• 제목/요약/키워드: Access Code Key

검색결과 44건 처리시간 0.024초

출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델 (An Access Code Key for Verification Service Model on the Blockchain in a Door Security)

  • 홍기현;이병문
    • 한국멀티미디어학회논문지
    • /
    • 제25권10호
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

데이터 매트릭스와 비밀 키를 이용한 하이브리드 워터마킹 방법 (Hybrid Watermarking Scheme using a Data Matrix and Secret Key)

  • 전성구;김일환
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.144-146
    • /
    • 2006
  • The Data Matrix of two-dimensional bar codes is a new technology capable of holding relatively large amounts of data compared to the conventional one-dimensional bar code which is just a key that can access detailed information to the host computer database. A secret key is used to prevent a watermark from malicious attacks. We encoded copyright information into a Data Matrix bar code for encoding process and it was spread a pseudo random pattern using owner key. We embedded a randomized watermark into the image using watermark's embedding position, pattern generated with a secret key. The experimental results have shown that the proposed scheme has good quality and is very robust to various attacks, such as JPEG compression and noise. Also the performance of the proposed scheme is verified by comparing the copyright information with the information which is extracted from a bar code scantier.

  • PDF

2차원 바코드를 위한 데이터 부호화 알고리즘 설계 (Design of Data Encoding Algorithm for a Two Dimensional Bar Code)

  • 전성구;김일환
    • 산업기술연구
    • /
    • 제25권B호
    • /
    • pp.171-174
    • /
    • 2005
  • In this paper, we propose a new data encoding algorithm for a two-dimensional bar code system. In general, the one-dimensional bar code is just a key which can access detailed information to the host computer database. But the two-dimensional bar code is a new technology which can obtain high density information without access to the host computer database. We implemented the encoding algorithm for Data Matrix bar code which is the most widely used among the many kinds of two-dimensional bar codes in the field of marking using Digital Signal Processor (TMS320C31). The performance of the proposed algorithm is verified by comparing the imprinted symbols on the steel surfaces with the codes which are decoded by a bar code reader.

  • PDF

Multiuser chirp modulation for underwater acoustic channel based on VTRM

  • Yuan, Fei;Wei, Qian;Cheng, En
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • 제9권3호
    • /
    • pp.256-265
    • /
    • 2017
  • In this paper, an ascheme is proposed for multiuser underwater acoustic communication by using the multi-chirp rate signals. It differs from the well known TDMA (Time Division Multiple Access), FDMA (Frequency Division Multiple Access) or CDMA (Code Division Multiple Access), by assigning each users with different chirp-rate carriers instead of the time, frequency or PN code. Multi-chirp rate signals can be separated from each other by FrFT (Fractional Fourier Transform), which can be regarded as the chirp-based decomposing, and superior to the match filter in the underwater acoustic channel. VTRM (Virtual Time Reverse Mirror) is applied into the system to alleviate the ISI caused by the multipatch and make the equalization more simple. Results of computer simulations and pool experiments prove that the proposed multiuser underwater acoustic communication based on the multi-chirp rate exhibit well performance. Outfield experments carrie out in Xiamen Port show that using about 10 kHz bandwidth, four users could communicate at the same time with 425 bps with low BER and can match the UAC application.

연속직교 상관특성을 갖는 아진 코드 기반의 구내용 PLC에 관한 연구 (A Study of Interference-Free Home PLC based on the Binary ZCD Code)

  • 차재상;김성권
    • 조명전기설비학회논문지
    • /
    • 제20권2호
    • /
    • pp.38-44
    • /
    • 2006
  • 고본 논문에서는, 구내용 전력선통신 시스템(PLC; Power Line Communication)으로서 연속직교 상관특성을 갖는 이진 코드를 이용한 CDMA(Code Division Multiple Access)시스템 기반의 전력선통신 시스템을 제시하였다. 연속직교 상관특성을 갖는 이진 코드는 주기가 N=4로부터 2의 배수로 계속 확장이 가능하기 때문에 코드발생기의 구현이 용이함과 동시에 ZCD(Zero Correlation Duration)특성을 가짐으로 인해서, 구내용 전력선통신에서 에코특성에 의한 다중경로 및 다중접속으로 인한 간섭문제를 확산코딩기법을 이용하여 근원적으로 해결해주는 역할을 한다. 본 논문에서는 제안한 연속직교 상관특성을 갖는 이진 코드기반의 구내용 전력선통신의 간섭완화 성능을 확인하기 위하여, 임펄스잡음 환경 및 에코특성에 의한 MPI(Multi Path Interference)와 MAI(Multiple Access Interference)와 같은 다양한 간섭환경 하에서의 BER(Bit Error Rate)특성을 정량적으로 분석하고, 모의실험을 통해 제안시스템의 간섭완화 능력을 입증하였다.

ITU-T Vision

  • 김영균;도재혁
    • 정보와 통신
    • /
    • 제19권7호
    • /
    • pp.40-55
    • /
    • 2002
  • The advent of Third Generation (3G) communication systems, with their ability to process real-time multimedia applications and their large bandwidths, will greatly enhance mobile Internet access. Not only does Wideband Code Division Multiple Access (WCDMA) and cdma2000 radio technology offer an advantageous density for voice in terms of spectral efficiency, it also supports higher rates and offers differentiated levels of duality of Service (QoS) for data applications. The early introduction of packet and multimedia technologies will be a key element in realizing a quick and successful return on the operator's investments in Universal Mobile Telecommunications System (UMTS) and cdma2000.

위치정보를 이용한 군 보안체계 강화 방안 (Study on the scheme to reinforce military security system based on location information)

  • 김윤영;남궁승필
    • 융합보안논문지
    • /
    • 제15권3_1호
    • /
    • pp.83-90
    • /
    • 2015
  • 현재 사용되고 있는 국방 PKI 시스템은 앞으로 전력화 될 무선 네트워크 환경에서 보다 많은 위협요소들이 발생할 것이다. 본 연구에서는 위치정보를 이용한 장소에 대한 접근제어 및 암호화를 통해 군 정보시스템에 접근 가능한 인증 체계를 강화할 수 있는 방안을 제시하고자 한다. GPS, 센서와 같은 위치정보 수집 장치를 통하여 정보를 수집하고 인증을 위한 새로운 키를 생성한다. 이렇게 생성된 키로부터 접근제어를 위한 인증코드 생성과 데이터를 암호화한다. 본 논문은 제안된 기법을 통하여 허가되지 않은 장소에서 군 기밀정보의 접근을 통제하고 권한이 없는 사용자의 인증을 방지할 수 있을 것이다. 아울러 기존의 국방 PKI 시스템을 적극적으로 활용함으로써 다단계 접근제어가 가능하다.

채널 부호화를 통한 물리계층 무선네트워크 보안기술 (Channel Coding Based Physical Layer Security for Wireless Networks)

  • 아싸두자만;공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제8권3호
    • /
    • pp.57-70
    • /
    • 2008
  • This paper introduces a new paradigm of physical layer security through channel coding for wireless networks. The well known spread spectrum based physical layer security in wireless network is applicable when code division multiple access (CDMA) is used as wireless air link interface. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of all kind of wireless communications. Channel coding has a built-in security in the sense of encoding and decoding algorithm. Decoding of a particular codeword is possible only when the encoding procedure is exactly known. This point is the key of our proposed security protocol. The common parameter that required for both encoder and decoder is generally a generator matrix. We proposed a random selection of generators according to a security key to ensure the secrecy of the networks against unauthorized access. Therefore, the conventional channel coding technique is used as a security controller of the network along with its error correcting purpose.

  • PDF

High-Spread Interleaver based Interleave-Division Multiple Access Scheme for the 4G System

  • Chung, Yeon-Ho
    • 한국멀티미디어학회논문지
    • /
    • 제11권6호
    • /
    • pp.828-834
    • /
    • 2008
  • This paper presents high-spread (HS) random interleavers based interleave-division multiple access (IDMA) scheme for the 4th generation mobile radio system. High-spread feature of a random interleaver offers high-spread characteristics to interleavers and thus produces extrinsic values with low correlation. As interleavers are key components for user separation in the IDMA, the HS interleavers with this feature are employed and analyzed in the IDMA for performance improvement. In addition, by replacing random interleavers with the HS interleavers in the IDMA, bandwidth efficiency is achieved by means of reducing the length of the repetition code. Performance evaluation shows that the proposed scheme of the IDMA with the HS interleavers provides superior BER performance and improved bandwidth efficiency.

  • PDF

HTSC and FH HTSC: XOR-based Codes to Reduce Access Latency in Distributed Storage Systems

  • Shuai, Qiqi;Li, Victor O.K.
    • Journal of Communications and Networks
    • /
    • 제17권6호
    • /
    • pp.582-591
    • /
    • 2015
  • A massive distributed storage system is the foundation for big data operations. Access latency performance is a key metric in distributed storage systems since it greatly impacts user experience while existing codes mainly focus on improving performance such as storage overhead and repair cost. By generating parity nodes from parity nodes, in this paper we design new XOR-based erasure codes hierarchical tree structure code (HTSC) and high failure tolerant HTSC (FH HTSC) to reduce access latency in distributed storage systems. By comparing with other popular and representative codes, we show that, under the same repair cost, HTSC and FH HTSC codes can reduce access latency while maintaining favorable performance in other metrics. In particular, under the same repair cost, FH HTSC can achieve lower access latency, higher or equal failure tolerance and lower computation cost compared with the representative codes while enjoying similar storage overhead. Accordingly, FH HTSC is a superior choice for applications requiring low access latency and outstanding failure tolerance capability at the same time.