• Title/Summary/Keyword: 위치정보 보호

Search Result 592, Processing Time 0.037 seconds

Interference Analysis of Wireless Systems with Arbitrary Antenna Patterns and Geographic Information in the VHF/UHF Bands (VHF/UHF 대역에서 지리정보와 임의 안테나 패턴을 갖는 무선시스템의 간섭분석 연구)

  • Suh, Kyoung-Whoan
    • Journal of Broadcast Engineering
    • /
    • v.18 no.3
    • /
    • pp.445-454
    • /
    • 2013
  • By using the radio propagation prediction of Rec. ITU-R P.1546, geographic information system, and S-I plane, we presented the methodology of interference analysis based on the minimum coupling loss, and also suggested the local coordinate system for calculating azimuth and elevation angles between the victim receiver and the interferer for an arbitrary antenna pattern. To check the presented algorithm, the map with the land-sea mixed area was taken for the given area of $80{\times}60[km^2]$ as real geography information. Field strength, path profile, and protection ratio with maximum allowable interference level have been illustrated for radar and fixed wireless system for the assumed frequency. In addition interference power of the victim receiver was calculated asa function of azimuth and elevation angles of the interferer. The developed methodology of interference analysis in the VHF and UHF bands can be actually applied to assess interoperability as well as compatibility in the civil or military applications.

A Robust Blind Watermarking for Digital Image Using DWT According to its Resolution (해상도에 따른 DWT 기반 디지털 영상의 강인성 블라인드 워터마킹)

  • Lee, Yongseok;Seo, Youngho;Kim, Dongwook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.888-900
    • /
    • 2015
  • This paper proposes a blind watermarking scheme using DWT satisfying robustness, invisibility, and security to protect the ownership of digital image contents. This scheme does not determine any watermarking position by local image information. It rather inserts the watermark information into all the four lowest frequency subbands after transforming the host image by n-level 2-dimensional DWT, depending on, the sizes of the host image and the watermark data. Its watermark insertion methodology uses some weighting factors according to the kind of the subband and its energy level to adjust the invisibility and the robustness of the watermark. This method is experimented for various pixel-value change attacks and geometric attacks with various images having different resolutions and aspect ratios. With the experimental results and by comparing with existing methods, we show that the proposed method has a great deal of general usage with good watermark invisibility and good robustness against attacks.

Suggestion on the SBAS Augmentation Message Providing System for the the Low-cost GPS Receiver of Drone Operation (드론의 저가형 GPS 수신기용 SBAS 보강 정보 전송 시스템 제안)

  • Seok, Hyo-jeong;Yoon, Dong-hwan;Lim, Cheol-soon;Park, Byung-woon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.272-278
    • /
    • 2017
  • In order to meet performance requirements specified by the ICAO in drone operation, a system that provides augmentation information such as SBAS is needed. However, the operating range of the drone is limited in situation where the drone can not received the SBAS message continuously. In this paper, we propose a system to transmit SBAS augmentation message using a separate communication channel assuming the SBAS satellite signal to the drone has been shielded. We implemented the proposed system and verified its performance in the static environment. The DGPS positioning results showed that the accuracy difference is about 10cm, which means the accuracy performance was very similar. In addition, the protection level calculated by the system also shows the difference within 2m from the value calculated by the airborne receiver.

A Study on the World Geodetic System Transformation of Cadastral Record Using by Three parameters (3변수를 이용한 지적공부의 세계측지계 변환 연구)

  • Jung, Wan-Suk;Kang, Sang-Gu
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.2
    • /
    • pp.139-153
    • /
    • 2014
  • The world geodetic system transformation of cadastral record have to minimize differences of boundary and area being in cadastral record according to transformation for that is direct connected with the land owner and property protection. However it is very difficult to accurately maintain the before and after transformation because coordinate transformation is generally using a mathematical conversion formula. At present, Helmert model by using 4-parameter is official coordinate transformation model for Cadastral Resurvey Project but scale factor is most sensitive to changes of area and relative position in the same parcel. In this study, it was proposed 3-parameter method using by scale factor fixing through the application of a Helmert in order to avoid changing the area difference and keeping the error within the tolerance range of the boundary which is related to the boundary point coordinate region.

Design and Implementation of Monitoring System for Submarine Optical fiber Cable Work (해저 광케이블 작업을 위한 모니터링 시스템의 설계 및 구현)

  • 이태오;정성훈;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.205-208
    • /
    • 2002
  • When establishing the submarine optical fiber table between international and domestic, marine survey in advance it grasps the submarine geological features which is accurate and a depth of water condition. And the route which is safe for selecting and submarine optical fiber cable laying it is a work which secures an ease one location. If also, the PLGR the submarine of optical fiber table root the sea contamination material (rope, wire and net) it removes in advance and if the submarine of the optical fiber cable ease it does to arrive safely. And it is a work the Plough and ROV laying work hour laying work efficiency improvement and laying equipment it will be able to protect. So, This paper presents the monitoring system of ship information management and operation for marine survey and PLGR work in submarine optical fiber table construction enterprise. In order to achieve these purpose, overall serial multi-port communication modulo of configuration, realtime processing for management and operation of receiving data, realtime graph and a printout are described.

  • PDF

A Study on the Application of TRS Communication System for the Small Fishing ship (소형어선과의 통신을 위한 TRS통신방식의 도입에 관한 연구)

  • 김정년;최조천;조학현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.196-201
    • /
    • 2002
  • The SSB(Single Side Band) communication in the 27MHz band has mainly been using between fishiery station and small fishing ship less than 10tons, but the most of small fishing ship are depend on cellular system. When accident for small ship at sea happens, It's very important to communicate continuously for preventing the collision and taking action. At present it is hard to control small fishing ship and provide information properly by using 27MHz SSB channel. Therefore in this paper We present TRS communication system applied for small fishing ship to protect the safy and life at sea and to prepare for emmergency, and also validate it's application.

  • PDF

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

River Basin based Region Reconstruction and it's Regulation Analysis: A Case of Gangwon Province (하천 유역권에 의한 권역구분과 권역별 규제지역 분석 - 강원도 지역을 대상으로 -)

  • Kim, Chang-Hwan;Bae, Sun-Hak
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.1
    • /
    • pp.20-33
    • /
    • 2006
  • Changing of industry structure and development of traffic and telecommunications requires a change of the knowledge about the space where the human beings reside. Step by step the world is being divided into specified utility blocks. Today there is a limit that only one local government can compete with another region in the world. This study provides decision support tools with the use of GIS on the regional level for regions competition. GIS establishes regions and analyzes their geographic environment data, which will help in local-government problem solving and provide framework data for similar regions to become the community. The wide-area GIS application can present an objective and rational basis for regulation of inefficient investments and excessive competition between adjacent regions. The study area is Gangwon-do. Considering specific features of Gangwon-do which preserved high-quality environment resources, river basins were taken as a basis among natural regional elements. The main object of analysis conducted were the facts relevant to environmental regulation. The Gangwon-do consists of three regions in this study: Yongdong region, North-Hangang region and South-Hangang region. The analysis of each region regulation cases showed the following: in Youngdong region the forests regulation rate is high, in North-Hangang region the military installations protection sector's rate as well as regulation rate for water resources protection is relatively high, in South-Hangang region the forest and water resources regulation rate is high. The percentage of forests and water regulation rate appeared to be rather high in Gangwon-do, which means that the value of forest and water resources there is very high.

  • PDF

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.