• Title/Summary/Keyword: FI Security

Search Result 118, Processing Time 0.022 seconds

Performance Comparison of Autoencoder based OFDM Communication System with Wi-Fi

  • Shiho Oshiro;Takao Toma;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.172-178
    • /
    • 2023
  • In this paper, performance of autoencoder based OFDM communication systems is compared with IEEE 802.11a Wireless Lan System (Wi-Fi). The proposed autoencoder based OFDM system is composed of the following steps. First, one sub-carrier's transmitter - channel - receiver system is created by autoencoder. Then learning process of the one sub-carrier autoencoder generates constellation map. Secondly, using the plural sub-carrier autoencoder systems, parallel bundle is configured with inserting IFFT and FFT before and after the channel to configure OFDM system. Finally, the receiver part of the OFDM communication system was updated by re-learning process for adapting channel condition such as multipath channel. For performance comparison, IEEE802.11a and the proposed autoencoder based OFDM system are compared. For channel estimation, Wi-Fi uses initial long preamble to measure channel condition. but Autoencoder needs re-learning process to create an equalizer which compensate a distortion caused by the transmission channel. Therefore, this autoencoder based system has basic advantage to the Wi-Fi system. For the comparison of the system, additive random noise and 2-wave and 4-wave multipaths are assumed in the transmission path with no inter-symbol interference. A simulation was performed to compare the conventional type and the autoencoder. As a result of the simulation, the autoencoder properly generated automatic constellations with QPSK, 16QAM, and 64QAM. In the previous simulation, the received data was relearned, thus the performance was poor, but the performance improved by making the initial value of reception a random number. A function equivalent to an equalizer for multipath channels has been realized in OFDM systems. As a future task, there is not include error correction at this time, we plan to make further improvements by incorporating error correction in the future.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

Wi-Fi Access Scheme using Restricted Access in Smart Device Environment (스마트기기 환경에서 제한된 접근 방식을 이용한 WI-FI 접속 기법)

  • Park, Sang-Hyeon;Park, Jung-Oh;Park, Chan-Kil;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.821-823
    • /
    • 2015
  • 우리나라에서 어딜 가든 WI-FI를 이용해 네트워크에 접속할 수 있는 환경이 되었다. 하지만 rogue AP로 인한 모바일 기기들의 좀비화, 개인정보 유출, BYOD환경으로 인한 회사의 자료유출까지 다양한 정보들을 보호하고 모바일 기기의 해킹가능성을 줄여야 한다. 본 논문에서는 접속 AP정보와 GPS기반 위치정보를 신뢰 테이블에 등록해 이동 중에는 신뢰테이블 외 신호는 사용자의 확인을 거쳐 rogue AP에 자동접속 되어 기기가 감염되거나, 개인정보가 유출되는 일을 방지하기 위한 방법을 제안한다.

Implementation Wireless Internet Security Connection System Using Bluetooth Beacon in Smart Factory (블루투스 비컨을 사용한 스마트 팩토리에서의 무선인터넷 보안 연결 시스템 구현)

  • Jang, Yun Seong;Shin, Soo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1705-1713
    • /
    • 2018
  • It is currently undergoing the fourth industrial revolution, which is the convergence of ICT and manufacturing, connecting both industrial equipment and production processes to one network and communicating with each other. The fact that they are connected to one network has the advantage of management, but there is a risk of security. In particular, Wi-Fi can be easily accessed by outsiders through a software change of the MAC address or password exposures. In this paper, by applying the method of Beacon using a Bluetooth Low Energy Add in Bluetooth 4.0, we propose a system of black-box approach to secure connections to wireless Internet, users do not have to know the password. We also implemented the proposed system using the raspberry pi and verified the effectiveness of a real-time system by testing the communication.

PS-Net : Personalized Secure Wi-Fi Networks (PS-Net : 개인별 보안 Wi-Fi 네트워크)

  • Lee, Nam-Seh;Lee, Ju-Ho;Jeong, Choong-Kyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.497-505
    • /
    • 2015
  • Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.

Smartphone Content Security Scheme for Protect Malware Attacks (멀웨이 공격을 예방하기 위한 스마트폰 콘텐츠 보호 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.327-333
    • /
    • 2014
  • Recently, smartphone are increasing in Internet-enabled applications to install and delete benefits as well as internet through various interfaces such as 3G network, Wi-Fi, Wibro without the constraints of time and place. However, the prevalence of smartphones and the activity was generated from an existing PC smartphone security threats are causing a ripple in a society. In this paper, we serve live content services on the first and last content by creating an electronic signature is the signature of either the loss of any Content provided by both authentication and non-repudiation content protection scheme is proposed. The proposed method of secure smartphone users to download and install the content or an application for downloading content over the content for secure authentication.

Secure Group Key Agreement for IoT Environment (사물인터넷(IoT) 환경을 위한 안전한 그룹 키 관리 기법)

  • Lee, Su-Yeon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.121-127
    • /
    • 2016
  • Recently, the popularity of smart devices such as Wi-Fi and LTE has increased the use ratio of wireless dramatically. On the other hand, the use ratio of wired internet is decreasing. The IoT(Internet of Things) is not only for people but also for communication between people and things, and communication between things and things by connecting to a wireless without choosing a place. Along with the rapid spread of the IoT there is a growing concern about the threat of IoT security. In this paper, the proposed scheme is a efficiency group key agreement in IoT environment that guarantees secure communication among light-weight devices. The proposed scheme securely be able to communication with the group devices who share a group key, generated by own secret value and the public value. Such property is suitable to the environment which are required a local area and a group.

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.

A study on the analysis of bus public Wi-Fi security access trends (버스 공공와이파이 보안 접속 동향 분석에 관한 연구)

  • Choi, Hong-Ju
    • Design & Manufacturing
    • /
    • v.15 no.4
    • /
    • pp.14-23
    • /
    • 2021
  • In this study, we have analyzed the access status and the data usage trend of the public Wi-Fi on the bus, which has not been carried out in the previous studies. The analysis period of this study is 5 months from Nov. 2020 to Mar. 2021. When we compared the access status of Seoul metropolitan and the non-metropolitan region against each region's deployment status ratio, the access ratio of the metropolitan region was higher than the non-metropolitan region, of which the gap was 4.53%. The access for each region showed the growing trend, which was 43.5% on average. The data usage also showed the growing trend, 2.7% on average. Weekly data usage showed the growing trend irrespective of weekdays or weekends. The data usage of the weekdays was 695GB higher than weekends. The data usage during commuting hours including school (7:00~9:00 a.m. and 4:00~6:00 p.m.) was higher than 3,000GB. We can conclude that bus public Wi-Fi was used more actively in non-metropolitan region than Seoul metropolitan region by the office workers and students. The secure access also showed the growing trend. And the secure data usage also showed the growing trend.

A Study of Wired and wireless VoIP vulnerability analysis and hacking attacks and security (유무선 VoIP 취약점 분석과 해킹공격 및 보안 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.737-744
    • /
    • 2012
  • Recently VoIP has provided voice(both wired and wireless from IP-based) as well as the transmission of multimedia information. VoIP used All-IP type, Gateway type, mVoIP etc. Wired and wireless VoIP has security vulnerabilities that VoIP call control signals, illegal eavesdropping, service misuse attacks, denial of service attack, as well as wireless vulnerabilities etc. from WiFi Zone. Therefore, the analysis of security vulnerabilities in wired and wireless VoIP and hacking incidents on security measures for research and study is needed. In this paper, VoIP (All-IP type, and for Gateway type) for system and network scanning, and, IP Phone to get the information and analysis of the vulnerability. All-IP type and Gateway type discovered about the vulnerability of VoIP hacking attacks (Denial of Service attacks, VoIP spam attacks) is carried out. And that is a real VoIP system installed and operated in the field of security measures through research and analysis is proposed.