Browse > Article
http://dx.doi.org/10.13067/JKIECS.2018.13.5.1011

USN Secure Communication Design Using Chaotic System Feedback Synchronization  

Yim, Geo-Su (Dept. Electrical Engineering, Paichai University)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.13, no.5, 2018 , pp. 1011-1016 More about this Journal
Abstract
Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.
Keywords
Usn; Chaos; Feedback Synchronization; Security Protocol; Communication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 N. Ryu, K. Ban, S. Song, and E. Kim, "Design and Implementation of 3D Visualization Information System with RFID Tag Data," J. of the Korea Institute of Electronic Communication Sciences, vol. 2, no. 4, Dec. 2007, pp. 223-228.
2 K. Kim, K. Ban, S. Heo, and E. Kim, "Design and Implementation of System for Sensing Data Collection in RFID/USN," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 2, Mar. 2010, pp. 221-226.
3 J. Suk, K. Sun, and I. Ryoo, "An Enhanced System Security Structure for USN Environment," J. of Knowledge Information Technology and Systems, vol. 11, no. 5, Oct. 2016, pp. 489-497.
4 J. Oh, H. Kim, and J. Choi, "Vulnerability analysis and Design of RFID Security Protocols," J. of Korea Information Science Society, vol. 33, no. 2(C), Oct. 2006, pp. 497-502.
5 S. Kim, S. Park, J. Ku, and N. Kim, "A Trend Analysis of RFID/USN Industry," Electronics and telecommunications trends, vol. 20, no. 3, June 2005, pp. 43-55.
6 S. Hong and C. Lin, "A Multi-Protocol Gateway Middleware Design on Ubiquitous Sensor Networks," The J. of the korean Institute of communication and information sciences, vol. 38, no. 11, Nov. 2013, pp. 895-901.
7 H. Schuster, Deterministic Chaos: an Introduction: 2nd edition. Weinheim: WILEY-VCH, 2005.
8 A. Nayfeh, Applied Nonlinear Dynamics. New York: A Wiley-Interscience Publication, 1995.
9 E. Ott, Chaos in Dynamical Systems second edition. Maryland: Cambridge University Press, 2002.
10 G. Yim and H. Kim, "Chaos-based Image Encryption Scheme using Noise-included Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, Sep. 2008, pp. 155-162.
11 K. Kim, K. Ban, N. Ryu, M. Jang, and E. Kim, "Design of RFID/USN Middleware for Poly-Context Process," J. of the Korea Institute of Electronic Communication Sciences, vol. 4, no. 2, June 2009, pp. 101-107.
12 G. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System," J. of Korea Information Assurance Society, vol. 8, no. 3, Sept. 2008, pp. 57-64.
13 H. Kim and G. Yim, "Design of digital photo frame for close-range security using the chaotic signals synchronization,"J. of the Korea Society of Computer and Information, vol. 16, no. 2, Feb. 2011, pp. 201-206.   DOI
14 G. Yim, "Design of USN Communication Protocol Using Individual Chaotic Systems," J. of Korea Information Electron Communication Technology, vol. 8, no. 6, Dec. 2015, pp. 528-533.