• Title/Summary/Keyword: security radio wave

Search Result 16, Processing Time 0.03 seconds

A Scheme of Improving Propagation Attack Protection and Generating Convergence Security Token using Moire (무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법)

  • Lee, Su-Yeon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.2
    • /
    • pp.7-11
    • /
    • 2019
  • Due to diversification and popularization of devices that use rapid transmission, there are many security issues related to radio waves. As the disturbance and interference of the radio wave can cause a direct inconvenience to a life, it is a very important issue. In this paper, as a means to prevent radio disturbance and interference, the projected image of the reference grid and the deformed grid is obtained by measuring the projected $moir{\acute{e}}$ using the white light source, projecting grid and the light source, and a $moir{\acute{e}}$ pattern is generated with an image processing algorithm by applying a phase diagram algorithm, and generated $moir{\acute{e}}$ pattern phase diagram creates a three-dimensional shape. By making an encrypted token using this measured face shape, the transmission of the information through token ring is determined in order to transmit the horizontal transmission having the dynamic security characteristics which includes authentication strength and caller information, etc. And by confirming the uniqueness of the token and by sending and receiving the horizontal transmission using java serialization and deserialization function, a problem solving method is suggested.

A Multi-level Energy Efficient Routing Algorithm on Fixed Radio Wave Radius in Wireless Sensor Network (고정 전파 파장 반경에 의한 무선 센서네트워크에서의 다단계 에너지 효율적인 라우팅 알고리즘)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.69-76
    • /
    • 2013
  • A lot of researches have been done to improve the energy efficiency of Wireless Sensor Networks. But all the current researches are based on the idea of direct communication between cluster head and sink node. Previous results assume that node can intelligently regulate signal energy according to the distance between nodes. It is difficult to implement algorithms based on this assumption. We present a multi-level routing algorithm from the sink node to all other nodes which have fixed radio wave radius. We also show the energy saving efficiency and the implementation in real WSN using the simulation result.

Security Robustness of Tree based Anti-collision Algorithms (충돌방지 알고리즘의 보안 견고성)

  • Seo, Hyun-Gon;Kim, Hyang-Mi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.99-108
    • /
    • 2010
  • RFID(Radio Frequency IDentification) is a technology that automatically identifies objects containing the electronic tags by using radio wave. When there are some tags in the domain of the RFID reader, the mechanism that can solve a collision between the tags occurs is necessary. The multi tag identification problem is the core issue in the RFID and could be resolved by the anti-collision algorithm. However, RFID system has another problem. The problem id user information security. Tag response easily by query of reader, so the system happened user privacy violent problem by tag information exposure. In the case, RFID system id weak from sniffing by outside. In this paper, We study of security robustness for tree-walking algorithm, query tree algorithm and advanced query tree algorithm of tree based memoryless algorithm.

Wideband Rectangular Planar Monopole Antenna for OAM Wave Generation

  • Qasem, Nidal;Alamayreh, Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.55-59
    • /
    • 2021
  • Generating electromagnetic waves with Orbital Angular Momentum (OAM) properties is a fast-growing research subject in both radio and optics. This paper describes the generation of OAM carrying waves using a circular array of rectangular planar monopole antennas. The proposed design combines simplicity, compactness, and most importantly very wideband of operating frequencies (about 20-160 GHz, bandwidth ratio about 1:8) which makes it suitable for future applications.

A Low-Power Clustering Algorithm Based on Fixed Radio Wave Radius in WSN (WSN에서 전파범위 기반의 저 전력 클러스터링 알고리즘)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.75-82
    • /
    • 2015
  • Recently, lot of researches on multi-level protocol have been done to balance the sensor node energy consumption of WSN and to improve the node efficiency to extend the life of the entire network. Especially in multi-hop protocol, a variety of models have been studied to improve energy efficiency and apply it in real system. In multi-hop protocol, we assume that energy consumption can be adjusted based on the distance between the sensor nodes. However, according to the physical property of the actual WSN, it's hard to establish this. In this paper, we propose low-power sub-cluster protocol to improve the energy efficiency based on the spread of distance. Compared with the previous protocols, the proposed protocol is energy efficient and can be effectively used in the wireless sensing network.

A Safe and Reliable Method for Installing Wireless LAN into a Hospital

  • Hanada, Eisuke;Kudou, Takato
    • Journal of electromagnetic engineering and science
    • /
    • v.11 no.4
    • /
    • pp.269-273
    • /
    • 2011
  • A medical environment in which patient information can be accessed anytime / anywhere is called a "ubiquitous environment". To realize such an environment, the installation of wireless LAN is quite effective. Because the maximum radio wave output (antenna power) is set low in Japan, it has been easy to safely introduce wireless LAN into hospitals, to date mainly into large hospitals. However, if the placement of access points is not done properly, problems will occur, such as signals not reaching the desired area. A solution to these types of problems is to do an electromagnetic-field propagation simulation, which should be performed before construction of the hospital. It is also necessary to protect against security problems, such as signal interception or illegal access. We herein show our procedures for the safe introduction of wireless LAN.

An optimal security management framework for backhaul-aware 5G- Vehicle to Everything (V2X)

  • Vishal Sharma;Jiyoon Kim;Yongho Ko;Ilsun You;Jung Taek Seo
    • Journal of Internet Technology
    • /
    • v.21 no.1
    • /
    • pp.249-264
    • /
    • 2020
  • Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5G)-based functional architecture. The vehicular networks include Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrian (V2P) and Vehicle to Network (V2N), all of which are referred to as Vehicle to Everything (V2X). 5G has dominated the vehicular network and most of the upcoming research is motivated towards the fully functional utilization of 5G-V2X. Despite that, credential management and edge-initiated security are yet to be resolved under 5G-V2X. To further understand the issue, this paper presents security management as a principle of sustainability and key-management. The performance tradeoff is evaluated with the key-updates required to maintain a secure connection between the vehicles and the 5G-terminals. The proposed approach aims at the utilization of high-speed mmWave-based backhaul for enhancing the security operations between the core and the sub-divided functions at the edge of the network through a dual security management framework. The evaluations are conducted using numerical simulations, which help to understand the impact on the sustainability of connections as well as identification of the fail-safe points for secure and fast operations. Furthermore, the evaluations help to follow the multiple tradeoffs of security and performance based on the metrics like mandatory key updates, the range of operations and the probability of connectivity.

The Error of the Method of Angular Sections of Microwave Sounding of Natural Environments in the System of Geoecological Monitoring

  • Fedoseeva, E.V.;Kuzichkin, O. R.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.47-53
    • /
    • 2021
  • The article deals with the problems of application of microwave methods in systems of geoecological monitoring of natural environments and resources of the agro-industrial complex. It is noted that the methods of microwave radiometry make it possible, by the power of the measured intrinsic radio-thermal radiation of the atmosphere, when solving inverse problems using empirical and semi-empirical models, to determine such parameters of the atmosphere as thermodynamic temperature, humidity, water content, moisture content, precipitation intensity, and the presence of different fractions of clouds.In addition to assessing the meteorological parameters of the atmosphere and the geophysical parameters of the underlying surface based on the data of microwave radiometric measurements, it is possible to promptly detect and study pollution of both the atmosphere and the earth's surface. A technique has been developed for the analysis of sources of measurement error and their numerical evaluation, because they have a significant effect on the accuracy of solving inverse problems of reconstructing the values of the physical parameters of the probed media.To analyze the degree of influence of the limited spatial selectivity of the antenna of the microwave radiometric system on the measurement error, we calculated the relative measurement error of the ratio of radio brightness contrasts in two angular directions. It has been determined that in the system of geoecological monitoring of natural environments, the effect of background noise is maximal with small changes in the radiobrightness temperature during angular scanning and high sensitivity of the receiving equipment.

Hacking attack and vulnerabilities in vehicle and smart key RF communication (차량과 스마트키 RF통신에 대한 해킹 공격 및 취약점에 대한 연구)

  • Kim, Seung-woo;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1052-1057
    • /
    • 2020
  • With the development of new ICT technology, smart keys for vehicles are terminals with ICT technology. Therefore, when the vehicle and the smart key communicate with RF, a cyber hacking attack is possible. Cyber-attacks on smart keys can pose a threat to vehicle theft and vehicle control. Therefore, it is necessary to study hacking attacks and vulnerabilities of smart keys for autonomous vehicles. In this paper, we analyze the cyber attack case of RF communication for vehicles and smart keys. In addition, a real RF cyber attack on the smart key is performed, and the vulnerability of radio wave replication in the same frequency band is found. In this paper, we analyze the vulnerability of RF communication between vehicles and smart keys, and propose a countermeasure against cyber security. In the future, plans to strengthen cyber attacks and security through the popularization of autonomous vehicles will become basic data to protect human and vehicle safety.

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.