Browse > Article
http://dx.doi.org/10.15207/JKCS.2019.10.2.007

A Scheme of Improving Propagation Attack Protection and Generating Convergence Security Token using Moire  

Lee, Su-Yeon (Division of Information Communication, BaekSeok University)
Lee, Keun-Ho (Division of Information Communication, BaekSeok University)
Publication Information
Journal of the Korea Convergence Society / v.10, no.2, 2019 , pp. 7-11 More about this Journal
Abstract
Due to diversification and popularization of devices that use rapid transmission, there are many security issues related to radio waves. As the disturbance and interference of the radio wave can cause a direct inconvenience to a life, it is a very important issue. In this paper, as a means to prevent radio disturbance and interference, the projected image of the reference grid and the deformed grid is obtained by measuring the projected $moir{\acute{e}}$ using the white light source, projecting grid and the light source, and a $moir{\acute{e}}$ pattern is generated with an image processing algorithm by applying a phase diagram algorithm, and generated $moir{\acute{e}}$ pattern phase diagram creates a three-dimensional shape. By making an encrypted token using this measured face shape, the transmission of the information through token ring is determined in order to transmit the horizontal transmission having the dynamic security characteristics which includes authentication strength and caller information, etc. And by confirming the uniqueness of the token and by sending and receiving the horizontal transmission using java serialization and deserialization function, a problem solving method is suggested.
Keywords
Moire; jamming; security token; security radio wave; horizontal radio wave;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 G. G. Kim & D. S. Kim, (2001). An Analysis of Anti-jamming Capability of Frequency Hopping Satellite Communication Systems, The Journal of Korean Institute of Communications and Information Sciences, 26(1), 34-41.
2 K. S. Kang & C. S. Kim. (2017). Mutual Coupling Compensation and Direction Finding for Anti-Jamming 3D GPS Antenna Array, The Korean Institute of Communications and Information Sciences, 723-730. DOI : 10.7840/kics.2017.42.4.723
3 D. W. Lim. (2013). Case Study of Incidents by GPS Interferences and Trend for Monitoring Techniques, Current Industrial and Technological Trends in Aerospace, 11(1), 169-176.
4 E. J. Kang & B. J. Park. (2009). A Study on Enhancing the Performance of Detecting Lip Feature Points for Facial Expression Recognition Based on AAM, PKorea Information Processing Society), 299-308. DOI : 10.3745/KIPSTB.2009.16-B.4.299
5 W. J. Ryu, Y. J. Kang, H. M. Rho & D, H. Lee. (2005). A Study on 3-D Shape Measurement and Application by using Digital Projection Moire (I), Journal of the Korean Society for Precision Engineering, 22(7), 88-93. DOI : 10.1016/j.ijleo.2006.12.016
6 W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2007). A Study on 3-D Shape Measurement and Application by Using Digital Projection Moire (II), Journal of the Korean Society for Precision Engineering, 24(5), 62-67.
7 W. J. Ryu & Y. J. Kang. (2005). Shape Measurement Method by using Moire Phenomenon, Journal of the Korean Society for Precision Engineering, 22(4), 7-12.
8 Y. W. Moon, D. S. Pan & S. B. Seo. (2011). A Practical Implementation of Fuzzy Fingerprint Vault, KSII Transactions on Internet and Information Systems, 5(10), 1783-1798 DOI : 10.3837/tiis.2011.10.006   DOI
9 C. R. Seo, J. P. Lee, K. H. Lee, Y. B. Jeon & J. S. Park, (2017), A Proposal for Improvement of Detection of User Based on Facial Authentication Using Digital Projection Moire, KIPS_C2017B0117, 366-367.
10 P. S. Jeong & Y. H. Cho, (2018). User Authentication System based on Auto Identification and Data Collection, Journal of the Korea Institute of Information and Communication Engineering, 22(1), 75-82. DOI : 10.6109/jkiice.2018.22.1.75   DOI
11 S. H. Han. (2008). A Study on certification plan on Radio Frequency Identification for Airplane Use, Aerospace Engineering and Technology, 7(1), 236-244.
12 S. P. H & S. J. Han, (2012). Wireless LAN System based on IEEE 802.1x EAP-TLS Authentication Mechanism, The Korea Institute of Information and Commucation Engineering, 16(9), 1983-1989. DOI : 10.6109/jkiice.2012.16.9.1983   DOI
13 S. A. Park, C. J. Chae, H. J. Cho & J. K. Lee. (2012). Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information, Journal Of The Korea Contents Association, 12(2), 69-77. DOI : 10.5392/JKCA.2012.12.02.069   DOI
14 Y. J. Kim, D. S. Moon, S. B. Pan, Y. W. Chung & K. I. Chung. (2003). Implementation of Embedded Biometrics Technologies: A Case of a Security Token for Fingerprints, The Institute of Electronics Engineers of Korea - Computer and Information, 40(6), 39-46.
15 B. K. Lee, M. S. Kim & J. H. Seo. (2015). Design and Implementation of The Capability Token based Access Control System in the Internet of Things, Journal of the Korea Institute of Information Security & Cryptology, 25(2), 439-448. DOI : 10.13089/JKIISC.2015.25.2.439   DOI