• Title/Summary/Keyword: 검증서버

Search Result 790, Processing Time 0.026 seconds

Suggestion on the SBAS Augmentation Message Providing System for the the Low-cost GPS Receiver of Drone Operation (드론의 저가형 GPS 수신기용 SBAS 보강 정보 전송 시스템 제안)

  • Seok, Hyo-jeong;Yoon, Dong-hwan;Lim, Cheol-soon;Park, Byung-woon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.272-278
    • /
    • 2017
  • In order to meet performance requirements specified by the ICAO in drone operation, a system that provides augmentation information such as SBAS is needed. However, the operating range of the drone is limited in situation where the drone can not received the SBAS message continuously. In this paper, we propose a system to transmit SBAS augmentation message using a separate communication channel assuming the SBAS satellite signal to the drone has been shielded. We implemented the proposed system and verified its performance in the static environment. The DGPS positioning results showed that the accuracy difference is about 10cm, which means the accuracy performance was very similar. In addition, the protection level calculated by the system also shows the difference within 2m from the value calculated by the airborne receiver.

Network Adaptive ARQ Error Control Scheme for Effective Video Transport over IP Networks (IP 망을 통한 비디오 전송에 효율적인 망 적응적 ARQ 오류제어 기법)

  • Shim, Sang-Woo;Seo, Kwang-Deok;Kim, Jin-Soo;Kim, Jae-Gon;Jung, Soon-Heung;Bae, Seong-Jun
    • Journal of Broadcast Engineering
    • /
    • v.16 no.3
    • /
    • pp.530-541
    • /
    • 2011
  • In this paper, we propose an effective network-adaptive ARQ based error control scheme to provide video streaming services through IP networks where packet error usually occurs. If time delay and feedback channel are allowed, client can request server to retransmit lost packets through IP networks. However, if retransmission is unconditionally requested without considering network condition and number of simultaneous feedback messages, retransmitted packets may not arrive in a timely manner so that decoding may not occur. In the proposed ARQ, a client conditionally requests retransmission based on assumed network condition, and it further determines valid retransmission time so that effective ARQ can be applied. In order to verify the performance of the proposed adaptive ARQ based error control, NIST-Net is used to emulate packet-loss network environment. It is shown by simulations that the proposed scheme provides noticeable error resilience with significantly reduced traffics required for ARQ.

Design of An Fair Non-Repudiation Protocol Using Digital Signature Recorder (전자서명 기록기를 이용한 공정한 부인방지 프로토콜의 설계)

  • Lee, Yong-Joon;Oh, Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1345-1351
    • /
    • 2004
  • Due to the overwhelming importance the Internet gained nowadays, more and more sophisticated security services are requested. However many applications such as Internet Banking, Home Trading System, Electronic Medical Recede, electronic commerce, etc. are related to non-repudiation. Non-repudiation services are one of these new security requirements. ill comparison to other security issues, such as privacy or authenticity of communications, non-repudiation has not been studied intensively. Informally, we say that a protocol is fair if at the end of the protocol execution either originator receives a non-repudiation of receipt evidence and recipient receives a non-repudiation of origin evidence or none of them receives any valid evidence. The most non-repudiation protocols rely on a trusted third party(TIP) that has to intervene during each protocols run. the TIP may create a communication bottleneck. ill this paper, we suggest the digital signature recorder that guarantees fairness logically and supplies minimal network bottleneck to be composed verification server physically.

NDN Contents Verification Scheme for Efficient XaaS Implementation (효과적인 XaaS 구현을 위한 NDN 데이터 인증 기술)

  • Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.692-699
    • /
    • 2015
  • Evarything as a Service (XaaS) is a software, platform, infra distribution method which provide users with necessary modules, not entire modules, as a service. To efficiently and securely operate services such as XaaS, it is needed to solve various Internet problems like network congestion, weak security and so on. Future Internet technologies are provided to solve such problems. Specially, named data networking architecture (NDN) proposes that network nodes cache transmitted data, and then they send the cached data if receiving request messages for the cached data. So NDN can efficiently diffuse excessive request messages transmitted toward original contents providers. However, when receiving contents through NDN, receivers can not confirm the practical providers because the practical providers can be different from original contents providers. Hence, it is requested for receivers to verify the received contents and such a verification process can cause service delay of XaaS. In this paper, we improve a content verification scheme of NDN to enhance the performance of services such as XaaS.

Social Network based Sensibility Design Recommendation using {User - Associative Design} Matrix (소셜 네트워크 기반의 {사용자 - 연관 디자인} 행렬을 이용한 감성 디자인 추천)

  • Jung, Eun-Jin;Kim, Joo-Chang;Jung, Hoill;Chung, Kyungyong
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.313-318
    • /
    • 2016
  • The recommendation service is changing from client-server based internet service to social networking. Especially in recent years, it is serving recommendations with personalization to users through crowdsourcing and social networking. The social networking based systems can be classified depending on methods of providing recommendation services and purposes by using memory and model based collaborative filtering. In this study, we proposed the social network based sensibility design recommendation using associative user. The proposed method makes {user - associative design} matrix through the social network and recommends sensibility design using the memory based collaborative filtering. For the performance evaluation of the proposed method, recall and precision verification are conducted. F-measure based on recommendation of social networking is used for the verification of accuracy.

IEC 61850 Based IoT Gateway Platform for Interworking to Microgrid Operational System (마이크로그리드 운영 시스템 연계를 위한 IEC 61850 기반 IoT 게이트웨이 플랫폼)

  • Park, Jeewon;Song, ByungKwen;Shin, InJae
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.67-73
    • /
    • 2018
  • There are many types of power facilities such as transformers, switches, and energy storage devices in the micro grid environment. However, with the development of IoT technology, opportunities to acquire sensor information such as temperature, pressure, and humidity are provided. In the existing micro grid environment, the communication protocols such as MMS transport protocol in IEC 61850 standard is applied in accordance with the integrated operation between the power facilities and the platform. Therefore, to accommodate IoT data, a gateway technology that can link IoT data to a data collection device (FEP) based on IEC 61850 is required. In this paper, we propose IEC 61850 based IoT gateway platform prototype for microgrid operating system linkage. The gateway platform consists of an IoT protocol interface module (MQTT, CoAP, AMQP) and database, IEC 61850 server. For databases, We used open source based NoSQL databases, Hbase and MongoDB, to store JSON data. We verified the interoperability between the IoT protocol and the IEC 61850 protocol using Sisco's MMS EASY Lite.

Public Key Encryption with Keyword Search for Restricted Testability (검증 능력이 제한된 검색 가능한 공개키 암호시스템)

  • Eom, Ji-Eun;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.3-10
    • /
    • 2011
  • To provide efficient keyword search on encrypted data, a public key encryption with keyword search (PEKS) was proposed by Boneh et al. A sender encrypts an e-mail and keywords with receiver's public key, respectively and uploads them on a server. Then a receiver generates a trapdoor of w with his secret key to search an e-mail related with some keyword w. However, Byun et al. showed that PEKS and some related schemes are not secure against keyword guessing attacks. In this paper, we propose a public key encryption with keyword search for restricted testability (PEKS-RT) scheme and show that our scheme is secure against keyword guessing attacks.

Emergency Rescue Guidance Scheme Using Wireless Sensor Networks (재난 상황 시 센서 네트워크 기반 구조자 진입 경로 탐색 방안)

  • Joo, Yang-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1248-1253
    • /
    • 2019
  • Using current evacuation methods, a crew describes the physical location of an accident and guides evacuation using alarms and emergency guide lights. However, in case of an accident on a large and complex building, an intelligent and effective emergency evacuation system is required to ensure the safety of evacuees. Therefore, several studies have been performed on intelligent path finding and emergency evacuation algorithms which are centralized guidance methods using gathered data from distributed sensor nodes. However, another important aspect is effective rescue guidance in an emergency situation. So far, there has been no consideration on the efficient rescue guidance scheme. Therefore, this paper proposes the genetic algorithm based emergency rescue guidance method using distributed wireless sensor networks. Performance evaluation using a computer simulation shows that the proposed scheme guarantees efficient path finding. The fitness converges to the minimum value in reasonable time. The density of each exit node is remarkably decreased as well.

A study on the development of a ship-handling simulation system based on actual maritime traffic conditions (실제 해상교통상황 기반 선박조종 시뮬레이션 시스템 개발에 관한 연구)

  • Eunkyu Lee;Jae-Seok Han;Kwang-Hyun Ko;Eunbi Park;Seong-Phil Ann
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.306-307
    • /
    • 2022
  • Recently, in the process of developing, verifying, and upgrading the e-Navigation service and autonomous navigation system, there is an increasing demand for inter-working with a ship-handling simulator that can simulate actual maritime traffic conditions. In this paper, to develop a ship-handling simulation system based on actual maritime traffic conditions, a simulation server was built, received information on the actual maritime traffic conditions from the e-Navigation linkage system, and changed to information for operating the ship-handling simulator. In order to provide simulation images to users, 3D shape modeling for trade ports, coastal ports in Korea and major type of ship were performed. The developed system will be used for the advancement of e-Navigation service, development and verification of autonomous navigation systems, by enabling simultaneous processing of more than 10,000 ships and allowing users to simulate actual maritime traffic conditions in the desired area.

  • PDF

Efficient Mobile Node Authentication Scheme Based on the Trusted Local Third Party in Mobile Computing Environments (이동 컴퓨팅 환경에서의 로컬 신뢰 센터 기반 효율적 이동 노드 인증 기법)

  • 노환주;이기현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4A
    • /
    • pp.528-538
    • /
    • 2000
  • Mobile computing system requires both precise identification and secure authentication scheme on remote mobile entities, which is based on the distributed mobile node. In this paper, existing discrete logarithm based $Schnorr^{[7]}$ like entity authentication schemes are improved by the analysis of performance and security on the hi-directional interactive proofs. And $EIGamal^{[14]}$ like efficient authentication schemes are also proposed. Then, these are enhanced with oblivious transfer based mono directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication processes.

  • PDF