• Title/Summary/Keyword: 단거리 탐지

Search Result 15, Processing Time 0.024 seconds

Key Authentication Method for Detecting Sinkhole Attacks of LEAP based Wireless Sensor Networks (LEAP 기반의 무선 센서 네트워크에서 싱크홀 공격을 탐지하기 위한 키 인증 기법)

  • Lee, Jae-jin;Cho, Tae-ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.55-58
    • /
    • 2015
  • 무선 센서 네트워크는 개방된 환경에 단거리 무선 통신으로 정보를 수집하는 센서 노드와 이를 수집하는 베이스 스테이션으로 운영된다. 이러한 센서 네트워크의 특징으로 인해 공격자를 통해 쉽게 훼손될 수 있으며 대표적인 공격방법으로 싱크홀 공격이 있다. LEAP은 싱크홀 공격에 대응하기 위해 네 종류의 키를 사용하여 노드 간 인증을 하도록 제안되었다. 이 기법은 보안성을 유지하기 위해 주기적으로 베이스 스테이션까지의 경로를 갱신한다. 본 논문에서는, 내부 싱크홀 공격을 LEAP과 같은 키의 인증을 통하여 탐지하는 기법을 제안한다. 제안 기법은 이전 노드, 다음 노드와의 키 인증을 통해 공격을 탐지한다. 공격이 탐지되면 해당 노드를 네트워크에서 제외하고 경로를 갱신하며 갱신된 경로를 통해 새로운 키를 배포한다. 그러므로 제안 기법은 이전 노드, 다음 노드와의 키 인증을 통해 싱크홀 공격을 탐지함으로써 전체 네트워크 보안성 향상을 목적으로 한다.

  • PDF

Zigbee Communication Based Wireless System for Measuring Lap Time on a Sprints (지그비 통신에 기반한 단거리 육상경기 기록측정 시스템)

  • Jeong, Seung-Hyun;Choi, Deuk-sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.86-89
    • /
    • 2018
  • This paper introduces a ZigBee network-based four-lane lap time measurement system that can be set up for short-distance races. The instructions "Ready-Set-Go" can be announced at the entry point node when the start button is pushed, and foot switches installed at the exit point node can be stepped on by the runner for lap time measurement of the race. The start and exit point nodes are connected to a ZigBee network to communicate time synchronization packets. The exit point node maintains synchronized local time within 10 ms at most. The system does not need expensive measurement equipment and provides lap time recording in a more convenient manner than conventional lap time measurement methods.

Method on Radar deployment for Ballistic Missile Detection Probability Improvement (탄도미사일 탐지확률 향상을 위한 레이더 배치 방안)

  • Park, Tae-yong;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.669-676
    • /
    • 2016
  • North Korea has various ballistic missiles from short range to long range such as inter continental ballistic missiles. Short range ballistic missiles such as SCUD series are threatening to Korea peninsula. Therefore Korea is constructing various missile defense systems to protect country. Parameters influencing the received power from the target to the radar are transmitting power, antenna gain, carrier frequency, RCS(Radar Cross Section) of target and distance from radar to target. Especially, RCS and distance from target are not radar performance defined parameters but external parameters. Therefore radar deployment position that large RCS can be observed and target to radar distance should be considered in parallel to improve target detection probability. In this paper, RCS pattern of SCUD-B ballistic missile is calculated, received power is analyzed based on radar deployment position during ballistic missile trajectory and methode for optimum radar deployment position to improve target detection probability is suggested.

A Study on the Countermeasures of Iskander (이스칸데르 미사일 대응방안 연구)

  • Kim, Sea Ill;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.109-115
    • /
    • 2019
  • The North's short-range projectiles and missiles are the Iskander-class missiles of the S-300 series, with a range of 270-420 kilometers and an altitude of 40-50 kilometers, making it very difficult to respond with South Korea's detection radar or striking weapons. The North's handling of the Seoul sea of fire also makes it very urgent for the South to deploy the weapons to power or introduce them as soon as possible, as it can identify its intention to strike the Seoul metropolitan area by equipping such short-range rockets and missiles with nuclear or chemical weapons. We will be prepared to prep are for reckless provocations by securing our own technology by continuously developing the Korean missile defense system and striking system, Kill Chain, which is designed to defend short-range missiles in the long-term, and securing our own technology.

Detection Performance Analysis of Underwater Vehicles by Long-Range Underwater Acoustic Communication Signals (장거리 수중 음향 통신 신호에 의한 수중 운동체 피탐지 성능 분석)

  • Hyung-Moon, Kim;Jong-min, Ahn;In-Soo, Kim;Wan-Jin, Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.4
    • /
    • pp.11-22
    • /
    • 2022
  • Unlike a short-range, a long-range underwater acoustic communication(UWAC) uses low frequency signal and deep sound channel to minimize propagation loss. In this case, even though communication signals are modulated using a covert transmission technique such as spread spectrum, it is hard to conceal the existence of the signals. The unconcealed communication signal can be utilized as active sonar signal by enemy and presence of underwater vehicles may be exposed to the interceptor. Since it is very important to maintain stealthiness for underwater vehicles, the detection probability of friendly underwater vehicles should be considered when interceptor utilizes our long-range UWAC signal. In this paper, we modeled a long-range UWAC environment for analyzing the detection performance of underwater vehicles and proposed the region of interest(ROI) setup method and the measurement of detection performance. By computer simulations, we yielded parameters, analyzed the detection probability and the detection performance in ROI. The analysis results showed that the proposed detection performance analysis method for underwater vehicles could play an important role in the operation of long-range UWAC equipment.

A Study on Estimation of a Beat Spectrum in a FMCW Radar (FMCW 레이다에서의 비트 스펙트럼 추정에 관한 연구)

  • Lee, Jong-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2511-2517
    • /
    • 2009
  • Recently, a FMCW radar is used for the various purposes in the short range detection and tracking of targets. The main advantages of a FMCWradar are the comparative simplicity of implementation and the low peak power transmission characterizing the very low probability of signal interception. Since it uses the frequency modulated continuous wave for transmission and demodulation, the received beat frequency represents the range and Doppler information of targets. Detection and extraction of useful information from targets are performed in this beat frequency domain. Therefore, the resolution and accuracy in the estimation of a beat spectrum are very important. However, using the conventional FFT estimation method, the high resolution spectrum estimation with a low sidelobe level is not possible if the acquisition time is very short in receiving target echoes. This kind of problems deteriorates the detection performance of adjacent targets having the large magnitude differences in return echoes and also degrades the reliability of the extracted information. Therefore, in this paper, the model parameter estimation methods such as autoregressive and eigenvector spectrum estimation are applied to mitigate these problems. Also, simulation results are compared and analyzed for further improvement.

Misused Key Detection Scheme Using Token in WSN (WSN 환경에서 토큰을 이용한 오용키 탐지 기법)

  • Kang, Dong-Min;Park, Min-Woo;Park, Seon-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.603-604
    • /
    • 2009
  • 무선 센서 네트워크에서 키 관리는 센서노드들 간의 안전한 통신을 위해 필요하다. 초경량, 저전력, 단거리의 통신 제약을 갖는 센서노드들은 공격자에 의해 보다 쉽게 키가 노출 될 수 있다. 특히 확률적 키 분배 방식을 사용하는 환경에서는 키가 공격자에 의해 노출 될 경우 정상적인 센서노드간의 통신에 잘못된 정보를 삽입 할 수 있어 무선 센서 네트워크의 기능에 치명적인 영향을 준다. 이때 공격자에 의해 노출되어 악용된 키를 오용키(Misused Key)라고 하며, 본 논문에서는 토큰(token)을 사용하여 기존의 방법보다 에너지 효율적인 토큰 오용키 탐지 기법을 제안한다.

Design of Multi-Mode Radar Signal Processor for UAV Detection (무인기 탐지를 위한 멀티모드 레이다 신호처리 프로세서 설계)

  • Lee, Seunghyeok;Jung, Yongchul;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.134-141
    • /
    • 2019
  • Radar systems are divided into the pulse Doppler (PD) radar and the frequency modulated continuous wave (FMCW) radar depending on the transmission waveform. In particular, the PD radar is advantageous for long-range target detection, and the FMCW radar is suitable for short-range target detection. In this paper, we present design and implementation results for a multi-mode radar signal processor (RSP) that can support both PD and FMCW radar systems to detect unmanned aerial vehicles (UAVs) at short distances as well as long distances. The proposed radar signal processor can be implemented based on Altera Cyclone-IV FPGA with 19,623 logic elements, 9,759 registers, and 25,190,400 memory bits. The logic elements and registers of the proposed radar signal processor are reduced by approximately 43% and 30%, respectively, compared to the sum of logic elements and registers of the conventional PD radar and FMCW radar signal processor.

MLP-A(Multi Link Protection for Airborne Network Verifying) algorithms and implementation in multiple air mobile/verification links (다중 공중 이동/검증 링크에서의 MLP-A 알고리즘 및 구현)

  • Youn, Jong-Taek;Jeong, Hyung-jin;Kim, Yongi;Jeon, Joon-Seok;Park, Juman;Joo, Taehwan;Go, Minsun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.422-429
    • /
    • 2022
  • In this paper, the intermediate frequency transmission signal level between the network system-based baseband and RF unit consisting of multi-channel airborne relay devices and a lot of mission devices, which are currently undergoing technology development tasks, is kept constant at the reference signal level. Considering the other party's receiving input range, despite changes in the short-range long-range wireless communication environment, it presents a multi-link protection and MLP-A algorithm that allows signals to be transmitted stably and reliably through signal detection automatic gain control, and experiments and analysis considering short-distance and long-distance wireless environments were performed by designing, manufacturing, and implementing RF units to which MLP-A algorithms were applied, and applying distance calculation equations to the configuration of multiple air movements and verification networks. Through this, it was confirmed that a stable and reliable RF communication system can be operated.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.