• Title/Summary/Keyword: Device Network

Search Result 2,404, Processing Time 0.03 seconds

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

USN-based Water Treatment Plant Facilities Data Management Techniques and Reliability (USN 기반 수직형 정수처리시설 데이터 최적관리 및 신뢰성 검증연구)

  • Jang, Sang-Bok;Shin, Gang-Wook;Hong, Sung-Taek;Lee, An-Kyu;Park, Hye-Mi;Chun, Myung-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2736-2744
    • /
    • 2013
  • In this paper, we present a Smart Water Treatment Plant using Zigbee USN devices and a real-time monitoring system in K-water Flow Meter Calibration Center Building. For verification, the data of vertical type WTP such as flow rate, pressure, water level and water temperature are obtained by the Zigbee USN devices, operating in 2.45 GHz band, and be wirelessly surveilled by the real-time monitoring system. The received data from the sensor is transmitted to the data processing device, and then the processed data can be monitored on a smart phone. Consequently, the pilot plant based on the low-cost and high-efficiency USN has been developed with the performance analysis for the communication network and remote monitoring system on mobile devices.

The design of Smart flowerpot management system (스마트 화분관리 시스템 설계)

  • Jeon, Pil-kyeong;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.133-135
    • /
    • 2015
  • This paper is about the design of flowerpot management system which allows you to manage the flowerpot more efficiently and conveniently using Internet of Things when you start to grow plants. IoT connects all things to the network to provide various services to users, it has recently been focused on the center of the IT convergence techniques. So by using the realization sensor based IoT technology the need for research and development of IoT technologies were designed for the system. Basically, Device is using soil humidity sensor and Arduino, Android smart phone and smart light bulb. Transmit the humidity value of the flowerpot that measured by the sensor in a wireless communication, by controlling the state according to the value of the humidity, users can be provided a visual information and set up a flowerpot management and plan.

  • PDF

An Effective Frequency Sharing Method using Spectrum Etiquette and Genetic Algorithm for the Coexistence of WRAN and WLAN in TV White Space (TVWS에서 스펙트럼 에티켓 및 GA를 사용한 WRAN과 WLAN의 효율적 주파수 공유기법)

  • Jeong, Won-Sik;Jang, Sung-Jeen;Yong, Seulbaro;Kim, Jae-Moung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2A
    • /
    • pp.83-94
    • /
    • 2012
  • Various wireless communication devices or network such as WRAN and WLAN will coexist in the TVWS(TV White Space). Because of this coexistence, the wireless devices which use the TVWS have to avoid interfering to not only licensed TV receiver and wireless microphone but also homogeneous or heterogeneous TVBD(TV Band Device)s. In this paper, we propose two frequency sharing methods for the coexistence of WLAN and WRAN in terms of interference reduction and throughput enhancement in both homogeneous and heterogeneous networks. One is the WRAN spectrum etiquette to provide more wide bandwidth for WLAN users and the other is the WLAN frequency selection methods to improve the throughput performance. The simulation results have confirmed the throughput improvement of the proposed methods. Moreover, the proposed methods is also applicable to improve the throughput performance and reduce interference of similar systems working in a cognitive manner.

Dynamic Allocation of Channel Times based on Link Quality of HR-WPAN (HR-WPAN에서 링크 상태에 따른 동적 채널 타임 할당 기법)

  • Kang, Jae-Eun;Byun, Sung-Won;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.264-273
    • /
    • 2009
  • For IEEE 802.15.3 HR-WPAN, we propose the DABL algorithm that PNC can allocate the channel times to the DEV in super frame in order that system frame throughput is increased and the delay is decreased. In detail, the DABL algorithm allows to dynamically allocate channel time as well as to adaptively apply the modulation and coding scheme based on the link quality of the DEV. In addition, due to the facts that QoS is quite different depending on service types, we provide the DABL algorithm taking into account RT(Real Time) traffic and Non-RT traffic respectively. Finally, we show simulation results of the DABL algorithm compared to the conventional algorithm that the PNC equally allocates channel times to the DEV regardless of the link quality of the DEV.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

The Development of Hemodialysis System Based on Embedded System (임베디드 시스템 기반의 혈액 투석기 시스템의 개발)

  • Ji, Jung-Ho;Lee, Kyoung-Joung;Kim, Young-Ho;Park, Kwang-Li
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.11
    • /
    • pp.521-527
    • /
    • 2002
  • The Hemodialysis system is the device for the patients who have suffered from end stage renal failure as the kidney which removes the waste products in a human body. The existing hemodialysis is based on a 8-bit micro-controller and it is not a touch-screen type but a manual type. This paper is focused on hemodialysis system based on high control and expension embedded system. The whole system consists of main control unit and sub control unit(dialysis control unit, blood control unit, monitoring control unit, networking unit). The dialysis control unit, blood control unit, monitoring control unit are processed by 3 microcontrollers and network unit is for monitoring a renal failure patient's condition. For the evaluation of the system performance, the saline was pured into blood unit and then water removal rate, conductivity and temperature of hemodialysis liquid were measured 10 times in an each state suing the UF pump in the fluid unit varing the quantity of saline to 1000cc, 2000cc, 3000cc and 4000cc. As a result, the rates of water removal are 98.6% in condition of 000cc saline, 96.9% in 2000cc, 98.9% in 3000cc and 98.3% in 4000cc. The conductivities of hemodialysis liquid are 99.6% in the first to third condition and 99.7% in the forth condition. The temperatures of hemodialysis liquid are 99.8% in the first to third condition and 99.6% in th forth condition.

A Study on the Real-time Cyber Attack Intrusion Detection Method (실시간 사이버 공격 침해사고 탐지방법에 관한 연구)

  • Choi, Jae-Hyun;Lee, Hoo-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.55-62
    • /
    • 2018
  • Recently, as the threat of cyber crime increases, the importance of security control to cope with cyber attacks on the information systems in the first place such as real-time detection is increasing. In the name of security control center, cyber terror response center and infringement response center, institutional control personnel are making efforts to prevent cyber attacks. Especially, we are detecting infringement accident by using network security equipment or utilizing control system, but it's not enough to prevent infringement accident by just controlling based on device-driven simple patterns. Therefore, the security control system is continuously being upgraded, and the development and research on the detection method are being actively carried out by the prevention activity against the threat of infringement. In this paper, we have defined the method of detecting infringement of major component module in order to improve the problem of existing infringement detection method. Through the performance tests for each module, we propose measures for effective security control and study effective infringement threat detection method by upgrading the control system using Security Information Event Management (SIEM).

Chaos Based Random Number Generation In Tiny MCU (소형마이콤에서의 카오스난수 발생 함수구현)

  • Hyun, Jae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.47 no.3
    • /
    • pp.1-4
    • /
    • 2010
  • RS-485, communication bases from small network system must prepare in collision. The collision is that mean the data transfer breaks. For a stabilized communication chooses 1:N polling methods. But polling is low speed in addition to maybe overload Master device. So, usual N:N Prefers a communication. In this case, must be preparing to avoid collision or some solutions. Generally, to after collision retransmits after short time. It's called delay time for short time. When making a delay time, uses address of each systems. (Address of each node) If the many nodes collided, the each node has different delay time. When making a delay time, uses a usual random number. Making a random number is hard job. So uses a usual pseudorandom number. It is more difficult from small size MCU. The Chaos random number provides stabled value. Finally, when uses the Chaos random number, the stability and reliability of system get better.