• Title/Summary/Keyword: Cloaking

Search Result 44, Processing Time 0.026 seconds

Efficient k-ATY Method to Protect the User's Trajectory in Continuous Queries (연속적인 질의에서 사용자의 이동 경로를 보호할 수 있는 효율적인 k-ATY 기법)

  • Song, Doo Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.8
    • /
    • pp.231-234
    • /
    • 2021
  • Various problems arise as applications using locations increase. In order to solve this problem, related works are being conducted to protect the location of users. A fundamental reason for this problem is that users must provide their location information to the service provider (server) to receive the service. To improve these problems, there are works such as generating cloaking regions or generating dummies around them. However, if a user periodically asks the server for queries, the user's trajectory may be exposed by time zone. To improve this problem, in this paper, we propose a k-Anonymity Trajectory (k-ATY) technique that can improve the exposure probability of the trajectory even if the user requests continuous queries. Experimental results demonstrated the superiority of the proposed technique.

Materials and Systems for Noise Control : Categorization and Challenges

  • Bolton, J. Stuart
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2010.05a
    • /
    • pp.44-44
    • /
    • 2010
  • In this presentation, noise control materials will be discussed from several points-of-view. First, materials will be categorized in terms of their intended function: i.e., as dissipative materials, as barriers, and as media intended to modify some aspect of the sound field. Within each category, example implementations will be described as will modeling procedures. In the context of barrier materials, recent developments in the area of metamaterials will be described briefly, and problems with some recently suggested approaches will be highlighted. Acoustical cloaking will be described as a method of modifying a sound field in such a way that a sensitive area is shielded from noise exposure; the practical difficulties of this approach will also be described. Finally, within each category of material and approach, a series of suggested research challenges will be described.

  • PDF

Simulation and Optimization of Nonperiodic Plasmonic Nano-Particles

  • Akhlaghi, Majid;Emami, Farzin;Sadeghi, Mokhtar Sha;Yazdanypoor, Mohammad
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.1
    • /
    • pp.82-88
    • /
    • 2014
  • A binary-coupled dipole approximation (BCDA) is described for designing metal nanoparticles with nonperiodic structures in one, two, and three dimensions. This method can be used to simulate the variation of near- and far-field properties through the interactions of metal nanoparticles. An advantage of this method is in its combination with the binary particle swarm optimization (BPSO) algorithm to find the best array of nanoparticles from all possible arrays. The BPSO algorithm has been used to design an array of plasmonic nanospheres to achieve maximum absorption, scattering, and extinction coefficient spectra. In BPSO, a swarm consists of a matrix with binary entries controlling the presence ('1') or the absence ('0') of nanospheres in the array. This approach is useful in optical applications such as solar cells, biosensors, and plasmonic nanoantennae, and optical cloaking.

Analytic Solution for an Eaton Lens for Rotating 90°

  • Zhao, Cun-Hua
    • Current Optics and Photonics
    • /
    • v.4 no.4
    • /
    • pp.326-329
    • /
    • 2020
  • The Eaton lens, with spherical symmetry to its refractive index, was described by Eaton in 1952 and was found recently in the design of an invisible sphere for cloaking. In this paper, an Eaton lens for rotating 90° was designed using Luneburg theory, by which we found it was a fourth-order equation in the refractive index n. Therefore, the refractive index n has four roots. The equation in n was solved and studied using mathematical technology. The unsuitable complex roots of the equation should be dropped; consequently, only one of the four roots remained. To verify the refractive-index profile, the only root was solved for, before a simulation using finite-element analysis (FEA) was performed. The simulation showed that all rays will bend 90° to the right. The result of the simulation is identical to our expectation. This treatment provides a possible method for rotating light at many other angles.

A Study to Protect the User's Trajectory in Continuous Queries (연속적인 질의에서 사용자의 이동 경로를 보호하기 위한 연구)

  • Song, Doo-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.209-211
    • /
    • 2021
  • 위치를 이용한 애플리케이션이 증가함에 따라 사용자의 위치를 보호하기 위한 다양한 연구들이 진행되고 있다. 특히, 애플리케이션을 이용하기 위해서는 사용자가 서비스 제공자(서버)에게 자신의 위치 정보를 제공해야 하는 상황이다. 이러한 문제를 개선하기 위하여 보호영역(cloaking;클로킹)을 생성하거나 자신의 주변에 가상의 사용자(dummy;더미)를 생성하는 연구 등이 존재한다. 기존 연구들은 사용자의 현재 위치를 보호하는 장점은 있지만 연속적인 질의를 요청할 경우 서버에게 사용자의 이동 경로가 예측될 수 있다. 따라서 본 논문에서는 사용자가 연속적인 질의를 요청하더라도 이동 경로를 보호할 수 있는 기법을 제안한다. 실험 결과를 통하여 제안 기법의 우수성을 증명했다.

Development of Integrated Security Management Based on Cloaking IDS (내장 IDS기반의 통합 보안관리 시스템 개발)

  • Seung-Pyo Huh;Ye-Hwan Jeon;Jeom-Goo Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1417-1420
    • /
    • 2008
  • 본 연구에서는 서비스를 제공하는 각 서버들을 위협에서 보호하고 통합적으로 관리하기 위해 내장 IDS기반의 통합 보안관리 시스템을 개발하였다. IDS 서버를 외부망과 단절시킴으로써 IDS 서버에 대한 위협 자체를 원천적으로 차단하였고, 관리 대상 서버들에 에이전트를 탑재하여 탑재된 에이전트가 서버의 시스템 자원 및 네트워크 트래픽, 위협이 되는 패킷들의 자세한 정보를 수집, 분석하여 관리서버로 전송한다. 관리 프로그램은 비동기식의 X-Internet기술을 도입한 Adobe Flex를 사용한 웹 어플리케이션으로 개발하여 어떤 플랫폼에서도 접속하여 관리자의 역할을 수행할 수 있도록 하였다. 이와 같은 관리 프로그램을 통하여 대상 서버들의 시스템 자원 및 네트워크 트래픽들을 효율적으로 파악할 수 있고 IDS에서 탐지한 위협을 탐지 및 차단이 가능하도록 구현하였다.

하이퍼볼릭 메타물질: 깊은 서브파장 나노포토닉스를 위한 신개념 플랫폼

  • No, Jun-Seok
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.78-78
    • /
    • 2015
  • Metamaterials, artificially structured nanomaterials, have enabled unprecedented phenomena such as invisibility cloaking and negative refraction. Especially, hyperbolic metamaterials also known as indefinite metamaterials have unique dispersion relation where the principal components of its permittivity tensors are not all with the same signs and magnitudes. Such extraordinary dispersion relation results in hyperbolic dispersion relations which lead to a number of interesting phenomena, such as super-resolution effect which transfers evanescent waves to propagating waves at its interface with normal materials and, the propagation of electromagnetic waves with very large wavevectors comparing they are evanescent waves and thus decay quickly in natural materials. In this abstract, I will focus discussing our efforts in achieving the unique optical property overcoming diffraction limit to achieve several extraordinary metamaterials and metadevices demonstration. First, I will present super-resolution imaging device called "hyperlens", which is the first experimental demonstration of near- to far-field imaging at visible light with resolution beyond the diffraction limit in two lateral dimensions. Second, I will show another unique application of metamaterials for miniaturizing optical cavity, a key component to make lasers, into the nanoscale for the first time. It shows the cavity array which successfully captured light in 20nm dimension and show very high figure of merit experimentally. Last, I will discuss the future direction of the hyperbolic metamaterial and outlook for the practical applications. I believe our efforts in sub-wavelength metamaterials having such extraordinary optical properties will lead to further advanced nanophotonics and nanooptics research.

  • PDF

On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Tscha, Yeong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.213-224
    • /
    • 2009
  • Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).

Application of Transformation Electromagnetics to Cloak Design and Reduction of Radar Cross Section

  • Mittra, Raj;Zhou, Yuda
    • Journal of electromagnetic engineering and science
    • /
    • v.13 no.2
    • /
    • pp.73-85
    • /
    • 2013
  • In this paper we present an alternative approach to addressing the problem of designing cloaks for radar targets, which have been dealt with in the past by using the transformation optics (TO) algorithm. The present design utilizes realistic materials, which can be fabricated in the laboratory, and are wideband as well as relatively insensitive to polarization and incident angle of the incoming wave. The design strategy, presented herein, circumvents the need to use metamaterials for cloak designs that are inherently narrowband, dispersive and highly sensitive to polarization and incident angle. A new interpretation of the TO algorithm is presented and is employed for the design of radar cross section-reducing absorbers for arbitrary targets, and not just for canonical shapes, e.g., cylinders. The topic of performance enhancement of the absorbers by using graphene materials and embedded frequency structure surfaces is briefly mentioned. The design procedure for planar absorbing covers is presented and their performance as wrappers of general objects is discussed. A number of test cases are included as examples to illustrate the application of the proposed design methodology, which is a modification of the classical TO paradigm.

Consideration on the Electromagnetic Wave Absorption Properties of the Plasma for the Stealth Technology (은신기술을 위한 플라즈마의 전자기파 흡수 특성에 대한 고찰)

  • In, S.R.
    • Journal of the Korean Vacuum Society
    • /
    • v.17 no.6
    • /
    • pp.501-510
    • /
    • 2008
  • The stealth technology to conceal an aircraft from the vision of a radar have been accomplished by coating the surface with special paints absorbing the electromagnetic wave. Nowadays, researches to utilize characteristics of the plasma-wave interaction for realizing the stealth technology are actively progressed. In this paper, to investigate the physical feasibility of the plasma stealth, calculation results for the required conditions of the plasma cloaking on the aircraft flying in the air for showing the stealth function, using a flat non-magnetized non-uniform plasma model, are reported and discussed.