• 제목/요약/키워드: secure transmission

검색결과 433건 처리시간 0.024초

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.

Visible Light Communication Method for Personalized and Localized Building Energy Management

  • Jeong, Jin-Doo;Lim, Sang-Kyu;Han, Jinsoo;Park, Wan-Ki;Lee, Il-Woo;Chong, Jong-Wha
    • ETRI Journal
    • /
    • 제38권4호
    • /
    • pp.735-745
    • /
    • 2016
  • The Paris agreement at the 21st Conference of the Parties (COP21) emphasizes the reduction of greenhouse gas emissions and increase in energy consumption in all areas. Thus, an important aspect is energy saving in buildings where the lighting is a major component of the electrical energy consumption. This paper proposes a building energy management system employing visible light communication (VLC) based on LED lighting. The proposed management system has key characteristics including personalization and localization by utilizing such VLC advantages as secure communication through light and location-information transmission. Considering the efficient implementation of an energy-consumption adjustment using LED luminaires, this paper adopts variable pulse position modulation (VPPM) as a VLC modulation scheme with simple controllability of the dimming level that is capable of providing a full dimming range. This paper analyzes the VPPM performances according to variable dimming for several schemes, and proposes a VPPM demodulation architecture based on dimming-factor acquisition, which can obtain an improved performance compared to a 2PPM-based scheme. In addition, the effect of a dimming-factor acquisition error is analyzed, and a frame format for minimizing this error effect is proposed.

가스엔진 구동 건물에너지 통합 공급시스템 개발을 위한 기술동향 사례연구 (Integrated Building Energy Supply System : An Overview of Technical Trends for Gas Engine Driven Combined Heat and Power System)

  • 박병용;정용대;신현철;조진균
    • 설비공학논문집
    • /
    • 제29권11호
    • /
    • pp.612-620
    • /
    • 2017
  • Power consumption in Southeast Asia is steadily increasing due to industrialization and the effects of hot and humid climates. However, there are not enough energy generation facilities and infrastructures to meet the growing demand because it is difficult to secure the construction and operation costs of the transmission and distribution systems. This study aims to develop a gas engine driven heat pump system that supplies heating, cooling and electric power to buildings. This system, besides its normal function to produce heat, has the capacity to generate electricity on a household level. This paper investigates similar cases overseas before developing the system. Through the investigation of commercialized similar systems, the level of technology and market trend of development system were identified. Features and specifications of commercial and industrial systems will be used for system development.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

Preliminary Design of Electronic System for the Optical Payload

  • Kong Jong-Pil;Heo Haeng-Pal;Kim YoungSun;Park Jong-Euk;Chang Young-Jun
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.637-640
    • /
    • 2005
  • In the development of a electronic system for a optical payload comprising mainly EOS(Electro-Optical Sub-system) and PDTS(Payload Data Transmission Sub-system), many aspects should be investigated and discussed for the easy implementation, for th e higher reliability of operation and for the effective ness in cost, size and weight as well as for the secure interface with components of a satellite bus, etc. As important aspects the interfaces between a satellite bus and a payload, and some design features of the CEU(Camera Electronics Unit) inside the payload are described in this paper. Interfaces between a satellite bus and a payload depend considerably on whether t he payload carries the PMU(Payload Management Un it), which functions as main controller of the Payload, or not. With the PMU inside the payload, EOS and PDTS control is performed through the PMU keep ing the least interfaces of control signals and primary power lines, while the EOS and PDTS control is performed directly by the satellite bus components using relatively many control signals when no PMU exists inside the payload. For the CEU design the output channel configurations of panchromatic and multi-spectral bands including the video image data inter face between EOS and PDTS are described conceptually. The timing information control which is also important and necessary to interpret the received image data is described.

  • PDF

단대단 비동기 암호통신에서 효율적인 전송을 위한 데이터 변환방법 (Data Conversion Schemes for Efficient Transmission on End-to End Asynchronous Secure Communication)

  • 정현철
    • 한국정보처리학회논문지
    • /
    • 제3권7호
    • /
    • pp.1834-1844
    • /
    • 1996
  • 비동기 통신에서는 특정 영역의 데이터가 각종 제어문자로 사용된다. 그러므로 데이터를 송신할 때 이 영역의 데이터는 제어문자로의 오인을 방지하기 위하여 다른 문자로 변환하고 이를 제어접두문자와 함께 전송하여야 한다. 본 논문에서는 비동기 프로토콜 상으로 데이터를 암호화하여 전송할 때 발생하는 모의 제어문자에 대해 제어 접두문자를 추가하지 않고 일정한 변환만 하여 송신하므로써 데이터의 길어짐을 방지 하고 전체 통신속도를 높이는 문자 변환 방법을 몇 가지 제시하였다. 이러한 변환을 위해 전송 데이터의 유효 범위를 가정하고 이 범위를 벗어나지 않도록 하였으며, 실험을 통하여 이 방법이 기존의 방법에 비해 통신속도 가 향상됨을 보이고 암호화된 데이터의 임의성을 확인하므로써 암호화에 문제가 없음을 보였다.

  • PDF

메시지 인증 코드를 위한 디지털 인감 (Digital Legal Seal for Message Authentication Code)

  • 정창훈;신동오;장룡호;양대헌;이경희;염흥열
    • 정보보호학회논문지
    • /
    • 제26권2호
    • /
    • pp.345-358
    • /
    • 2016
  • 이 논문에서는 디지털 인감이라는 보안 도구를 제안한다. 디지털 인감은 종이에 출력된 바코드를 스캔하고, 스캔한 바코드 데이터와 그 데이터에 대한 HMAC 태그를 디스플레이 장치에 출력한다. 생성된 HMAC 태그는 온라인 또는 오프라인에서 사용자 본인을 확인하거나 메시지의 인증에 사용될 수 있다. 우리는 디지털 인감을 온라인 뱅킹에 적용하여 보안카드나 OTP의 부족한 점을 보완할 수 있는지에 대해 검토한다. 또한 오프라인 차용증에 일반 인감대신 사용하여 인감의 위조 가능성을 낮출 수 있는지도 검토한다.

고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현 (Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography)

  • 유연수;이상곤
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Analysis of highway reflection noise reduction using transparent noise barrier types

  • Lee, Jaiyeop;Kim, Ilho;Chang, Seoil
    • Environmental Engineering Research
    • /
    • 제20권4호
    • /
    • pp.383-391
    • /
    • 2015
  • Transparent type noise barrier is a desirable facility since it provides a secure view to drivers and passengers. However, reflection from this type of barrier could annoy dwellers on the sides of the road. To reduce reflection noise by transparent type barrier, modification can be made to the shapes on the front side and hence get effects by distortion of sound transmission. To achieve this, we have conducted simulation by which the effects of patterned screens of noise barrier on high-ways were investigated. The reduction effects of reflected sounds were evaluated for swelling, swelling with curved, rectangular and V-shaped screen type barriers, compared to the planar panel. The emitting noise was generated by 6-lane road and the patterned noise barriers had shown the reduction effects, especially in swelling and swelling with curved type for middle height dwellers, and the V-shaped screen type for higher elevation dweller. The swelling-type showed a decrease of 0.7~1.2 dB, performing the best diminution effect among the tested noise barriers.

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제17권7호
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.