• Title/Summary/Keyword: Environment surveillance network

Search Result 89, Processing Time 0.027 seconds

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Improvement of LECEEP Protocol through Dual Chain Configuration in WSN Environment(A-LECEEP, Advanced LEACH based Chaining Energy Efficient Protocol) (WSN 환경에서 이중체인 구성을 통한 LECEEP 프로토콜 개선(A-LECEEP))

  • Kim, Chanhyuk;Kwon, Taewook
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1068-1075
    • /
    • 2021
  • Wireless sensor network (WSN) can be usefully used in battlefields requiring rapid installation and operation by enabling surveillance and reconnaissance using small sensors in areas where any existing network infrastructure is not formed. As WSN uses battery, energy efficiency acts as a very important issue in network survivability. Layer-based routing protocols have been studied a lot in the aspect of energy efficiency. Many research selected LEACH and PEGASIS protocols as their comparison targets. This study examines the two protocols and LECEEP, a protocol designed by combining their advantages, and proposes a new protocol, A-LECEEP, which is more energy efficient than the others. The proposed protocol can increase energy efficiency compared to the existing ones by eliminating unnecessary transmissions with multiple chains configuration.

Environment Monitoring System Using RF Sensor (RF 센서를 이용한 해양 환경 관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.896-898
    • /
    • 2012
  • Recently, many countries are making efforts for the development of ocean resources because the necessity and importance of the ocean resources are increased. Underwater sensor networks have emerged as a very powerful technique for many applications, including monitoring, measurement, surveillance and control and envisioned to enable applications for oceanographic data collection, ocean sampling, environmental and pollution monitoring, offshore exploration, disaster prevention, tsunami and seaquake warning, assisted navigation, distributed tactical surveillance, and mine reconnaissance. The idea of applying sensor networks into underwater environments (i.e., forming underwater sensor networks) has received increasing interests in monitoring aquatic environments for scientific, environmental, commercial, safety, and military reasons. The data obtained by observing around the environment are wireless-transmitted by a radio set with various waves. According to the technical development of the medium set, some parameters restricted in observing the ocean have been gradually developed with the solution of power, distance, and corrosion and watertight by the seawater. The actual matters such as variety of required data, real-time observation, and data transmission, however, have not enough been improved just as various telecommunication systems on the land. In this paper, a wireless management system will be studied through a setup of wireless network available at fishery around the coast, real-time environmental observation with RF sensor, and data collection by a sensing device at the coastal areas.

  • PDF

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

USN Environmental Gas Sensing System using Quad Rotor (초소형 비행체 Quad Rotor를 이용한 USN 환경 가스 센싱 시스템)

  • Lee, Byung-Seok;Lee, Joon-Hwa;Kim, Gyu-Sik;Kim, Jo-Chun
    • Proceedings of the KIEE Conference
    • /
    • 2008.04a
    • /
    • pp.45-46
    • /
    • 2008
  • There are various polluting emissions related to the air quality such as $NO_x$, $CO_2$, CO, VOCs, $O_3$, $SO_2$, $CH_4$, $H_2S$, $NH_3$, etc. We need the system that reduces emission of these environment gases and detects risk factors in modern society. Therefore, if we use the USN(Ubiquitous Sensor Network) technology and a MAV(Micro Air Vehicle) Quad Rotor which can be hovering and moving free for setting up the environment gas sensing system, the realtime measurement on environment gases is facilitated and by extension, in application of traffic watchdog, forest fire surveillance and counter-terrorism efforts, we anticipate making better use of a Quad Rotor.

  • PDF

Custody Transfer of Bundle layer in Security Mechanism for Under water Inter net of Things (UIoT)

  • Urunov, Khamdamboy;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.506-523
    • /
    • 2015
  • The intent is to determine whether or not the custody transfer is helpful for data transmission in challenging underwater communications when running Bundle protocol or underwater protocols. From the point of view defending side, Underwater Acoustic Network (UAN) will be a serious threat for its strong functionality long rang and high precision of surveillance and detection. Therefore, countermeasures must be taken to weaken its effect. Our purpose is analyzed that how to benefit from the UIoT to learn from, exploit and preserve the natural underwater resources. Delay/Disruption Tolerant Network (DTN) is essential part of the network heterogeneity communication network. The vulnerability and potential security factors of UIoT are studied thereafter. Security mechanisms for an underwater environment are difficult to apply owing to the limited bandwidth. Therefore, for underwater security, appropriate security mechanisms and security requirements must be defined simultaneously. The paper consists of mathematical and security model. Most important point of view in the security challenges of effective Buffer and Storage management in DTN.

Improvement of Security Management Model for a High Speed Information Network (초고속 정보망의 보안관리모델 개선방안)

  • Seo Jeong-Eun;Kim Yoon-Ho;Choi Se-Ha
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.4
    • /
    • pp.71-77
    • /
    • 2003
  • Security system in internet as well as the performance in information network became more important as the internet environment is getting popular and complicate. In this study, the security system (Firewall and IDS) was installed in high speed information network and analyzed for a change in the speed of data transfer and the possibility of invasion. The selection of appropriate system, efficient detection and protection and surveillance method were suggested and analyzed In order to do experiments, an experimental model was com prized to analyze the parameters that was affected by the detection and protection system in network. This will give a standard how much we can pull up the security system maintaining the network speed.

  • PDF

An Energy and Coverage Efficient Clustering Method for Wireless Sensor Network (무선 센서 네트워크를 위한 효율적인 에너지와 커버리지 클러스터링 방법)

  • Gong, Ji;Zhang, Kai;Kim, Seung-Hae;Cho, Gi-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.261-262
    • /
    • 2008
  • Due to technological advances, the manufacturing of small and low cost of sensors becomes technically and economically feasible. In recent years, an increasing interest in using Wireless Sensor Network (WSN) in various applications, including large scale environment monitoring, battle field surveillance, security management and location tracking. In these applications, hundreds of sensor nodes are left to be unattended to report monitored data to users. Since sensor nodes are placed randomly and sometimes are deployed in underwater. It is impossible to replace batteries often when batteries run out. Therefore, reducing energy consumption is the most important design consideration for sensor networks.

  • PDF

A Multi-hop OFDM Frame Structure for Short-Range Underwater Acoustic Communication Networks

  • Yu, HaiFeng;Kim, Woon;Chang, KyungHi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.809-811
    • /
    • 2015
  • In this paper, for the purpose of providing high data rate services, the multi-hop frame structure is designed for the underwater acoustic (UWA) short-range system which is proposed as a part of ocean surveillance and tracking network (OSTN). Under the measured underwater channel environment, the link-level system performance are also evaluated. Simulation results show not only the packet error rate (PER) comparisons, but the optimal modulation and coding scheme (MCS) levels for the orthogonal frequency division multiplexing (OFDM) based short-range UWA communications network.