• Title/Summary/Keyword: 배치인증

Search Result 57, Processing Time 0.024 seconds

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

Design and Lay Out of Propulsion Test Facilities for KSLV-II (한국형발사체(KSLV-II) 추진기관 시험설비 배치 및 설계)

  • Han, Yeoung-Min;Cho, Nam-Kyung;Chung, Young-Gahp;Kim, Seung-Han;Yu, Byung-Il;Lee, Kwang-Jin;Kim, Jin-Sun;Kim, Ji-Hoon
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.56-61
    • /
    • 2011
  • The deign and lay-out of a combustion chamber test facility(CTF), a turbopump real propellant test facility(TPTF), a rocket engine test facility for 3rd stage engine(SReTF), a rocket engine ground/high altitude test facility(ReTF, HAReTF) and a propulsion system test complex(PSTC) for KSLV-II is briefly described. The development/qualification tests of engine component, 3rd stage engine system and 75ton-class liquid rocket engine system will be performed in CTF, TPTF, SReTF, ReTF and HAReTF and the development test of 1st/2nd/3rd propulsion systems for KSLV-II will be performed in PSTC. These propulsion test facilities will be built in NARO space center considering construction schedule, cost, safety distance and utility factor of propulsion test facilities.

  • PDF

A Design of Ubiquitous Home Automation System for Domestic 35-Pyung Apartment Based on USN Environment (USN환경을 도입한 국내 35평 아파트의 유비쿼터스 홈오토메이션 시스템의 설계)

  • Shin Kyung-Chul;Oh Yong-Sun
    • Journal of Game and Entertainment
    • /
    • v.2 no.1
    • /
    • pp.78-86
    • /
    • 2006
  • In this paper, we design a ubiquitous home automation system for Korean domestic 33-Pyung Apartment based on USN environment. The core of this home automation system is to give Home the 'Intelligence' so that the house can analyze and memorize the occurrences and react spontaneously on the user requirements by means of the World Model, USN, and LBS etc. Ultimately, the resident of this intelligent home might access all of these ubiquitous environments without any feelings about the equipments and peripherals. The methods of user identification, image recognition, and the ultrasonic sensors locations have been applied to Korean domestic 35-Pyung Apartment, but they will be easily generalized to be an extended model because of the flexibility of the World Model. which are confirmed by the imaginary scenario presented at the end of the main left.

  • PDF

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

Captive Flight Test POD System Design for Effective Development in Weapon System (무기체계의 효과적인 개발을 위한 항공탑재시험용 POD 시스템 설계)

  • Park, JungSoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.6
    • /
    • pp.25-31
    • /
    • 2018
  • Captive Flight Test (CFT) is one of the most important tests to acquire data when developing complex weapon systems. In this paper, we introduce the design and test result of our POD system for CFT. POD system uses POD set which consists of left and right POD. The exterior and mass properties of POD set are equal to those of fuel tank for aircraft so that we can omit Airworthiness Certification. Also, we adequately placed inner-equipments in order to acquire data including target image, navigation result and reference data to verify and analyse software algorithm. The POD system for CFT we developed is complex system as both mechanical and electronic factors are applied. As we repeatedly performed CFT, useful and various data for weapon development were acquired.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.

A Study on the Analysis of Consultation Needs of SMEs through Big-Data (빅데이터 분석을 활용한 중소기업의 상담요구 분석)

  • Lee, Bong-Cheol;You, Yen-Yoo
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.27-34
    • /
    • 2018
  • This study was conducted to identify the contents of major consulting needs of SMEs using Big Data and to suggest the efficiency of operation. The subjects of the study were counseling cases posted on the website of the Business Support Center of the Ministry of SMEs and Startups. To do this, from 2009 to March 2018, we crawled about 7,000 cases of counseling cases, followed by word cloud analysis centering on effective keyword. The main results were as follows: First, the frequency of counseling cases in each field was found in the order of establishment, management strategy, human resources, financial order. Second, in word cloud analysis, the most frequent keyword related to counseling demand were small businesses, exports, methods, procedures, registration and authentication. In this study, we obtained research results that we can improve the efficiency of the policy in real time from a new point of view by conducting big data analysis on public policy.

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.