• Title/Summary/Keyword: secure transmission

Search Result 433, Processing Time 0.031 seconds

Music Source Signature Indexing Method for Quick Search (빠른 검색을 위한 음원 시그니처 인덱싱 방법)

  • Kim, Sang-Kyun;Lee, Kyoung-Sik
    • Journal of Broadcast Engineering
    • /
    • v.26 no.3
    • /
    • pp.321-326
    • /
    • 2021
  • Blockchain is increasing in value as a platform for safe transmission of capital transactions or secure data. In addition, blockchain has the potential as a new platform that can safely store large amounts of data such as videos, music, and photos, and safely manage transaction details and service usage specifications. Since it is not possible to store large-capacity media data in a block, research on the performance of storing sound source information in a block and retrieving the stored sound source data by using the distributed storage system (IPFS) and the hash information of the sound source signature data was conducted. In this paper, we propose a sound source signature indexing method using a bloom filter that can improve the search speed suggested by previous studies. As a result of the experiment, it was confirmed that improved search performance (O(1)) than the existing search performance (O(n)) can be achieved.

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

Patient Information Transfer System Using OAuth 2.0 Delegation Token (OAuth 2.0 위임 Token을 이용한 환자정보 전달 시스템)

  • Park, Jungsoo;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1103-1113
    • /
    • 2020
  • Hospitals store and manage personal and health information through the electronic medical record (EMR). However, vulnerabilities and threats are increasing with the provision of various services for information sharing in hospitals. Therefore, in this paper, we propose a model to prevent personal information leakage due to the transmission of patient information in EMR. A method for granting permission to securely receive and transmit patient information from hospitals where patient medical records are stored is proposed using OAuth authorization tokens. A protocol was proposed to enable secure information delivery by applying and delivering the record access restrictions desired by the patient to the OAuth Token. OAuth Delegation Token can be delivered by writing the authority, scope, and time of destruction to view patient information.This prevents the illegal collection of patient information and prevents the leakage of personal information that may occur during the delivery process.

Design of BLDC Motor Control Circuit for Electric Driver using UC3625 Controller IC (UC3625 Controller IC를 이용한 전동 Driver용 BLDC 전동기 제어회로 설계)

  • Jeong, Sungin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.129-134
    • /
    • 2021
  • A power tool is a tool used to manufacture and process various structures using a motor that is a power source. Using a motor that uses electricity as a power source, a reduction device, power transmission and conversion device functions are built-in to make the tool rotate, reciprocate, and vibrate. It is a work tool designed to assist the user's movement skills. In the case of Korea, the power tool industry has a short history and is lagging behind advanced countries such as Germany, the United States, and Japan in terms of technology level, market share, and recognition. In addition, electric drivers used in Korea are foreign products from the US and European countries, and the domestic market also prefers 100% foreign companies, and multinational companies are investing a lot in the domestic market. Therefore, technological development must follow in order to develop domestic technology and secure a consistently high market share. The purpose of this thesis is to design a motor driver with high output performance of motor performance, miniaturization, and high speed in accordance with the basic performance requirements of power tools, and finally research developments that can be applied to industrial and medical applications.

The Efficient Ship Wireless Sensor Network Using Drone (드론을 활용한 효율적인 선박 센서 네트워크)

  • Hong, Sung-Hwa;Kim, Byoung-Kug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.122-127
    • /
    • 2022
  • Currently, the drone is considered as a mobile base station of USN as a method to act as a base station using USN in existing LTE-M and LTE networks for data transmission in unmanned ships. Therefore, the drone, which is a mobile base station, is a sink node equipped with an LTE modem or a short-range communication modem, and can collect safety information of ship operation from the sensor node and transmit the safety information to the ship or transmit the information between the ships. As, if a short-range network is formed by using drones, it will form a communication network around unmanned ships and will be advantageous for collecting information using security and environmental sensors. In this paper, we propose a method to transmit environmental sensor data and to utilize communication between ships using drones to secure the surrounding information necessary for AI operation of unmanned ships in the future.

A study on the establishment and utilization of large-scale local spatial information using search drones (수색 드론을 활용한 대규모 지역 공간정보 구축 및 활용방안에 관한 연구)

  • Lee, Sang-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.1
    • /
    • pp.37-43
    • /
    • 2022
  • Drones, one of the 4th industrial technologies that are expanding from military use to industrial use, are being actively used in the search missions of the National Police Agency and finding missing persons, thereby reducing interest in a wide area and the input of large-scale search personnel. However, legal review of police drone operation is continuously required, and the importance of advanced system for related operations and analysis of captured images in connection with search techniques is increasing at the same time. In this study, in order to facilitate recording, preservation, and monitoring in the concept of precise search and monitoring, it is possible to achieve high efficiency and secure golden time when precise search is performed by constructing spatial information based on photo rather than image data-based search. Therefore, we intend to propose a spatial information construction technique that reduces the resulting data volume by adjusting the unnecessary spatial information completion rate according to the size of the subject. Through this, the scope of use of drone search missions for large-scale areas is advanced and it is intended to be used as basic data for building a drone operation manual for police searches.

Development of Engine Clutch Female Flange for Tank Using SNCM439 Material (SNCM439재질의 전차용 엔진클러치 암플랜지 개발)

  • Kim, Joong-Seon;Kwon, Dae-Kyu;Ahn, Seok-Young
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.20 no.11
    • /
    • pp.67-73
    • /
    • 2021
  • Tanks are key weapons of ground combat that are equipped with powerful weapons and have strong protective bodies. One tank component, the engine clutch flange, is located in the part of the tank where the engine and transmission are installed, and it is a key part of the power transfer and shutoff. The engine clutch flange transmits high power to secure the mobility of the tank; thus, it must have high strength and hardness. In addition, high durability and safety must be ensured because tank operations must exclude concerns about damage. In this study, an engine clutch female flange for tanks made of SNCM439 was developed. The 2D design used AutoCAD programs, and the 3D shape design used CATIA programs. The structural analysis was conducted using ANSYS. The mesh grid has a tetrahedron shape and is created by adding a mid-side node. After the mechanical properties and constraints of SNCM439 were entered, the changes in the safety factor, total deformation, and Von-Mises stress were identified according to the increase in torque. Prototype processing was performed to verify the engine clutch female flange for the tank. To determine the productivity of the product, the cutting processing time was measured when processing the prototypes. Based on the results of measuring the cutting processing time, it is concluded that research is needed to improve productivity because MCT slot cutting processing is time consuming.

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

A Study on Development of Superconducting Wires for a Fault Current Limiter (한류기용 초전도 선재개발에 관한 연구)

  • Hwang, Kwang-Soo;Lee, Hun-Ju;Moon, Chae-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.279-290
    • /
    • 2022
  • A superconducting fault current limiter(SFCL) is a power device that exploits superconducting transition to control currents and enhances the flexibility, stability and reliability of the power system within a few milliseconds. With a high phase transition speed, high critical current densities and little AC loss, high-temperature superconducting (HTS) wires are suitable for a resistive-type SFCL. However, HTS wires due to the lack of optimization research are rather inefficient to directly apply to a fault current limiter in terms of the design and capacity, for the existing method relied the characteristics. Therefore, in order to develop a suitable wire for an SFCL, it is necessary to enhance critical current uniformity, select optimal stabilizer materials and conducted research on the development of uniform stabilizer layering technology. The high temperature superconducting wires manufactured by this study get an average critical current of 804 A/12mm-width at the length of 710m; therefore, conducted research was able to secure economic performance by improving efficiency, reducing costs, and reducing size.

Secure PIN Authentication Technique in Door-Lock Method to Prevent Illegal Intrusion into Private Areas (사적 영역에 불법 침입 방지를 위한 도어락 방식의 안전한 PIN 인증 기법)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.327-332
    • /
    • 2024
  • The spread of smart phones provides users with a variety of services, making their lives more convenient. In particular, financial transactions can be easily made online after user authentication using a smart phone. Users easily access the service by authenticating using a PIN, but this makes them vulnerable to social engineering attacks such as spying or recording. We aim to increase security against social engineering attacks by applying the authentication method including imaginary numbers when entering a password at the door lock to smart phones. Door locks perform PIN authentication within the terminal, but in smart phones, PIN authentication is handled by the server, so there is a problem in transmitting PIN information safely. Through the proposed technique, multiple PINs containing imaginary numbers are generated and transmitted as processed values such as hash values, thereby ensuring the stability of transmission and enabling safe user authentication through a technique that allows the PIN to be entered without exposure.