• Title/Summary/Keyword: 재변조

Search Result 146, Processing Time 0.022 seconds

Design and Analysis of Transmission Parameters for DH(Dog-Horse) Systems Based on IEEE802.16e (WiBro) (견마로봇 시스템의 상향링크 고속신호 전송을 위한 시스템 WiBro(IEEE802.16e) 통신변수 설계 및 분석)

  • Lee, Il-Shin;Yoo, Jae-Ho;Lee, Yoon-Ju;Kwon, Dong-Seung;Chung, Jae-Hak
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.6
    • /
    • pp.1-9
    • /
    • 2008
  • This paper presents transmission parameters of DH(Dog-Horse) systems based on IEEE802.16e(WiBro) systems. DH requires higher uplink multimedia data rate, which is different from commercial WiBro systems. This paper designes some transmission parameters satisfying the DH system requirements and demonstrates link performance evaluation based on the parameters. For the transmission parameters, the number dwon/up link OFDM symbols are determined by 6/30, respectively. For reliable transmission of control signals, downlink modulation and coding rate are selected by QPSK, 1/2 coding rate and that of uplink is chosen by 16QAM 1/2 and 3/4 coding rate. Based on these parameters, computer simulations demonstrate the system performance of DH system.

A Study Effective Zigbee Authentication Protocol in Smart Grid Network (스마트 그리드 네트워크에서 효과적인 Zigbee 인증 프로토콜에 관한 연구)

  • Im, Song-Bin;Oh, Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.184-194
    • /
    • 2011
  • Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdropping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

A Study on Image Resolution Increase According to Sequential Apply Detector Motion Method and Non-Blind Deconvolution for Nondestructive Inspection (비파괴검사를 위한 검출기 이동 방법과 논블라인드 디컨볼루션 순차 적용에 따른 이미지 해상도 증가 연구)

  • Soh, KyoungJae;Kim, ByungSoo;Uhm, Wonyoung;Lee, Deahee
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.609-617
    • /
    • 2020
  • Non-destructive inspection using X-rays is used as a method to check the inside of products. In order to accurately inspect, a X-ray image requires a higher spatial resolution. However, the reduction in pixel size of the X-ray detector, which determines the spatial resolution, is time-consuming and expensive. In this regard, a DMM has been proposed to obtain an improved spatial resolution using the same X-ray detector. However, this has a limitation that the motion blur phenomenon, which is a decrease in spatial resolution. In this paper, motion blur was removed by applying Non-Blind Deconvolution to the DMM image, and the increase in spatial resolution was confirmed. DMM and Non-Blind Deconvolution were sequentially applied to X-ray images, confirming 62 % MTF value by an additional 29 % over 33 % of DMM only. In addition, SSIM and PSNR were compared to confirm the similarity to the 1/2 pixel detector image through 0.68 and 33.21 dB, respectively.

Local Signal Design for Future GPS Systems (차세대 GPS 시스템에 알맞은 국소 신호 설계)

  • Chae, Keunhong;Yoon, Seokho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.6
    • /
    • pp.350-356
    • /
    • 2014
  • In this paper, we design a local signal to improve a tracking performance of time-multiplexed binary offset carrier (TMBOC) signal, which was adopted in modernized global positioning systems (GPS). Specifically, considering that TMBOC signal includes BOC(6,1) components, we first obtain local signal by evenly dividing sub-carrier of TMBOC(6,1,4/33) by the period of a BOC(6,1) pulse. Finally, we remove side-peaks of TMBOC(6,1,4.33) autocorrelation via combination of partial correlations given from designed local signal and solve the ambiguity problem. From numerical results, when performing signal tracking using the designed local signal, we demonstrate that the improved tracking error standard deviation (TESD) performance is offered as compared its autocorrelation and the conventional correlation functions.

텔레바이오인식기반 비대면 인증기술 표준화 동향

  • Kim, Jason;Lee, Sung Jae;Kim, Byoungsub;Lee, Sang-Woo
    • Review of KIISC
    • /
    • v.25 no.4
    • /
    • pp.43-50
    • /
    • 2015
  • 바이오인식기술은 사람의 지문 얼굴 홍채 정맥 등 신체적 특징(Physiological characteristics) 또는 음성 서명 자판 걸음걸이 등 행동적 특징(Behavioral characteristics)을 자동화된 IT 기술로 추출 저장하여 다양한 IT 기기로 개인의 신원을 확인하는 사용자 인증기술이다. 2001년 미국의 911 테러사건으로 인하여 전 세계 국제공항 항만 국경에서 지문 얼굴 홍채 등 바이오정보를 이용한 출입국심사가 보편화됨과 동시에 ISO/IEC JTC1 SC37(바이오인식) 국제표준화기구를 중심으로 표준화가 급속도로 진행되어 왔다. 최근 들어 스마트폰 테블릿 PC 등 모바일기기에 지문 얼굴 등 바이오정보를 탑재하여 다양한 모바일 응용서비스를 가능하게 해주는 모바일 바이오인식 응용기술이 전 세계적으로 개발 보급되고, 삼성전자 페이팔 중심으로 바이오인식기술을 이용한 모바일 지급결제솔루션에 대한 사실표준화협의체인 FIDO, ITU-T SG17 Q9(텔레바이오인식) 국제표준화기구를 중심으로 표준화가 진행되고 있다. 특히 이러한 모바일 바이오인식기술은 스마트폰을 통한 비대면 인증기술 수단으로서 핀테크의 중요한 요소기술로 작용될 전망이다. 한편, 위조지문 등 전통적인 바이오인식 기술의 위변조 위협으로 인한 우려도 증폭됨에 따라 스마트워치 등 웨어러블 디바이스에서 살아있는 사람의 심박수(심전도), 뇌파 등의 생체신호를 측정하여 스마트폰을 통하여 개인을 식별하는 차세대 바이오인식기술로 진화중에 있다. 본고에서는 바이오인식기술의 변천사와 함께 국내외 모바일 바이오인식기술 동향과 표준화 추진현황을 살펴보고, 지난 2015년 5월 29일 발족한 KISA "모바일 생체신호 인증기술 표준연구회"를 통하여 뇌파 심전도 등생체신호를 이용한 차세대 바이오인식 기술 및 표준화 계획을 수립하여 향후 바이오인식기반의 비대면 인증기술에 대한 추진전략을 모색하고자 한다.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

Effect Analysis of a Authentication Algorithm in IPsec VPN Satellite Communication (IPsec VPN 위성통신에서 인증알고리즘이 미치는 영향 분석)

  • Jeong, Won Ho;Hwang, Lan-Mi;Yeo, Bong-Gu;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.147-154
    • /
    • 2015
  • Satellite broadcasting networks, like if you have if you have just received information that everyone must bring the required security attributes this earth should be done as encryption. In this paper, a satellite communication network AH additional security header in transport mode IPsec VPN by applying the SHA-256 and MD-5 authentication algorithm to authenticate the data portion Error rate and analyze the BER and Throughput. First, to generate a normal IP packet added to IPsec transport mode security header AH were constructed internal authentication data by applying the SHA-256 and MD-5 algorithm. Channel coder was applied to the Rate Compatible Punctured Turbo Codes, packet retransmission scheme Hybrid-ARQ Type-II and Type-III were used. Modulation method was applied to the BPSK, the wireless channel Markov channel (Rician 80%, Rayleigh 20% and Rician 90%, Rayleigh 10%) as an authentication algorithm according to the satellite channel state analyzed how they affect the error rate and Throughput.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Broadband Optical Transmitter using Feedforward Compensation Circuit (피드포워드 보상회로를 이용한 광대역 광송신기)

  • Yun, Young-Seol;Lee, Joon-Jae;Moon, Yon-Tae;Kim, Do-Gyun;Choi, Young-Wan
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.4
    • /
    • pp.1-9
    • /
    • 2007
  • Linearity is the one of the most important features for analog-optic transmission system. In our research, the available bandwidth for the feed-forward compensation circuit is enhanced by using a 180 hybrid coupler in the circuit. The bandwidth having the decreased 3rd-order intermodulation distortion(IMD3) over 10 dB is extended over 200 MHz with the center frequency of 1.6 GHz. We performed an efficient bandwith measurement for the feed-forward compensation system, which uses the network analyzer instead of the traditional measuring system that uses two RF signal generators and the spectrum analyzer. We identify the usefulness of this method from experimental results. In this study, we used cheap digital-purpose laser diodes for economical aspect, which proves the efficiency of the proposed analog system. The spurious-free dynamic range is improved about 6 dB/Hz.