• Title/Summary/Keyword: Wireless communication convergence

Search Result 705, Processing Time 0.026 seconds

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

A Fast Anti-jamming Decision Method Based on the Rule-Reduced Genetic Algorithm

  • Hui, Jin;Xiaoqin, Song;Miao, Wang;Yingtao, Niu;Ke, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4549-4567
    • /
    • 2016
  • To cope with the complex electromagnetic environment of wireless communication systems, anti-jamming decision methods are necessary to keep the reliability of communication. Basing on the rule-reduced genetic algorithm (RRGA), an anti-jamming decision method is proposed in this paper to adapt to the fast channel variations. Firstly, the reduced decision rules are obtained according to the rough set (RS) theory. Secondly, the randomly generated initial population of the genetic algorithm (GA) is screened and the individuals are preserved in accordance with the reduced decision rules. Finally, the initial population after screening is utilized in the genetic algorithm to optimize the communication parameters. In order to remove the dependency on the weights, this paper deploys an anti-jamming decision objective function, which aims at maximizing the normalized transmission rate under the constraints of minimizing the normalized transmitting power with the pre-defined bit error rate (BER). Simulations are carried out to verify the performance of both the traditional genetic algorithm and the adaptive genetic algorithm. Simulation results show that the convergence rates of the two algorithms increase significantly thanks to the initial population determined by the reduced-rules, without losing the accuracy of the decision-making. Meanwhile, the weight-independent objective function makes the algorithm more practical than the traditional methods.

A Study on Slow Driving of Metropolitan Train for Disorder Condition of Platform Safety Gate using LTE-R and Beacon (LTE-R과 비콘을 활용한 승강장안전문 장애발생 시 열차 서행운전에 관한 연구)

  • Joh, Eungyoung;Noh, Jowon;Kim, Jin-Tea;Lee, Sunghwa
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.31-36
    • /
    • 2020
  • The LTE-R system is a system consisting of a packet network that provides all IP-based services. Continuous failures related to the platform safety gate and subsequent safety accidents related to passengers and safety gate workers continue. The secondary damage caused by the failure of the platform safety door and the related human life damage have emerged as a major social issue.. By linking the beacon system to the Long Term Evoluton-Railway (LTE-R) network, an LTE-based railway wireless network currently in operation or being installed, it precisely locates trains and provides standardized fault alerts to train crews. When entering into the station, ultimately we will decelerate the train and reduce the accidents of metropolitabn railroad traffic by securing safe driving.

Electronic Stethoscope using PVDF Sensor for Wireless Transmission of Heart and Lung Sounds (PVDF를 이용한 청진 센서 및 심폐음 무선 전송이 가능한 전자 청진기)

  • Im, Jae Joong;Lim, Young Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.57-63
    • /
    • 2012
  • Effective use of stethoscope is very important for primary clinical diagnosis for the increasing cardiovascular and respiratory disease. This study developed the contact vibration sensor using piezopolymer film which minimizes the ambient noise, and signal processing algorithm was applied for providing better auscultation sounds compare to the existing electronic stethoscopes. Especially, low frequency heart sounds were acquired without distortion, and the quality of lung sounds were improved. Also, auscultating sounds could be transmitted using bluetooth, which made possible to be used for the u-healthcare environment. Results of this study, auscultation of heart and lung sounds, could be applied to the convergence industry of medical and information communication technology through remote diagnosis.

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

A Study of Efficient Viterbi Equalizer in FTN Channel (FTN 채널에서의 효율적인 비터비 등화기 연구)

  • Kim, Tae-Hun;Lee, In-Ki;Jung, Ji-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1323-1329
    • /
    • 2014
  • In this paper, we analyzed efficient decoding scheme with FTN (Faster than Nyquist) method that is transmission method faster than Nyquist theory and increase the throughput. we proposed viterbi equalizer model to minimize ISI (Inter-Symbol Interference) when FTN signal is transmitted. the proposed model utilized interference as branch information. In this paper, to decode FTN singal, we used turbo equalization algorithms that iteratively exchange probabilistic information between soft Viterbi equalizer (BCJR method) and LDPC decoder. By changing the trellis diagram in order to maximize Euclidean distance, we confirmed that performance was improved compared to conventional methods as increasing throughput of FTN signal.

Performance Analysis of Policy-based QoS Algorithm in the IMS (IMS에서 정책기반 QoS 알고리즘의 성능 분석)

  • Han, Seok-Jun;Shon, Hyung-Doh;Kang, Seung-Chan
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.133-141
    • /
    • 2015
  • The IMS is an architectural control framework for delivering IP multimedia services such as voice, video, audio and data, the IMS supports not only the mobile communication system but also the existing wired and wireless network based on IP. The network that is integrated by the IMS needs policy-based network management protocol for managing the limited network resources to provide efficient multimedia service. The IMS use additional device called PDF for efficient resource management, but the PDF only uses diameter which is one of the network management protocol such as SNMP and COPS. Many devices use various protocol to manage the limited network resources. There is an algorithm using a variety of protocols such as Diameter, COPS and SNMP to handle the resources management efficiently. We also analyze the performance using the proposed algorithm in the implemented IMS environment.

Recent standardization Efforts for Mobile WiMAX VoIP Services (모바일 와이맥스망의 인터넷 전화 서비스 최근 표준 동향)

  • Kim, Ji-Hun;Lee, Kye-Sang;Jung, Ok-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.153-155
    • /
    • 2010
  • Internet phone (VoIP) services in Korea have achieved noticeable growth year after year since the service launching, and the growth still coninues. The market of mobile internet phone also expands sharply. Therefore, it is crucial to deploy networks which can support mobile internet phone services with excellent quality. For mobile internet phone services, it will be necessary to build and use networks with good mobility and high transmission rate. Current wireless networks for Internet services include 3G, Wi-Fi, and mobile WiMAX networks. 3G provides good mobility but lower transmission rate, whereas Wi-Fi exhibits excellent transmission rate but less mobility. Mobile WiMAX networks taking the merits of both, high mobility and transmission rate, are being deployed widely in recent years. This article examines the recent standardization efforts of WiMAX Forum for VoIP service in WiMAX networks.

  • PDF

Design and Implementation of Cattle Estrus Detection System based on Wireless Communication and Internet of Things (무선 통신과 사물인터넷 기반의 소 발정 관찰 시스템 설계 및 구현)

  • Lee, Ha-Woon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1309-1316
    • /
    • 2018
  • Cattle estrus detection system based on Internet of Things is designed and implemented by using Arduino pro-mini, gyroscope, acceleration sensor, bluetooth master and slave module. The implemented system measures cattle's moving and the measured data are transmitted to the computer connected to RX module by bluetooth TX module. They are plotted in 2-dimensional graph on the computer monitor and the number of transition at each sensor axis are calculated from the graph. The detected and gathered data from the system are analyzed by the proposed algorithm to decide which cows are in the estrus or not. The method to apply bluetooth scatternet is shown and the proposed system can be used to increase the success rate of artificial insemination in normal estrus by detecting the cow's behaviors such as the number of jumping. In this paper, the implemented cattle behavior detecting the system(TX module) are strapped on cattle's leg and it measures the cattle behaviors for determining where that a cattle is estrus or not by the proposed algorithm.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.