• Title/Summary/Keyword: Paper like electronic paper

Search Result 655, Processing Time 0.031 seconds

Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication (IPsec VPN 위성통신에서 인증알고리즘이 미치는 영향 분석)

  • Jeong, Won Ho;Hwang, Lan-Mi;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.147-154
    • /
    • 2015
  • Satellite broadcasting networks, like if you have if you have just received information that everyone must bring the required security attributes this earth should be done as encryption. In this paper, a satellite communication network AH additional security header in transport mode IPsec VPN by applying the SHA-256 and MD-5 authentication algorithm to authenticate the data portion Error rate and analyze the BER and Throughput. First, to generate a normal IP packet added to IPsec transport mode security header AH were constructed internal authentication data by applying the SHA-256 and MD-5 algorithm. Channel coder was applied to the Rate Compatible Punctured Turbo Codes, packet retransmission scheme Hybrid-ARQ Type-II and Type-III were used. Modulation method was applied to the BPSK, the wireless channel Markov channel (Rician 80%, Rayleigh 20% and Rician 90%, Rayleigh 10%) as an authentication algorithm according to the satellite channel state analyzed how they affect the error rate and Throughput.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

VLSI Design of a 2048 Point FFT/IFFT by Sequential Data Processing for Digital Audio Broadcasting System (순차적 데이터 처리방식을 이용한 디지틀 오디오 방송용 2048 Point FFT/IFFT의 VLSI 설계)

  • Choe, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.5
    • /
    • pp.65-73
    • /
    • 2002
  • In this paper, we propose and verify an implementation method for a single-chip 2048 complex point FFT/IFFT in terms of sequential data processing. For the sequential processing of 2048 complex data, buffers to store the input data are necessary. Therefore, DRAM-like pipelined commutator architecture is used as a buffer. The proposed structure brings about the 60% chip size reduction compared with conventional approach by using this design method. The 16-point FFT is a basic building block of the entire FFT chip, and the 2048-point FFT consists of the cascaded blocks with five stages of radix-4 and one stage of radix-2. Since each stage requires rounding of the resulting bits while maintaining the proper S/N ratio, the convergent block floating point (CBFP) algorithm is used for the effective internal bit rounding and their method contributed to a single chip design of digital audio broadcasting system.

Implementation of High Quality Indexed Image utilizing Common Color Map(Codebook) (공용 컬러맵(코드북)을 이용한 고화질 인덱스 영상의 구현)

  • Choi, YongSoo;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.12
    • /
    • pp.91-97
    • /
    • 2013
  • Image and it's processing techniques are widely applied and very important in the recent IT environment. In this paper, we try to reconstruct original BMP(Bitmap) image into indexed image and codebook utilizing vector quantization and represent high quality image only with same pixel depth of previous indexed image like JPEG etc. That is, By adopting common map method onto index image with $2^n$ color codebook, image can be represented as high quality as $2^{n+1}$ color codebook. When proposed output image is compared with original BMP image, it provides as much around 2dB as higher PSNR than conventional 8 bit index image(normal JPEG). Furthermore, this improvement(2 dB higher PSNR) could be provided when using the 9 bit indexed image.

Social Physical Super Connecting Layer of 4th Industrial Revolution for Jeju Goendam-Goendang (제주 괸담-괸당에 대한 4차산업혁명의 사회·물리적 초연결층)

  • Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.71-85
    • /
    • 2017
  • The $4^{th}$ industrial revolution is a super connection society. It connects all things between things and things, PC and mobile phone, human and human and human and things. In Jeju island, 'Batdam' and 'Sandam' are conneted like 'black dragon ten thousand Li', and stone walls are connected to each other as the stone network, which is called as the 'Goendam' (and conventionally is told as the 'Goendang') and is related to the Family network. Also, IoT(Internet of Things) makes the connection between the stone network and people. The Jeju's fourth industrial revolution is a its testbed. 'Goendang' connection in 4G industrial revolution is shown to be important Node and Link in socially and mathematically. In this paper, we review the historical background of the Goendang and find combinations of stones on the various types of stone field using the algebraic geometry.

OWC based Smart TV Remote Controller Design Using Flashlight

  • Mariappan, Vinayagam;Lee, Minwoo;Choi, Byunghoon;Kim, Jooseok;Lee, Jisung;Choi, Seongjhin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.71-76
    • /
    • 2018
  • The technology convergence of television, communication, and computing devices enables the rich social and entertaining experience through Smart TV in personal living space. The powerful smart TV computing platform allows to provide various user interaction interfaces like IR remote control, web based control, body gesture based control, etc. The presently used smart TV interaction user control methods are not efficient and user-friendly to access different type of media content and services and strongly required advanced way to control and access to the smart TV with easy user interface. This paper propose the optical wireless communication (OWC) based remote controller design for Smart TV using smart device Flashlights. In this approach, the user smart device act as a remote controller with touch based interactive smart device application and transfer the user control interface data to smart TV trough Flashlight using visible light communication method. The smart TV built-in camera follows the optical camera communication (OCC) principle to decode data and control smart TV user access functions according. This proposed method is not harmful as radio frequency (RF) radiation does it on human health and very simple to use as well user does need to any gesture moves to control the smart TV.

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

Improvement of Solder Joint Strength in SAC 305 Solder Ball to ENIG Substrate Using LF Hydrogen Radical Treatment (SAC 305솔더와 ENIG 기판의 접합강도에 미치는 저주파 수소라디칼처리의 영향)

  • Lee, Ah-Reum;Jo, Seung-Jae;Park, Jai-Hyun;Kang, Chung-Yun
    • Journal of Welding and Joining
    • /
    • v.29 no.1
    • /
    • pp.99-106
    • /
    • 2011
  • Joint strength between a solder ball and a pad on a substrate is one of the major factors which have effects on electronic device reliability. The effort to improve solder joint strength via surface cleaning, heat treatment and solder composition change have been in progress. This paper will discuss the method of solder ball joint strength improvement using LF hydrogen radical cleaning treatment and focus on the effects of surface treatment condition on the solder ball shear strength and interfacial reactions. In the joint without radical cleaning, voids were observed at the interface. However, the specimens cleaned by hydrogen-radical didn't have voids at the interface regardless of cleaning time. The shear strength between the solder ball and the pad was increased over 120%(about 800gf) when compared to that without the radical treatment (680gf) under the same reflow condition. Especially, at the specimen treated for 5minutes, ball shear strength was considerably increased over 150%(1150gf). Through the observation of fracture surface and cross-section microstructure, the increase of joint strength resulted from the change of fracture mode, that is, from the solder ball fracture to IMC/Ni(P) interfacial fracture. The other cases like radical treated specimen for 1, 3, 7, 9min. showed IMC/solder interfacial fracture rather than fracture in the solder ball.

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

Bandwidth Requirement Estimation Method for Future Wireless Railway Communication Systems (차세대 철도통합무선망을 위한 주파수 소요량 계산방법)

  • Jeong, Minwoo;Yoon, Hyungoo;Park, Duk-Kyu;Kim, Kyung-Hee;Lee, Sukjin
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.6
    • /
    • pp.540-550
    • /
    • 2013
  • The Future Wireless Railway Communication System(FWRCS) has attracted attention for the various advantages of such a system like efficient management, precise periodicity of operation and speedy travel. Related to it, the area of bandwidth requirement estimation for the FWRCS is being researched actively because there is a great need for accurate bandwidth distribution. In this paper, sophisticated bandwidth requirement estimation method for FWRCS is proposed by modifying ITU-R M.1390. With this method, the expected frequency requirements for the present, for five years from now, and for 10 years from now can be calculated by applying the data gathered from the actual field.