• Title/Summary/Keyword: End-to-end security

Search Result 713, Processing Time 0.032 seconds

Fiber Optic Security System based on Multimode Fiber (광파이비를 이용한 침입자 감시시스템)

  • Kim, Y.H.;Kim, I.S.;Park, H.S.;Oh, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 1997.07e
    • /
    • pp.1887-1889
    • /
    • 1997
  • This paper reports the principle, design, configuration, and test results of the fiber optic security system using multimode fiber. In this system, optical fiber works as a sensing element. The length of sensing element may be from several meters to several killometers. Physical principle of this system is the dependence of interferometric pattern on the end of the fiber on mechanical perturbation in the area, where this fiber is situated. Near and far field patterns of the output light for multimode fiber are speckle pattern. A number of speckles on the fiber depends on mode numbers. Light intensity in each point of the fiber end depends on phase difference of modes. Finally we introduced a "Fiber Optic Security System based on Multimode" Fiber which we developed, it may be available in the field of the important area and building.

  • PDF

A Study on the Effective WTLS System Implementation using Low-Computation (낮은 계산량을 이용한 효율적인 WTLS 시스템 구현에 관한 연구)

  • 정우열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.138-143
    • /
    • 2003
  • With information communications and network environments merged wire/wireless networks are generalized. In this viewpoint, WAP is used by communication protocol for the data communication in the field of wireless environment. WTLS developed for the secure communications optimize TLS adapted wireless environment in the TCP/IP internet protocol. But WTLS denote WAP security problem, end-to-end problem, and power consumption, etc. Therefore in this paper we proposed WTLS cryptographic algorithm eliminated WTLS disadvantages. Proposed algorithm solved power consumption, calculated complexity, and security problems because it is not unique but hybrid form.

  • PDF

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Interoperable DRM Framework for Multiple Devices Environment

  • Hwang, Seong-Oun;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.30 no.4
    • /
    • pp.565-575
    • /
    • 2008
  • As networks increase and cross-convergence occurs between various types of devices and communications, there is an increasing demand for interoperable service in the business environment and from end users. In this paper, we investigate interoperability issues in the digital rights management (DRM) and present a practical framework to support interoperability in environments with multiple devices. The proposed architecture enables end users to consume digital content on all their devices without awareness of the underlying DRM schemes or technologies. It also enables DRM service providers to achieve interoperability without costly modification of their DRM schemes.

  • PDF

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

SPRT-based Collaboration Construction for Malware Detection in IoT

  • Jun-Won Ho
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.64-69
    • /
    • 2023
  • We devise a collaboration construction method based on the SPRT (Sequential Probability Ratio Test) for malware detection in IoT. In our method, high-end IoT nodes having capable of detecting malware and generating malware signatures harness the SPRT to give a reward of malware signatures to low-end IoT nodes providing useful data for malware detection in IoT. We evaluate our proposed method through simulation. Our simulation results indicate that the number of malware signatures provided for collaboration is varied in accordance with the threshold for fraction of useful data.

Price Monitoring Automation with Marketing Forecasting Methods

  • Oksana Penkova;Oleksandr Zakharchuk;Ivan Blahun;Alina Berher;Veronika Nechytailo;Andrii Kharenko
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.37-46
    • /
    • 2023
  • The main aim of the article is to solve the problem of automating price monitoring using marketing forecasting methods and Excel functionality under martial law. The study used the method of algorithms, trend analysis, correlation and regression analysis, ANOVA, extrapolation, index method, etc. The importance of monitoring consumer price developments in market pricing at the macro and micro levels is proved. The introduction of a Dummy variable to account for the influence of martial law in market pricing is proposed, both in linear multiple regression modelling and in forecasting the components of the Consumer Price Index. Experimentally, the high reliability of forecasting based on a five-factor linear regression model with a Dummy variable was proved in comparison with a linear trend equation and a four-factor linear regression model. Pessimistic, realistic and optimistic scenarios were developed for forecasting the Consumer Price Index for the situation of the end of the Russian-Ukrainian war until the end of 2023 and separately until the end of 2024.

Survey on the Authentication and Key Management of 802.11s

  • Lam, Jun Huy;Lee, Sang-Gon;Tan, Whye Kit
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

IPTV 컨버전스 환경에서 콘텐츠 보안 기술 동향

  • Nah, Jae-Hoon
    • Review of KIISC
    • /
    • v.19 no.3
    • /
    • pp.18-21
    • /
    • 2009
  • 차세대 IPTV 서비스는 4A (Any-time, Anywhere, Any-device, Any-content)를 특징으로 하는 통방 융합의 서비스이다. 4A서비스는 일반 대중이 자유롭게 콘텐츠의 생성과 소비가 가능하며, 전송환경과 디바이스의 종류에 맞게 안전한 미디어 변환과 콘텐츠의 재사용을 가능하게 한다. 본 고에서는 멀티미디어 보안에 적합한 선택적(Selective)보안의 필요성과 이를 근간으로 하여 End-to-End 보안서비스를 제공하는 Transcodable 보안과 현재까지의 연구동향을 살펴본다.

Design of an End-to-End Home Network Security frame for Heterogeneous System (무선 환경에서의 진동 소음 분석 시스템의 개발)

  • 이지용;류대현;신승중;나종화;김정태;최만림
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.259-262
    • /
    • 2004
  • 본 논문에서는 무선 랜과 시리얼 통신장치를 지원하는 센서들을 활용하여 무선 환경에서 원격으로 진동 및 소음을 계측할 수 있는 유비쿼터스 컴퓨팅 플랫폼을 개발하였다. COTS (Commercial Off The Shelf) 개념을 활용하기 위하여 무선 랜과 시리얼 통신을 지원하는 PDA를 메인보드로 사용하였다. 구현된 플랫폼은 건설용 중장비의 소음을 원격 환경에서 계측하는 응용에 활용하였다.

  • PDF