• Title/Summary/Keyword: digital communication systems

Search Result 1,155, Processing Time 0.031 seconds

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

A Study on the Construction Plan of Smart Fish Farm Platform in the Future (미래 스마트 양식 플랫폼의 구축방안에 대한 연구)

  • Choi, Joowon;Lee, Jongsub;Kim, Youngae;Shin, Yongtae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.157-164
    • /
    • 2020
  • As the consumption of fishery products continues to increase, aquaculture industry has emerged instead of fishing industry facing limitations of fish stock resources. Recently, smart fish farming industry has rapidly developed through convergence with 4th Industrial Revolution technology. Accordingly, it is important to derive a future model of smart fish farming platforms in order to secure the superiority of the aquaculture industry and the technology standard hegemony. In this study, the future direction of smart fish farm platform was derived through the analysis of environment related to politics, economy, society, and technology related to smart fish farming by applying PEST methodology of macro-environment analysis. It is expected that it will help the public and industrial circles in planning and implementing related projects by including the entire process of value chain of aquaculture industry of breeding, production, management and distribution, and by presenting advanced models based on artificial intelligence and digital twin.

Empirical Study on the Prediction of Rain Attenuation in EHF(44 GHz) Band (EHF(44 GHz) 대역 강우 감쇠 특성 예측 연구)

  • Park Yong-Ho;Lee Joo-Hwan;Pack Jeong-Ki
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.8 s.99
    • /
    • pp.848-854
    • /
    • 2005
  • The attenuation due to rain has been recognized as one of the major causes of unavailability of radio communication systems operating above about 10 GHz. To design radio links for telecommunications and to evaluate attenuation due to rainfall, it is important to have a good prediction model for rain attenuation such as a model for drop-size distribution of rainfall(DSD), a theoretical model for specific rain attenuation, and an empirical model fur effective path length through rain. In this paper, the extended generalized gamma distribution for drop-size distribution, based on the measurements in Chnugnam National University, is proposed as a new DSD model, and predicted specific attenuation characteristics using proposed DSD model and rain attenuation values in the 44 GHz satellite path using ITU-R effective path length model, are analysed. The predicted attenuation levels are also compared. It is found that an accurate prediction method for DSD is very important to reduce the prediction error in the local satellite path.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

Full-text databases as a means for resource sharing (자원공유 수단으로서의 전문 데이터베이스)

  • 노진구
    • Journal of Korean Library and Information Science Society
    • /
    • v.24
    • /
    • pp.45-79
    • /
    • 1996
  • Rising publication costs and declining financial resources have resulted in renewed interest among librarians in resource sharing. Although the idea of sharing resources is not new, there is a sense of urgency not seen in the past. Driven by rising publication costs and static and often shrinking budgets, librarians are embracing resource sharing as an idea whose time may finally have come. Resource sharing in electronic environments is creating a shift in the concept of the library as a warehouse of print-based collection to the idea of the library as the point of access to need information. Much of the library's material will be delivered in electronic form, or printed. In this new paradigm libraries can not be expected to su n.0, pport research from their own collections. These changes, along with improved communications, computerization of administrative functions, fax and digital delivery of articles, advancement of data storage technologies, are improving the procedures and means for delivering needed information to library users. In short, for resource sharing to be truly effective and efficient, however, automation and data communication are essential. The possibility of using full-text online databases as a su n.0, pplement to interlibrary loan for document delivery is examined. At this point, this article presents possibility of using full-text online databases as a means to interlibrary loan for document delivery. The findings of the study can be summarized as follows : First, turn-around time and the cost of getting a hard copy of a journal article from online full-text databases was comparable to the other document delivery services. Second, the use of full-text online databases should be considered as a method for promoting interlibrary loan services, as it is more cost-effective and labour saving. Third, for full-text databases to work as a document delivery system the databases must contain as many periodicals as possible and be loaded on as many systems as possible. Forth, to contain many scholarly research journals on full-text databases, we need guidelines to cover electronic document delivery, electronic reserves. Fifth, to be a full full-text database, more advanced information technologies are really needed.

  • PDF

Study on 2 types of Liquid Lens control system used for the autofocus (자동초점에 사용되는 두 가지 Liquid Lens제어에 관한 연구)

  • Kim, Nam-Woo;Hur, Chang-Wu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1493-1498
    • /
    • 2015
  • The autofocus system is automatically to drive the focus. It is very important to computer vision system. In the case of a compact camera, the actuator technology is used for auto-focus in mass production. the position sensor is required, the circuit configuration and easy method is widely used in VCM, compared to the stability of the drive size and the noise is a big stepping motor type, size has a piezo system having a humidity problem and the small leaded vulnerability. In addition, there is a liquid lens system, the advantages of low power in a compact structure but also a structure with proven quality and reliability and features required pressure. In this paper, we implement two control systems that can control the actuator as a liquid range of VCM using a sharpness of the image acquired by the image sensor automatically initiates 5Mpixel class was the implementation verification of focusing.

Study for Android Smartphone's Gallery Thumbnail Forensic Analysis (안드로이드 스마트폰의 갤러리 썸네일(Thumbnail)에 대한 포렌식 분석 방법에 관한 연구)

  • Yun, Daeho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.31-42
    • /
    • 2017
  • Thumbnail, the small sized graphic file such as JPEG or GIF, serves to help the users to be recognized as a rapidly helps to make it easier recognize while browsing the large sized graphic file. Gallery application, which is installed in a later version of the 4.4.x(Kitkat) Android smartphone records the generated time of graphic file in thumbnail metadata. Thumbnail can be used to draw up the timeline of user action about user's action such as creation, modification, deletion with original graphic file analysis. Also, take advantage of the features thumbnails are stored sequentially in a single thumbcache file, even if the thumbcache is deleted, we can restore the thumbnails. This paper illustrates the feature of thumbnail created by Android OS basic gallery app and methods for utilization in digital forensics.

Process of Collection for a Removable Storage Device Image Using a Software (소프트웨어를 이용한 이동식 저장매체 이미지 수집 절차)

  • Baek, Hyun Woo;Jeon, Sang Jun;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.17-24
    • /
    • 2017
  • As the prevalence of removable device, critical intelligences are often stored in the removable device. For that reason, in seizure and search, the removable device became a important evidence of while it could be has a salient key for prove a crime. When we acquired a removable device for proof, we image it by a imaging device or software with a write protection. However, these are high-priced exclusive equipments and sometimes it could be out of order. In addition, we found that some secure USB and inbuilt vaccine USB are failed to connect to the imaging device. Therefore, in this paper, we provide a suitable digital evidence collection procedure for real.

Estimation of Channel Capacity for Data Traffic Transmission (데이터 트래픽 특성을 고려한 적정 채널 용량 산정)

  • Park, Hyun Min
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.589-595
    • /
    • 2017
  • We present an estimation model for optimal channel capacity required to data traffic transmission. The optimal channel capacity should be calculated in order to satisfy the permitted transmission delay of each wireless data services. Considering the discrete-time operation of digital communication systems and batch arrival of packet-switched traffic for various wireless services, $Geo^x$/G/1 non-preemptive priority queueing model is analyzed. Based on the heuristic interpretation of the mean waiting time, the mean waiting times of various data packets which have the service priority. Using the mean waiting times of service classes, we propose the procedure of determining the optimal channel capacity to satisfy the quality of service requirement of the mean delay of wireless services. We look forward to applying our results to improvement in wireless data services and economic operation of the network facilities.

A Study on the Hardware Complexity Reduction of Hilbert transformer by MAG algorithm (MAG 알고리즘에 의한 힐버트 변환기의 하드웨어 복잡도 감소에 관한 연구)

  • Kim, Young-Woong;Lee, Young-Seock
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.364-370
    • /
    • 2011
  • The Hilbert transform performs a role to transform band pass signals into low pass signals in wireless communication systems. The operation of Hilbert transform is based on a convolution process which is required adding and multiplying calculations. When the Hilbert transform is designed and hardware-implemented at gate level, the adding and multiplying operation requires a high power consumption and a occupation of wide area on a chip. So the results of adding and multiplying operation cause to degrade the performance of implemented system. In this paper, the new Hilbert transformer is proposed, which has a low hardware complexity by application of MAG(Minimum Adder Graph) algorithm. The proposed Hilbert transformer was simulated in ISE environment of Xilinx and showed the reduction of hardware complexity comparing with the number of gate in the conventional Hilbert transformer.