• Title/Summary/Keyword: 전송방식

Search Result 5,234, Processing Time 0.032 seconds

Analysis of Security Vulnerability on Firewall Logging Mechanism against DDoS Attack (DDoS 공격에 대한 방화벽 로그 기록 취약점 분석)

  • Choun, Jun-Ho;Jang, Kun-Won;Jun, Moon-Seog;Shin, Dong-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.143-148
    • /
    • 2007
  • In the context of mass traffic, firewall system cannot record normal log files against DDoS attack. The loss of log record causes that a firewall system does not know whether a packet is normally filtered or not, and firewall log, which is an essential data for the counter measure of violation accident, cannot be verified as trusted. As a network speed increases, these problems happen more frequently and largely. Accordingly, the method to use simply additional hardware devices is not recommended for the popularization of firewall. This paper is devoted to verify the loss of iptable log that is the mother's womb of most domestic firewall systems and show that the log handling methods for conventional firewall systems are needed to improve.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

Implementation of authentication mechanism for 3GPP, 3GPP2 on java card (자바 카드상에서의 3GPP, 3GPP2 인증 메커니즘 구현)

  • 조승환;전성익;이정우;이옥연;한진희;이세광
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.67-75
    • /
    • 2003
  • The development of mobile phone is growing fast in the all over the world. Besides the basic voice communication, many multimedia services and global roaming service are capable in the 3rd generation mobile telecommunication. Because mobile phone has been the essential tool to communicate, the protection of privacy and the safe transmission are critical ones. In synchronous, asynchronous mode IMT2000 service, the mechanism of mutual authentication and generation of cipher key and integrity key are implemented in smart card chip called UIM, USIM. In this paper, we describe the authentication mechanism of 3GPP and 3CPP2 and its implementation results. Then, we specify a few problems which are not defined in standard.

Design and Implementation of 4D-8PSK TCM Simulator for Satellite Communication Systems (4D-8PSK TCM 위성통신 시스템 시뮬레이터 설계 및 구현)

  • Kim, Dohwook;Kim, Joongpyo;Kim, Sanggoo;Yoon, Dongweon
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.3
    • /
    • pp.31-41
    • /
    • 2019
  • In this paper, we design and implement the simulator for the transmitter and receiver of 4D-8PSK TCM with 2.0, 2.25, 2.5, and 2.75 bits/symbol-channel transmission efficiency recommended by the CCSDS for satellite communications, and then analyze the BER performance of 4D-8PSK TCM system in AWGN channel. The transmitter of 4D-8PSK TCM is designed in accordance with the recommendation in the CCSDS standard. Meanwhile, for the receiver design of 4D-8PSK TCM, we design the differential decoder generalizing the differential encoder/decoder scheme. The trellis decoding algorithm is designed by applying the auxiliary trellis information and the Viterbi algorithm, and an 8-dimensional constellation mapper equation given in the CCSDS standard is deconstructed to design constellation mapper. Especially, we present the optimized receiver for 4D-8PSK TCM system by investigating the BER performances for the traceback lengths in the Viterbi decoder through computer simulations..

Design of Industrial Communication Gateway Using Additive Layer Type Communication Module (적층형 통신 모듈을 이용한 산업용 통신 게이트웨이 설계)

  • Nam, Jae-Hyun;Eum, Sang-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1673-1678
    • /
    • 2019
  • There are various networks and communication methods are used in industrial communication. Enterprises need to convert communications between industrial devices and networks for production line expansion, factory upgrades, network segmentation, and SI. This requires designers manufactured by many manufacturers to provide communication equipment for data or protocol conversion in order to connect and transmit various other mechanical devices to the network. This paper designed industrial communication gateway that can support the transformation of industrial communication protocol using multi-layered communication module. Industrial communication gateways have a structure that connects individual communication modules using RS485 communication to multiple layers. Each communication module consisted of analog and digital data card, LAN, and CAN-enabled card. The main board processor used Atmega micro-processor, and the RS485 slot was placed to have a multi-layer communication module structure. These additive layer type communication modules support analog and digital I/O functions and LAN and CAN for wide use in industrial communication control and monitoring.

Design of visitor counting system using edge computing method

  • Kim, Jung-Jun;Kim, Min-Gyu;Kim, Ju-Hyun;Lee, Man-Gi;Kim, Da-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.75-82
    • /
    • 2022
  • There are various exhibition halls, shopping malls, theme parks around us and analysis of interest in exhibits or contents is mainly done through questionnaires. These questionnaires are mainly depend on the subjective memory of the person being investigated, resulting in incorrect statistical results. Therefore, it is possible to identify an exhibition space with low interest by tracking the movement and counting the number of visitors. Based on this, it can be used as quantitative data for exhibits that need replacement. In this paper, we use deep learning-based artificial intelligence algorithms to recognize visitors, assign IDs to the recognized visitors, and continuously track them to identify the movement path. When visitors pass the counting line, the system is designed to count the number and transmit data to the server for integrated management.

Implementation of ICT-based Underwater Communication Monitoring Device for Underwater Lifting (수중구조를 위한 ICT 기반 수중통신 모니터링 장치 구현)

  • Yoon, Jong-Hwa;Kang, Sang-iL;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.396-400
    • /
    • 2022
  • In this study, an ICT-based underwater communication monitoring device for underwater structures is implemented based on lifting fixture that transport human bodies found on the seabed to sea level. The lifting fixture is packaged with a retback, sideback, and cartridge that injects air. Monitoring systems are developed in a mobile manner in a portable structure. The underwater ultrasonic sensor signal is supplied using a USB port, and the O/S consists of Linux. For the underwater communication dong test, a measurement test was conducted in real time from 6m to 40m in depth on the east coast. The ultrasonic sound sensor is converted to 2,400 bps to verify the transmission error according to the duality. The communication speed of sensor to monitoring is 115,200 bps, and the speed of communication from controller to receiver is 2,400 bps. In the commercialization stage of the lifting device, it is easy to develop a low-end type and the compatibility is wide.

Efficient Construction of Open Source-based Sewage Facility Database (오픈소스 기반의 하수 시설물 데이터베이스의 효율적 구축)

  • Ko, Jeongsang;Xu, Chunxu;Yun, Heecheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.5
    • /
    • pp.393-402
    • /
    • 2022
  • Effective data management of underground facilities is very important in terms of human life. For this, input of up-to-date and high-accuracy data should be preceded. Therefore, it is important to have an efficient data input method. In this study, by developing a sewage facility site survey program using open source software, paper drawings could be replaced with tablet PCs. By using a tablet PC, figures and property information acquired from the field are transmitted in real time through a database server. PostGIS query is developed to automate structured editing to minimize manual work in constructing a GIS (Geographic Information System) database for sewage facilities. did. In addition, the database was built using the sewage facility GIS database building program. As a result of comparing and analyzing the existing sewage facility database construction, work process, and work time, the work process was simplified and work time was shortened. In addition, through simple customization of open source software, it will be able to be used for field surveys and database construction in other fields.

Mid-span Spectral Inversion System Applied with Dispersion Management with Different RDPS Determinations for Half Transmission Link (반 전송 링크의 RDPS 결정 방식이 다른 분산 제어가 적용된 Mid-span Spectral Inversion 시스템)

  • Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.331-337
    • /
    • 2022
  • The length of optical fiber in dispersion-managed link combined with optical phase conjugation to compensate for signal distortion caused by chromatic dispersion and nonlinear Kerr effect is a major factor determining the compensation effectiveness. The dispersion-managed link consists of several fiber spans in which standard single mode fiber and dispersion compensating fiber are arranged. In this paper, the compensation effect in the link that changes residual dispersion per span only by adjusting the length of one type of optical fiber, which is different in the first half link and the second half link with respect to optical phase conjugator (OPC), has been investigated. It was confirmed that the best compensation for 960 Gb/s wavelength division multiplexed signal could be obtained in the dispersion-managed link, in which the cumulative dispersion profile is symmetric around the OPC, and the cumulative dispersion amount is all positive in the first half, and all the cumulative dispersion amount is distributed negatively in the second half.

Analysis and Design of Cattle Management System based on IoT (사물인터넷 기반 소관리 시스템의 분석 및 설계)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.125-130
    • /
    • 2021
  • Implementation of livestock smart-farm can be done more effectively with IoT technology developing. An build of useful stock management system can be possibile if push messages of these judgement are notified on smart-phone after cattle's illness and estrus are judged using IoT technology. These judgement method of cattle's illness and estrus can be done with gathering living stock data using temperature sensor and 3 axis acceleration sensor and sending these data using IoT and internet network into server, and studying AI machine learning using these data. In this paper, to build this cattle management system based on IoT, effective system of the whole architecture is showed. Also an effective analysis and design method to develop this system software will be presented by showing user requirement analysis using object-oriented method, flowchart and screen design.