• Title/Summary/Keyword: secure transmission

Search Result 429, Processing Time 0.032 seconds

A Low Power Wireless Communication-based Air Pollutants Measuring System (저전력 무선통신 기반 대기오염 측정시스템)

  • Kang, Jeong Gee;Lee, Bong Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.6
    • /
    • pp.87-95
    • /
    • 2021
  • Recently interest for air pollution is gradually increasing. However, according to the environmental assessment of air quality, the level of air pollution in the nation is quite serious, and air pollutants measuring facilities are also not enough. In this paper, a secure air pollutants sensor system based low power wireless communication is designed and implemented. The proposed system is composed of three parts: air pollutants measuring sensors module, LoRa-based data transmission module, and monitoring module. In the air pollutants measuring module, the MSP430 board with six big air pollutants measuring sensors are used. The air pollutants sensing data is transmitted to the control server in the monitoring system using LoRa transmission module. The received sensing data is stored in the database of the monitoring system, and visualized in real-time on the map of the sensor locations. The implemented air pollutant sensor system can be used for measuring the level of air quality conveniently in our daily lives.

A Design of Coordinates Techniques OTP for a Secure Transmission with Key (안전한 키 전송을 위한 좌표기법 OTP 설계)

  • Lee, Kil-Hun;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05b
    • /
    • pp.490-493
    • /
    • 2012
  • 본 논문에서는 좌표기법을 사용한 PAD 형식의 OTP를 제안하였다. 기존에 이용되던 SEED 기반의 OTP가 아닌 사용자의 기기 정보와 조합 동기화 방식을 통해 키 재료를 생성하여 OTP의 PAD 속에 좌표를 사용한 암호화를 이루는 알고리즘을 제안했기 때문에 기존의 Password 방식의 OTP보다 보안성에 우수한 특성을 나타낸다. 또한 키 교환 과정에 신개념의 Digest 방식을 도입하여 차별화를 이뤘다.

  • PDF

A Study on Evaluation of optimal FAGTS location and capacity (FACTS 기기의 최적 위치 및 용량 산정에 관한 연구)

  • Song, Hwa-Chang;Lee, Byong-Jun
    • Proceedings of the KIEE Conference
    • /
    • 1999.07c
    • /
    • pp.1026-1028
    • /
    • 1999
  • In recent deregulation and competitive power market environment, electric utilities plan and operate their systems for economic benefit with secure system condition. Therefore, implementation of Flexible AC Transmission Systems (FACTS) devices can be planned for the efficient utilization of the present system facility. This paper presents a technique to solve the problem about optimal allocation of FACTS devices far the purpose of enhanced system operation.

  • PDF

Enhanced SEND Protocol for Secure Data Transmission in IPv6 Environment (IPv6환경에서 안전한 데이터 전송을 위한 SEND 프로토콜의 개선)

  • Ryu, Jae-Hyun;Heo, Joon;Hong, Choon-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10a
    • /
    • pp.102-103
    • /
    • 2007
  • 네트워크 초기 설정을 하는 경우와 동일한 프리픽스론 사용하는 인접 노드와 정보를 주고받기 위해 사용되는 인접 노드 탐색 프로토콜에 보안 기능을 지원하는 SEND 프로토콜은 메시지의 무결성과 부인 방지 기능은 제공하지만 메시지의 기밀성은 제공 할 수 없다. 본 논문에서는 SEND 프로토콜의 보안 기능을 분석하고, 대칭 키 암호화 방식을 적용하여 메시지의 무결성을 제공하는 기법을 제안한다.

  • PDF

Analysis of Transmission Using Frame Domain Interleaving and Group Domain Interleaving on a Radio Encryption System (무선암호시스템에서 FDI와 GDI를 이용한 전송성능 분석)

  • 홍진근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.10B
    • /
    • pp.1744-1759
    • /
    • 2000
  • In this paper a synchronized stream cryptosystem for secure link layer communication on a radio channel is designed. We have proposed new interleaving schemes to randomize a burst error and experimented with different types of interleaving schemes. The proposed techniques of interleaving schemes are : (1) interleaving scheme based on frame(2) interleaving scheme based on group. The proposed schemes are very robust in randomizing

  • PDF

Secure Transmission of Digital images using Cryptography and Watermarking Techniques (암호화와 워터마킹 기법을 이용한 디지털 이미지의 안전한 전송)

  • 변성철;안병하
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.443-445
    • /
    • 2003
  • 본 논문에서는 디지털 이미지를 대칭 및 비대칭 암호화와 워터마킹 기법을 사용하여 안전하게 전송하는 방법을 제안한다. 제안된 기법은 디지털 이미지의 안전한 전송을 위하여 필수적인 네가지 조건 즉. 비밀성, 인증, 무결성, 부인방지 기능을 제공한다. 비대칭 키 암호화 기법은 전자서명의 발행과 대칭키의 암호화를 위해 사용하고, 대칭키 암호화 기법은 워터마크가 삽입된 디지털 이미지를 암호화 하는데 사용하며, 워터마킹 기법은 전송하고자 하는 디지털 이미지에 전자서명을 삽입하기 위해 사용한다. 제안한 방법의 장정은 전자서명이 별도의 파일로 첨부되는 기존의 전송방식과는 달리 암호화된 디지털 데이터와 전자서명이 동일한 파일 내에 존재하게 되는 것이다.

  • PDF

A Secure 6LoWPAN Re-transmission Mechanism for Packet Fragmentation against Replay Attacks (안전한 6LoWPAN 단편화 패킷 재전송 기법에 관한 연구)

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.101-110
    • /
    • 2009
  • The 6LoWPAN(IPv6 Low-power Wireless Personal Area Network) performs IPv6 header compression, TCP/UDP/IGMP header compression, packet fragmentation and re-assemble to transmit IPv6 packet over IEEE 802,15.4 MAC/PHY. However, from the point of view of security. It has the existing security threats issued by IP packet fragmenting and reassembling, and new security threats issued by 6LoWPAN packet fragmenting and reassembling would be introduced additionally. If fragmented packets are retransmitted by replay attacks frequently, sensor nodes will be confronted with the communication disruption. This paper analysis security threats introduced by 6LoWPAN fragmenting and reassembling, and proposes a re-transmission mechanism that could minimize re-transmission to be issued by replay attacks. Re-transmission procedure and fragmented packet structure based on the 6LoWPAN standard(RFC4944) are designed. We estimate also re-transmission delay of the proposed mechanism. The mechanism utilizes timestamp, nonce, and checksum to protect replay attacks. It could minimize reassemble buffer overflow, waste of computing resource, node rebooting etc., by removing packet fragmentation and reassemble unnecessary.

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

S-FEAR: Secure-Fuzzy Energy Aware Routing Protocol for Wireless Sensor Networks

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1436-1457
    • /
    • 2018
  • Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially in mission critical fields such as the military and in medical applications. Additionally, they play a vital role in the current and future Internet of Things (IoT) services. Lightness and efficiency of a routing protocol are not the only requirements that guarantee success; security assurance also needs to be enforced. This paper proposes a Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs. S-FEAR applies a security model to an existing energy efficient FEAR protocol. As part of this research, the S-FEAR protocol has been analyzed in terms of the communication and processing costs associated with building and applying this model, regardless of the security techniques used. Moreover, the Qualnet network simulator was used to implement both FEAR and S-FEAR after carefully selecting the following security techniques to achieve both authentication and data integrity: the Cipher Block Chaining-Message Authentication Code (CBC-MAC) and the Elliptic Curve Digital Signature Algorithm (ECDSA). The performance of both protocols was assessed in terms of complexity and energy consumption. The results reveal that achieving authentication and data integrity successfully excluded all attackers from the network topology regardless of the percentage of attackers. Consequently, the constructed topology is secure and thus, safe data transmission over the network is ensured. Simulation results show that using CBC-MAC for example, costs 0.00064% of network energy while ECDSA costs about 0.0091%. On the other hand, attacks cost the network about 4.7 times the cost of applying these techniques.

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.