bridge and relays message between these LoRa end-devices to a central network server. The use of the (ISM) spectrum sharing for such long-range networking motivates us to implement spectrum sensing testbed for cognitive radio network based on LoRa and GNU radio. In cognitive radio (CR), secondary users (SUs) are able to sense and use this information to opportunistically access the licensed spectrum band in absence of the primary users (PUs). In general, PUs have not been very receptive of the idea of opportunistic spectrum sharing. That is, CR will harmfully interfere with operations of PUs. Subsequently, there is a need for experimenting with different techniques in a real system. In this paper, we implemented spectrum sensing for cognitive radio networks based on LoRa and GNU Radio, and further analyzed corresponding performances of the implemented systems. The implementation is done using Microchip LoRa evolution kits, USRPs, and GNU radio.

Sensing Data Management System Using LoRa Based on Mobius Platform (모비우스 플랫폼 기반 LoRa 통신을 이용한 센싱 데이터 관리 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.9-16
    • /
    • 2019
  • In order to realize IoT(Internet of Things) service, it is necessary to manage sensing data and build a service with respect to its scalability. However, existing internet services use unique protocols and non-standardized functions for each service provider, and it is difficult to provide data management and service because they use short-range communication technology such as Bluetooth. In addition, plurality of APs and gateways must be taken into consideration in establishing a wide area network. In this paper, we propose a sensing data management system using LoRa(Long Range) communication based on Mobius platform. The end device that drives Tas is configured to collect sensing data, configure an application gateway that drives &Cube, and transmit sensing data to the server. In addition, a server that manages the Mobius is configured to handle the sensing data transmitted from the application gateway to provide a monitoring service. We establish a wide area network through LoRa communication between the end device and the gateway and provide data management and service corresponding to the internet through the Mobius platform.