• Title/Summary/Keyword: 보호 대역

Search Result 275, Processing Time 0.025 seconds

Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry (전력분야 사이버 위협 분석 및 기반시설 보안 강화를 위한 해외 IP 대역 차단 방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.401-415
    • /
    • 2019
  • Recently, there has been a lot of studies and efforts to strengthen the stability of critical infrastructures against increasing cyber attacks to critical infrastructures. In this thesis, I defined what cyber threats are, after showing you various definitions about what cyber threats are and what the types are. After studying about significant cyber threats from China, I showed you the realities of cyber threats with the analysis about starting points, types of cyber threats, ratios of attacks and so on. At last, I defined guidelines about unnecessary oversea IP range blocking. Also, I proposed unnecessary oversea IP range blocking methodologies with per information system and per network system. Furthermore, I proposed blocking characteristics per security equipment and security operation improvement and blocking effects and service process to normal oversea users.

Digital Video Watermarking Using Frame Division And 3D Wavelet Transform (프레임 분할과 3D 웨이블릿 변환을 이용한 비디오 워터마킹)

  • Kim, Kwang-Il;Cui, Jizhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.155-162
    • /
    • 2008
  • In this paper we proposed a video watermarking algorithm based on a three dimension discrete wavelet transform (3D DWT) and direct spread spectrum (DSS). In the proposed method, the information watermark is embedded into followed frames, after sync watermark is embedded into the first frame. Input frames are divided into sub frames which are located odd row and even row. The sub frames are arranged as 3D frames, and transformed into 3D wavelet domain. In this domain the watermark is embedded using DSS. Existing video watermarking using 3D DWT is non-blind method but, proposed algorithm uses blind method. The experimental results show that the proposed algorithm is robust against frame cropping, noise addition, compression, etc. acquiring BER of 10% or below and sustains level of 40dB or above on the average.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

Protection Ratio for Eureka 147 DAB System against NTSC TV Signal Interferer (NTSC TV 간섭원에 대한 Eureka 147 DAB 시스템의 혼신보호비)

  • Jeong, Young-Ho;Kim, Geon;Yang, Kyu-Tae;Lee, Soo-In
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.223-227
    • /
    • 2002
  • Eureka 747 DAB 시스템의 혼신보호비는 AM, FM, PAL, SECAM, DAB 등의 동일채널 및 인접채널 간섭원에 대한 조사가 수행되었으나, NTSC TV 간섭원에 대해서는 분석되지 않았다. Eureka 141 DAB 시스템 대부분이 TV 대역인 Band III에서 운용되는 상황을 고려한다면, NTSC TV 간섭원에 대한 혼신보호비 분석은 반드시 필요하다. 본 논문에서는 Eureka 147 DAB 시스템과 아날로그 NTSC TV 시스템간의 혼신보호비중 NTSC TV 간섭원에 대한 Eureka 147 DAB 시스템의 혼신보호비 측정을 위한 간섭환경 설정방법 및 DAB송수신기를 이용한 BER 측정방법, 그리고 측정결과를 제시한다.

  • PDF

Multiple Watermarking Technique for Copyright Protection (저작권 보호를 위한 다중 워터마킹 기술)

  • 오윤희;박지환
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2000.11b
    • /
    • pp.161-166
    • /
    • 2000
  • 본 논문에서는 영상 데이터의 저작권 보호를 위한 다중 워터마킹 기법을 제안한다. 다중 워터마킹은 하나의 컨텐츠에 복수개의 서로 다른 워터마크를 삽입하는 기법으로 각 워터마크들은 유일한 키로 정확한 추출이 가능해야 한다. 대역확산기법(spread spectrum)을 이용한 다중 워터마킹은 워터마크 삽입시 사용되는 키들간의 직교성(orthogonality)이 보장되어야 추출시 삽입된 워터마크들의 정확한 추출이 가능하게 된다. 따라서, 본 논문에서는 랜덤계열들을 Gram-schmidt 직교화 과정을 수행하여 직교화된 랜덤계열로 워터마크를 삽입하고 추출이 가능한 방법을 제안한다. 또한, 제안기법의 성능을 평가하기 위하여 가우시안 노이즈와 감마변환에 대하여 강인함을 보인다.

  • PDF

인지무선네트워크를 위한 보안 표준화 현황 - IEEE 802.22 WRAN을 중심으로

  • Kim, Hyun-Sung
    • Review of KIISC
    • /
    • v.19 no.5
    • /
    • pp.68-72
    • /
    • 2009
  • 최근 들어 기학급수적으로 증가하는 방송 및 통신 시스템으로 인해 무선 주파수 자원의 고갈 문제가 심각하게 대두되고 있다. 이와 같은 주파수 고갈과 비효율적인 주파수 사용 문제를 해결하기 위해 유휴 주파수를 합리적으로 이용하기 위한 인지무선(Cognitive radio) 기술이 많은 관심을 받고 있다. 본 고에서는 TV 주파수 대역 내 유휴자원(White space)을 대상으로 주파수 공유 기술인 인지무선 기술을 적용하기 위해 현재 표준화가 진행 중인 IEEE 802.22 WRAN을 중심으로 인지 무선네트워크를 위한 보안 표준화 현황을 살펴본다.

Constructing Balanced Boolean Functions with Good GAC (대역확산특성이 우수한 균형인 부울함수 설계)

  • 지성택
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.8 no.3
    • /
    • pp.39-48
    • /
    • 1998
  • GAC(GloabvalAvalanche Characteristics)은 부울함수가 전파특성 관점에서 얼마나 우수한지를 전체적인 관점에서 나타내는 특성으로 Zhang-Zheng(1995)에 의해서 제안되었다. GAC을 측정하는 기준으로는 와 가 있으며, 두 기준값이 작을수록 부울함수는 보다 우수한 전파특성을 갖는다. Zhang-Zheng은 GAC이 우수한 균형인 부울함수를 설계하는 두 가지 방법을 제시하였으며, 균형인 부울함수f의 대수적 차수가 3 이상일 때 의 하한이 $2^이라고 추측하였다. 본 논문에서는Zhang-Zheng의 방법보다 우수한 새로운 설계방법을 제시하며, 이를 이용하여 그들의 추측에 대한 반례를 제시한다.한다.

An Analysis on Channel Sensing Overhead in IEEE 802.22 Cognitive Radio Networks (IEEE 802.22 인지 라디오 네트워크에서 채널 센싱 오버헤드 분석)

  • Park, Keun-Mo;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.249-253
    • /
    • 2010
  • Resource of wireless frequency bandwidth is gradually going to be deficient due to explosive increase of traffic and saturated non-licensed frequency band such as ISM. In the contrary, many licensed frequency bands are revealed to be low in utilization by several measurement based researches. To alleviate this inefficiency, a concept of cognitive radio is suggested. Cognitive radio lets non-licensed user exploit the licensed frequency band as long as non-licensed user does not interfere licensed user and as a result, it is possible to harness wireless frequency more efficiently. IEEE 802.22 is the first standard network with cognitive radio technology and it employs Two-Stage channel sensing mechanism to accomplish both enough licensed user protection and efficient channel utilization. In this paper, we analyze the overhead of Two-Stage channel sensing mechanism and identify the influence of channel sensing time to the overhead.

Compatibility between LTE Cellular Systems and WLAN (LTE 셀룰라 시스템과 무선랜의 양립성 분석)

  • Jo, Han-Shin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.2
    • /
    • pp.171-178
    • /
    • 2015
  • 3GPP long-term evolution(LTE) band 2.3~2.4 GHz is adjacent to 2.4~2.5 GHz band for WLAN, and therefore compatibility study of the two systems is desirable. We propose a dynamic system simulation methodology to investigate the effect of WLAN interference on LTE systems. As capturing space/time/frequency changes in system parameters, the dynamic system simulation can exactly predict real system performance. Using the proposed methodology, we obtain LTE downlink throughput loss for the frequency separation between the two systems. Throughput loss under 1 % is obtained from guard band over 11 MHz(single channel allocation) or 10 MHz(three channel allocation).

Requirements for 6 GHz Unlicensed Bands (6 GHz 비면허 대역 이용을 위한 기술기준)

  • Kang, Young-Heung
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.5
    • /
    • pp.415-422
    • /
    • 2020
  • Federal Communications Commissions (FCC) has adopted a new rule that can provide a 1,200 MHz unlicensed spectrum to maximize the public benefits in the 5.925 ~ 7.125 GHz(6 GHz) band by expanding unlicensed broadband into the 6 GHz band while also ensuring that licensed services that operate in the band continue to thrive. In Korea, the M/W band of 6 GHz has been reallocated to introduce unlicensed services in the 6 GHz band. Considering the national interests, the entire 1,200 MHz will be supplied for the indoor uses, but only the 500 MHz of the lower bandwidth (5925 ~ 6425 MHz) will for the outdoor uses under the limited power to protect the incumbent services. The introduction of unlicensed devices is being actively promoted through the reallocation of the 6 GHz M/W band, but since it is desperately necessary to prepare technical requirements to operate them in Korea. In this paper, the US 6 GHz unlicensed rules has been analyzed, these results will be utilized for establishing Korean technical standards with the unlicensed spectrum expansion.