• Title/Summary/Keyword: 위변조

Search Result 474, Processing Time 0.034 seconds

Characterization of Etching profile for $LiNbO_3$ Optical Waveguide by Using Neutral Loop Discharge Plasma Dry Etching (NLD Plasma 식각 공정을 이용한 $LiNbO_3$ 광 도파로의 식각 Profile의 특성)

  • 박우정;양우석;이승태;김우경;장현수;이한영;윤대호
    • Proceedings of the Materials Research Society of Korea Conference
    • /
    • 2003.03a
    • /
    • pp.138-138
    • /
    • 2003
  • 광대역 LiNbO$_3$ 광변조기의 초고속 광 변조 구현을 위해서는 RF/ optical 속도 정합 및 임피던스 매칭 조건 하에서 낮은 구동전압을 얻을 수 있는 ridge 구조의 제작이 필수적이며 이런 구조 제작하기 위해서는 식각 속도와 식각면 거칠기 식각 profile 및 식각 과정에서의 반응물의 감소 등과 같은 개선을 위한 연구가 필요하다. 본 연구에서는 LiNbO$_3$ 기판 위에 메탈 마스크를 형성한 후 비등방성 (anisotropic) 건식 식각 방법인 NLD (Neutral Loop Discharge)로 플라즈마 식각을 하였다. NLD plasma 식각은 1Pa 이하의 압력에서 낮은 전자 온도를 갖는 고밀도 플라즈마를 생성하고 이온 플라즈마를 형성하여 LiNbO$_3$ 표면의 원자와 분자를 이온충돌효과를 이용하여 물리적인 식각과 discharge로 형성된 레디칼 (radical)과의 상호작용에 의한 화학적 식각 메커니즘에 의한 방법으로 plasma에 의한 시편의 손상이 적으며 식각 속도가 또한 높은 것이 특징이다. 본 논문에서는 안테나 파워와 가스의 유량에 따른 LiNbO$_3$ 식각 profile 특성에 관하여 연구 하고자 한다.

  • PDF

Improved Differential Detection Scheme of Space-Time Trellis Coded MDPSK For MIMO (MIMO에서 시공간 부호화된 MDPSK의 성능을 향상시키기 위한 차동 검파 시스템)

  • Kim, Chong-Il;Lee, Ho-Jin;Yoo, Hang-Youal;Kim, Jin-Yong;Kim, Seung-Youal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1869-1876
    • /
    • 2006
  • Recently, STC techniques have been considered to be candidate to support multimedia services in the next generation mobile radio communications and have been developed the many communications systems in order to achieve the high data rates. In this paper, we Nose the Trellis-Coded Differential Space Time Modulation system with multiple symbol detection. The Trellis-code performs the set partition with unitary group codes. The Viterbi decoder containing new branch metrics is introduced in order to improve the bit error rate (BER) in the differential detection of the unitary differential space time modulation. Also, we describe the Viterbi algorithm in order to use this branch metrics. Our study shows that such a Viterbi decoder improves BER performance without sacrificing bandwidth and power efficiency.

A Design of Protocol Management System for Aggregating Messages based on Certification between Vehicles (차량간 인증 기반 메시지 집계 프로토콜 관리시스템 설계)

  • Lee, ByungKwan;Jeong, EunHee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.4
    • /
    • pp.43-51
    • /
    • 2013
  • This paper proposes the design of protocol management system for aggregationg messages based on certification between vehicles which not only prevents the messages between vehicles from being forged and altered by Sybil attack by authenticating the them, and but also provides the efficient communication by aggregating the redundant vehicle messages which frequently happens when communicating. For this, the proposed system proposes the SKLC(Session Key Local Certificate) design which is a local certificate based on a session key, and the MAP(Message Aggregation Protocol) design which aggregates the redundant vehicle messages. Therefore, when the proposed system checks the certificate of vehicle, it provides the reliable information securely by verifying the integrity of vehicle with a hash function operation, and improves communication efficiency by reducing the processing time.

Development of Fiber Optic BOTDA Sensor for Intrusion Detection (침입탐지를 위한 광섬유 BOTDA 센서의 개발)

  • Kwon, Il-Bum;Kim, Chi-Yeop;Choi, Man-Yong;Yu, Jae-Wang
    • Journal of Sensor Science and Technology
    • /
    • v.10 no.3
    • /
    • pp.163-172
    • /
    • 2001
  • Fiber optic BOTDA (Brillouin Optical Time Domain Analysis) sensor was developed to be able to detect intrusion effect through several ten kilometer optical fiber. Fiber optic BOTDA sensor was constructed with 1 laser diode and 2 electro-optic modulators. The intrusion detection experiment was peformed by the strain inducing set-up installed on an optical table to simulating an intrusion effect. In the result of this experiment, the intrusion effect was well detected as the distance resolution of 3 m through the fiber length of about 4.81 km during 1.5 seconds.

  • PDF

An Efficient Authentication Scheme for Downloading and Updating Applications in Smart Cards (스마트 카드 응용 프로그램의 다운로드와 갱신에 대한 효율적인 인증 기법)

  • 박용수;조유근
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.118-124
    • /
    • 2004
  • In this paper we propose a method for authenticating the application that is to be downloaded or updated in smart cards. Previous works have some drawbacks such as having a long verification delay or requiring a large amount of primary/secondary storage. We propose an efficient parameterized scheme by using the hash chain technique where the secondary storage requirement and verification delay of updating the application are O(k) and O(k+n/k), respectively. Moreover, both the first storage requirement and verification delay of downloading the application are O(1).

Identification Method of Geometric and Filtering Change Regions in Modified Digital Images (수정된 디지털 이미지에서 기하학적 변형 및 필터링 변형 영역을 식별하는 기법)

  • Hwang, Min-Gu;Cho, Byung-Joo;Har, Dong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1292-1304
    • /
    • 2012
  • Recently, digital images are extremely forged by editors or advertisers. Also, amateurs can modify images throughout easy editing programs. In this study, we propose identification and analytical methods for the modified images to figure out those problems. In modified image analysis, we classify two parts; a filtering change and a geometric change. Those changes have an algorithm based on interpolation so that we propose the algorithm which is able to analyze a trace on a modified area. With this algorithm, we implement a detection map of interpolation using minimum filter, laplacian algorithm, and maximum filter. We apply the proposed algorithm to modified image and are able to analyze its modified trace using the detection map.

Digital Signature Model of Sensor Network Using Hash Chain (해쉬체인을 이용한 센서네트워크의 디지털서명 모델)

  • Kim, Young-Soo;Cho, Seon-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2459-2464
    • /
    • 2009
  • In sensor network there are no nodes or servers that are exclusively responsible for packet forwarding and routing. Instead, sensor nodes participating in network communications perform these activities. Thus, they are vulnerable to the alteration and forgery of message in the process of packet forwarding and routing. To solve this problem, a security to ensure authentication and integrity of routing and forwarding messages should be required. To do this, we propose the hash chain-based digital signature model where it takes less time to compute in generating and verifying the digital signature model, unlike he public key-based digital signature model, and verify if this model is proper by comparing computation times between tow models.

Joint Hierarchical Modulation and Network Coding for Asymmetric Data Rate Transmission over Multiple-Access Relay Channel (다중 접속 릴레이 채널에서 비대칭 데이터 전송을 위한 계층 변조 및 네트워크 코딩 결합 기법)

  • You, Dongho;Kim, Dong Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.747-749
    • /
    • 2016
  • We consider a time-division multiple-access relay channel (MARC), in which two source nodes (SNs) transmit data with different data rate to a destination node (DN) with the help of a relay node (RN) using network coding (NC). However, due to its asymmetric data rate, the RN cannot combine the received bits by XOR NC. In this paper, we compare with the problem of asymmetric data rates by using zero padding and hierarchical 16QAM.

Methodology of Log Analysis for Intrusion Prevention based on LINUX (리눅스 기반 침입 방지를 위한 로그 분석 방법 연구)

  • Lim, Sung-Hwa;Lee, Do Hyeon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.33-41
    • /
    • 2015
  • A safe Linux system for security enhancement should have an audit ability that prohibits an illegal access and alternation of data as well as trace ability of illegal activities. In addition, construction of the log management and monitoring system is a necessity to clearly categorize the responsibility of the system manager or administrator and the users' activities. In this paper, the Linux system's Security Log is analyzed to utilize it on prohibition and detection of an illegal protrusion converting the analyzed security log into a database. The proposed analysis allows a safe management of the security log. This system will contribute to the enhancement of the system reliability by allowing quick response to the system malfunctions.

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.