• Title/Summary/Keyword: 위변조

Search Result 476, Processing Time 0.03 seconds

All-Optical Gray Code to Binary Coded Decimal Converter (전광 그레이코드 이진코드 변환기)

  • Jung, Young-Jin;Park, Nam-Kyoo;Jhon, Young-Min;Woo, Deok-Ha;Lee, Seok
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.1
    • /
    • pp.60-67
    • /
    • 2008
  • An all-optical 4-bit Gray code to binary coded decimal (BCD) converter by means of commercially available numerical analysis tool (VPI) was demonstrated, for the first time to our knowledge. Circuit design approach was modified appropriately in order to fit the electrical method on an all-optical logic circuit based on a cross gain modulation (XGM) process so that signal degradation due to the non-ideal optical logic gates can be minimized. Without regenerations, Q-factor of around 4 was obtained for the most severely degraded output bit (least significant bit-LSB) with 2.5 Gbps clean input signals having 20 dB extinction ratio. While modifying the two-level simplification method and Karnaugh map method to design a Gray code to BCD converter, a general design concept was also founded (one-level simplification) in this research, not only for the Gray code to BCD converter but also for any general applications.

Integrated Photonic Channel Selective Microwave Bandpass Filter Incorporating a 1×2 Switch Based on Tunable Polymeric Ring Resonators (폴리머 링 공진기 기반의 스위치를 이용한 집적광학 채널 선택 마이크로웨이브 대역통과 필터)

  • Kim, Gun-Duk;Lee, Sang-Shin
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.1
    • /
    • pp.79-83
    • /
    • 2007
  • A reconfigurable photonic microwave (MW) channel selective filter was demonstrated incorporating a $1{\times}2$ switch based on two tunable polymeric resonators with different free spectral ranges. Each resonator, consisting of two cascaded rings with an electrode formed on one of them, plays a role as an on/off switch through the thermooptic effect. The optical signal carrying the MW signal is routed to either port of the switch and detected to show the filtered output at the frequency determined by the free spectral range of the corresponding resonator. When the channel centered at 10 GHz was chosen, the extinction ratio was ${\sim}30dB$, the bandwidth 1 GHz, and the electrical power consumption 4.1 mW. For the other channel located at 20 GHz, we have achieved the extinction ratio of ${\sim}30dB$, the bandwidth of 2 GHz, and the required power of 8.0 mW. Finally the crosstalk between the selected and blocked channels was higher than 24 dB.

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

A VLSI Architecture for the Binary Jacket Sequence (이진 자켓 비트열의 VLSI 구조)

  • 박주용;이문호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.2A
    • /
    • pp.116-123
    • /
    • 2002
  • The jacket matrix is based on the Walsh-Hadamard matrix and an extension of it. While elements of the Walsh-Hadamard matrix are +1, or -1, those of the Jacket matrix are ${\pm}$1 and ${\pm}$$\omega$, which is $\omega$, which is ${\pm}$j and ${\pm}$2$\sub$n/. This matrix has weights in the center part of the matrix and its size is 1/4 of Hadamard matrix, and it has also two parts, sigh and weight. In this paper, instead of the conventional Jacket matrix where the weight is imposed by force, a simple Jacket sequence generation method is proposed. The Jacket sequence is generated by AND and Exclusive-OR operations between the binary indices bits of row and those of column. The weight is imposed on the element by when the product of each Exclusive-OR operations of significant upper two binary index bits of a row and column is 1. Each part of the Jacket matrix can be represented by jacket sequence using row and column binary index bits. Using Distributed Arithmetic (DA), we present a VLSI architecture of the Fast Jacket transform is presented. The Jacket matrix is able to be applied to cryptography, the information theory and complex spreading jacket QPSK modulation for WCDMA.

Backscatter Communication for Wireless-Powered Communication Networks (무선전력 통신네트워크를 위한 Backscatter 통신)

  • Choi, Shin Hyuk;Kim, Dong In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1900-1911
    • /
    • 2015
  • In this paper, we introduce backscatter communication for power-limited sensors to enable long-range transmission in wireless sensor networks, and envision a way to avoid doubly near-far problem in wireless-powered communication network (WPCN) with this technology. In backscatter based WPCN, users harvest energy from both the signal broadcasted by the hybrid access point and the carrier signal transmitted by the carrier emitter in the downlink, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation in the uplink. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in backscatter based WPCN. Further, we propose backscatter based harvest-then-transmit protocol to maximize the sum-throughput of the backscatter based WPCN by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN increases significantly the transmission range and diminishes greatly the SNR outage zone.

Enhanced Mobile Agent Scheme for RFID Privacy Protection (RFID 프라이버시 보호를 위한 향상된 모바일 에이전트 기법)

  • Kim, Soo-Cheol;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2C
    • /
    • pp.208-218
    • /
    • 2008
  • We are sure that RFID system should be a widely used automatic identification system because of its various advantages and applications. However, many people know that invasions of privacy in RFID system is still critical problem that makes it difficult to be used. Many works for solving this problem have focused on light-weight cryptographic functioning in the RFID tag. An agent scheme is another approach that an agent device controls communications between the tag and the reader for protecting privacy. Generally an agent device has strong security modules and enough capability to process high-level cryptographic protocols and can guarantees consumer privacy. In this paper, we present an enhanced mobile agent for RFID privacy protection. In enhanced MARP, we modified some phases of the original MARP to reduce the probability of successful eavesdropping and to reduce the number of tag's protocol participation. And back-end server can authenticate mobile agents more easily using public key cryptography in this scheme. It guarantees not only privacy protection but also preventing forgery.

A Scheme for Detecting and Preventing an Unauthorized Device Using Context Awareness and Mobile Device Management (상황 인지 기술과 모바일 단말 관리 기술을 이용한 비인가 단말 탐지 및 차단 기법)

  • Mun, Jiman;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.1-8
    • /
    • 2014
  • This paper proposed a method that prevents data leakage and modulation and detects an unauthorized device by using AP and mobile device. Most of existing method for detecting and preventing an unauthorized device are similar to type of Evil Twin. However, in previous studies can not resolve many security accident and have the problem to cope with effectively security accident on various network. In order to solve these problem, companies prepare security accident through the varies policy and guideline. but It is hard to prevent all security accident because it is consistently increasing everyday. This paper suggests technique of detecting and preventing an unauthorized device using Context Awareness and Mobile Device Management. Firstly, when mobile device go into internal network, server distinguish access permission and authorization of mobile device using acquiring the conetxt information of mobile device. By using this result, server applies the appropriate management technique to the mobile device for leakage and accident of internal network.

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

A dual-loop boost-converter LED driver IC with temperature compensation (온도 보상 및 듀얼 루프를 이용한 부스트 컨버터 LED 드라이버 IC)

  • Park, Ji-Hoon;Yoon, Seong-Jin;Hwang, In-Chul
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.6
    • /
    • pp.29-36
    • /
    • 2015
  • This paper presents an LED backlight driver IC consisting of three linear current regulators and an output-voltage regulation loop with a self-adjustable reference voltage. In the proposed LED driver, the output voltage is controlled by dual feedback loops. The first loop senses and controls the output voltage, and the second loop senses the voltage drop of the linear current regulator and adjusts the reference voltage. With these feedback loops, the voltage drop of the linear current regulator is maintained at a minimum value, at which the driver efficiency is maximized. The output of the driver is a three-channel LED setup with four LEDs in each channel. The luminance is adjusted by the PWM dimming signal. The proposed driver is designed by a $0.35-{\mu}m$ 60-V high-voltage process, resulting in an experimental maximum efficiency of approximately 85%.