• Title/Summary/Keyword: strength of security

Search Result 284, Processing Time 0.031 seconds

Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system (하이브리드 암호시스템을 이용한 군집 영상의 고속 암호화)

  • Cho, Seong-Won;Kim, Jun-Hyeong;Chae, Yeo-Gyeong;Joung, Yu-Min;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.7
    • /
    • pp.602-609
    • /
    • 2018
  • This paper proposes the hybrid crypto-system for fast video data encryption of UAV(Unmanned Aerial Vehicle) under the LTE(Long-Term Evolution) wireless communication environment. This hybrid crypto-system is consisted of ECC(Elliptic Curve Cryptography) public key algorithm and LEA(Light-weight Encryption Algorithm) symmetric key algorithm. ECC is a faster public key algorithm with the same security strength than RSA(Rivest Shamir Adleman), and Korean standard LEA with the same key size is also a faster symmetric key algorithm than AES(Advances Encryption Standard). We have implemented this hybrid crypto-system using OpenSSL, OpenCV and Socket programs under the Swarm 8-UAV. We have shown the efficient adaptability of this hybrid crypto-system for the real-time swarm UAV through the experiments under the LTE communication environment.

A Study on the Tendency on Conversion of Passenger ship (여객선 컨버젼(Conversion) 동향에 대한 연구)

  • Kim, Young-Seop
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.14 no.1
    • /
    • pp.32-39
    • /
    • 2011
  • When the laws about the security of ships are revised, or voyage conditions are changed, ship owners have converted rather than built new passenger ships including cruise ships recently. As conversion causes a lot of changes in principal dimension, structural strength, hydrodynamic performance, the number of passengers, and cargo capacity, detailed pre-review is needed. But any studies on conversion have not been carried out yet, this study investigated and analyzed the trend of consulting companies' reports (Delta Marine Report, 2005, 2008). As a result, it was found that lengthening conversion brought about the main changes in principal dimension, and performance. Also it was suggested that there be factors for consideration like hull scantling, hull form, and cutting point to minimize side effects when ship owners build ships having lengthening conversion in mind.

Problems and Development of Police Officials' Physical Fitness Tests (경찰공무원 체력검정의 문제점 및 발전방안)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.609-619
    • /
    • 2019
  • The study aims to present a solution to the problem of police physical fitness tests as police officers, who tried to subdue the drunk in a video clip titled "Darim-dong female police officer Assault" in May in Seoul, showed a rather lethargic figure, such as being pushed out of a physical fight with the suspect. The police physical fitness test is subject to criticism as it consists of items that are difficult to apply in real life despite having to be linked to job performance. The problem is that the physical fitness test events are not realistic, the physical fitness test standards are set too low, and their credibility is not reliable due to the imbalance of standards between men and women and the vision culture of physical fitness testing methods. First of all, we hope that the Republic of Korea will become a world-class security powerhouse by upgrading its physical fitness standards and establishing a scientific fitness test system for preventing injuries and effectively measuring physical strength.

Narrow-Band Jamming Signal Cancellation Algorithm for GPS Receivers (GPS 수신기에서 적용 가능한 효과적인 협대역 전파방해 신호 제거 알고리즘)

  • Lee, In-seok;Oh, Seong-jun;Han, Jin-hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.859-867
    • /
    • 2016
  • The Global Positioning System is a navigation system that has been developed by the United States for military use. Currently, many countries, including the Republic of Korea, use GPS for civilian and military uses. However, as useful as it is, GPS is vulnerable to its Jamming signal, as the strength of the signal from satellites is very weak. In this paper, a novel jamming signal detection and cancellation method is proposed when a narrow-band jamming signal is included in the GPS received signal. At the GPS receiver, the received signal is transformed to a frequency domain sample by Fast Fourier Transform. In order to suppress the Spectral Leakage, the Blackman-Harris window is used. The proposed jamming signal cancellation algorithm will find the frequency sample with maximum power and null the maximum sample in addition to some lateral samples. If the GPS receiver is designed with FFT of size 128 to 512, it is shown that 42 samples are optimal to cancel the narrow-band jamming signal.

The Effect of Alliance on Maritime Territorial Disputes: A Case of the Aegean Sea Dispute Between Greece and Türkiye (해양영토분쟁에서 동맹의 영향: 그리스와 튀르키예 에게해 분쟁 사례)

  • Hwang, Won-June
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.137-161
    • /
    • 2023
  • This paper explores the limited role of alliances in preventing maritime territorial disputes among member states, using the ongoing conflict between Greece and Türkiye, two NATO allies, as a case study. Drawing on Institutionalist theory, we seek to explain the mechanisms that have contributed to the failure of the alliance to prevent this dispute, despite constant cooperation and transparency. Unlike land disputes, maritime territorial disputes are complex and multi-layered, with fluid boundaries that can change with climate or natural resource availability. Moreover, the lack of constant surveillance creates ambiguity about territorial encroachment thresholds. These factors have exacerbated the dispute between Greece and Türkiye, drawing other NATO members into the conflict and undermining the strength of the alliance. This paper concludes by providing policy implications for the Republic of Korea in its own potential maritime disputes, and contributes to the broader literature on the role of alliances in preventing territorial disputes.

  • PDF

An Efficient Dynamic Network Security Method based on Symmetric Block Cipher Algorithms (대칭적인 블록 암호화 알고리즘을 기반으로 한 효율적인 다이내믹 네트워크 보안 방법)

  • Song, Byoung-Ho;Yang, Sung-Ki;Bae, Sang-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.169-175
    • /
    • 2008
  • The existing block encryption algorithms have been designed for the encryption key value to be unchanged and applied to the round functions of each block. and enciphered. Therefore, it has such a weak point that the plaintext or encryption key could be easily exposed by differential cryptanalysis or linear cryptanalysis, both are the most powerful methods for decoding block encryption of a round repeating structure. Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously. Dynamic network is the unique network satisfying these characteristics among the networks for symmetric block ciphers. We analyze the strength of Dynamic network for meet-in-the-middle attack, linear cryptanalysis, and differential cryptanalysis. Also, In this paper we propose a new network called Dynamic network for symmetric block ciphers.

  • PDF

Analysis of Military Capability Balance on the Korean Peninsula Using the Net Assessment Methodology With a Focus on South and North Korean Naval Forces (Surface Combatants) (총괄평가 방법론을 활용한 한반도 군사력 균형분석 - 남·북한 해군력(수상함)을 중심으로 -)

  • Han, Jung-kyeong
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.61-96
    • /
    • 2023
  • Amidst the ongoing instability and military tensions between North and South Korea, it is essential for us to comprehend and assess North Korea's military capabilities, while preparing for potential contingencies through military reinforcement. However, to conduct a comprehensive analysis of the military balance on the Korean Peninsula, it is imperative to move beyond simplistic quantitative comparisons of combat capabilities and embrace a broader perspective, which includes qualitative comparisons of military strength, operational capabilities, and a nation's ability to wage war. To address this need, this study employs the method of "Net Assessment" to evaluate the relative combat power of South and North Korean conventional naval forces, with a particular focus on surface combatants. This evaluation involves both quantitative and qualitative comparisons of military assets (personnel and equipment) and intangible factors (naval strategies, geography, etc.). By conducting a holistic assessment, the research aims to identify and analyze strategic asymmetries that may exist between the two navies.

  • PDF

The performance evaluation of the polymer arm insulator for a compact transmission line tower (친환경적인 컴팩트 송전탑용 폴리머 절연암의 성능평가에 관한 연구)

  • Song, Hong-Jun;Park, Gi-Ho;Kim, Gwan-Hyung;Byun, Gi-Sik;Hwang, Yeong-Yeun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.341-347
    • /
    • 2009
  • As a right-of-way security for the high power transmission line tower construction is becoming more and more difficult, the friendly environmental compact tower design is required. For a proper insulation for the compact tower, the polymer material are being tried. Some countries has already adapted, in the various polymer application and management data, polymer arm insulator to the transmission tower, and shown a stable operation. However, in our country, the polymer arm insulator has left much to be desired in the installation on the transmission line tower. But polymer material has been developed by high strength and technology and is expected to be used in various electric equipments. The polymer arm insulator is a one of good electric insulation materials to expand the power supply capacity in the rapid power demand increasement In this research, the new polymer am insulator is designed and its electric specifications are analyzed. Its mechanical specifications is verified through the field test on the compact tower which is modified by the polymer arm insulator.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

Implement IoT device Authentication System (IoT 단말 인증 시스템 구현)

  • Kang, Dong-Yeon;Jeon, Ji-Soo;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.344-345
    • /
    • 2022
  • ogy is being used in many fields, such as smart farms, smart oceans, smart homes, and smart energy. Various IoT terminals are used for these IoT services. Here, IoT devices are physically installed in various places. A malicious attacker can access the IoT service using an unauthorized IoT device, access unauthorized important information, and then modify it. In this study, to solve these problems, we propose an authentication system for IoT devices used in IoT services. The IoT device authentication system proposed in this study consists of an authentication module mounted on the IoT device and an authentication module of the IoT server. If the IoT device authentication system proposed in this study is used, only authorized IoT devices can access the service and access of unauthorized IoT devices can be denied. Since this study proposes only the basic IoT device authentication mechanism, additional research on additional IoT device authentication functions according to the security strength is required.IoT technol

  • PDF