• Title/Summary/Keyword: wireless device communication

Search Result 730, Processing Time 0.031 seconds

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

Design and Implementation of In-band Interference Reduction Module (동일대역 간섭저감기의 설계 및 구현)

  • Kang, Sanggee;Hong, Heonjin;Chong, Youngjun
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1028-1033
    • /
    • 2020
  • The existing in-band interference reduction method recommends the physical separation distance between wireless devices and interference signals, and the interference can be suppressed through the separation distance. If the in-band interference signals can be reduced in a wireless device, a margin can be given to the physical separation distance. Since there is an effect of extending the receiver dynamic range of receivers, it is highly useful for interference reduction and improvement method. In this paper, the structure of an in-band analog IRM(Interference Reduction Module) is proposed and the design and implementation of the proposed analog IRM are described. To design an analog IRM, the interference reduction performance according to the delay mismatch, phase error and the number of delay lines that affect the performance of the analog IRM was simulated. The proposed analog IRM composed of 16 delay lines was implemented and the implemented IRM has the interference reduction performance of about 10dB for a 5G(NR-FR1-TM-1.1) signal having a 40MHz bandwidth at a center frequency of 3.32GHz. The analog IRM proposed in this paper can be used as an in-band interference canceller.

Measuring a Range of Information Dissemination in a Traffic Information System Based on a Vehicular ad hoc Network (Vehicular ad hoc network 기반 교통 정보 시스템에서 차량간 통신에 의한 정보 전달 범위 측정)

  • Kim, Hyoung-Soo;Shin, Min-Ho;Nam, Beom-Seok;Lovell, David J.
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.6
    • /
    • pp.12-20
    • /
    • 2008
  • Recent wireless communication technologies are envisioned as an innovative alternative to solve transportation problems. On ad hoc networks, as a wireless communication technology, nodes can communicate data without any infrastructure. In particular, vehicular ad hoc networks (VANETs), a specific ad hoc network applied to vehicles, enable vehicles equipped with a communication device to form decentralized traffic information systems in which vehicles share traffic information they experienced. This study investigated traffic information dissemination in a VANET-based traffic information system. For this study, an integrated transportation and communications simulation framework was developed, and experiments were conducted with real highway networks and traffic demands. The results showed that it took 3 minutes in the low traffic density situations (10 vehicle/lane.km) and 43 seconds in the high traffic density condition (40 vehicle/lane.km) to deliver traffic information of 5km away with 10% market penetration rate. In uncongested traffic conditions, information seems to be disseminated via equipped vehicles in the opposite direction. In congested traffic conditions, the sufficient availability of equipped vehicles traveling in the same direction reduces the chance to use vehicles in the opposing direction even though it is still possible.

  • PDF

Design of a Service Broker for Large Scale Connections to Support Pubsub QoS between TOS and Mobile Devices (TOS와 Mobile device 간의 펍섭 QoS를 지원하는 대량 커넥션 서비스 브로커 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.137-142
    • /
    • 2016
  • A two-step open system(TOS) was proposed to relay between a healing platform and a repository of personal health documents. TOS was designed by taking into consideration the pubsub service based on large scale connections to monitor a provider's access/request process for health documents in real time. TOS, however, uses WebSocket as a communication protocol in case of pubsub. Given the operational environment of low quality wireless networks for mobile devices that are user terminals in a healing platform, there is a need to add a messaging protocol to support QoS as well as a transmission protocol. As a light messaging protocol optimized for mobile devices, MQTT defines reliable messaging QoS to consider a wireless network situation of low speed/low quality. This study designed an MQTT protocol-based message broker to support QoS in case of large scale connections and pubsub by taking into consideration mobile devices that are user terminals in a healing platform. After designing a model between TOS and MQTT message broker, the study implemented a prototype based on the proposed design and compared it with its counterparts from previous studies based on the performance indicators in a load-test with the MQTT client tool.

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

A Study On Low Radiation Measurement of Radiation Measuring Devices and Improvement of Reaction Speed according to the Rapid Change of Radiation Dose (방사선 측정장치의 저준위 방사선 측정과 방사선량의 급격한 변화에 따른 장치의 반응 속도개선에 관한 연구)

  • Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.18 no.4
    • /
    • pp.544-551
    • /
    • 2014
  • This paper suggests an algorithm to measure low-level radiation by radiation measuring devices, and the other algorithm to improve reaction speed of the device to better respond to dramatic changes in radiation amount. The former algorithm to improve the accuracy of measuring low-level radiation takes advantage of a dual window radiation measurement method which is based on accumulated average of pulses gathered by a radiation measuring sensor. The latter algorithm is to enhance reaction speed of a measuring device to more sensitively react to dramatic changes in radiation amount by adopting a dual window radiation measurement method which analyzes data patterns newly put into for six seconds. To verify the suggested algorithms, a hardware-which consists of sensor and high-voltage generator, controller, charger and power supply circuit, wireless communication part, and display part-was used. Tests conducted on the dual window radiation measurement method as used in the suggested algorithm have proved that accuracy improves to measure low-level radiation of 5uSv/h, and linearity also gets better. Other tests were conducted to see whether the suggested algorithm enhances the reaction speed of a radiation measuring device so that the device responds better to dramatically changing radiation amount. The experimental results have shown meaningful changes in numbers after six seconds. Therefore, the conclusions are made that the algorithm enhances the reaction speed of the device.

Unmanned Vehicle System Configuration using All Terrain Vehicle

  • Moon, Hee-Chang;Park, Eun-Young;Kim, Jung-Ha
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1550-1554
    • /
    • 2004
  • This paper deals with an unmanned vehicle system configuration using all terrain vehicle. Many research institutes and university study and develop unmanned vehicle system and control algorithm. Now a day, they try to apply unmanned vehicle to use military device and explore space and deep sea. These unmanned vehicles can help us to work is difficult task and approach. In the previous research of unmanned vehicle in our lab, we used 1/10 scale radio control vehicle and composed the unmanned vehicle system using ultrasonic sensors, CCD camera and kinds of sensor for vehicle's motion control. We designed lane detecting algorithm using vision system and obstacle detecting and avoidance algorithm using ultrasonic sensor and infrared ray sensor. As the system is increased, it is hard to compose the system on the 1/10 scale RC car. So we have to choose a new vehicle is bigger than 1/10 scale RC car but it is smaller than real size vehicle. ATV(all terrain vehicle) and real size vehicle have similar structure and its size is smaller. In this research, we make unmanned vehicle using ATV and explain control theory of each component

  • PDF

Development of an Implantable Drug Infusion Pump for Pain Control in Cancer Patients (암 환자 통증 조절을 위한 이식형 약물 주입 펌프 개발)

  • Bach, Du-Jin;Park, Jun-Woo;Hong, So-Young;Lee, Chul-Han;Kim, Kwang-Gi;Jo, Yung-Ho;Kim, Dae-Hyun
    • The KSFM Journal of Fluid Machinery
    • /
    • v.12 no.3
    • /
    • pp.31-37
    • /
    • 2009
  • This paper presents a implantable intrathecal drug infusion pump for pain control in cancer patients. This device consists of micropump module, drug reservoir module and control module. The micropump module using cam-follower mechanism composed of small-sized four cams and four followers. Each followers is driven by a cam and liquid is discharged by a sequential reciprocal motion of the followers. The advantage of this structure is that it allows the pump to be clean and valveless. The drug reservoir module composed of drug chamber, gas chamber and diaphragm. The control module composed of battery, wireless communication unit and controller. To design a small-sized, low power pump some analysis were performed to determine the design parameters. To verify the feasibility of the experiment, a prototype was manufactured and its operating characteristics were investigated. Experimental results were in accordance with the expected results obtained from analysis.

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.