• Title/Summary/Keyword: Information and Communications security

Search Result 1,072, Processing Time 0.028 seconds

Spectrum Requirement Estimation for Korean Wireless Communication Network of Public Protection and Disaster Relief Based on ITU-R M.2033 in TETRA-TRS (TETRA-TRS의 ITU-R M.2033 기반 국내 재난안전 무선통신망 주파수 소요량 산출)

  • Lee, Soon-Hwa;Kim, Chang-Bock
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.858-864
    • /
    • 2012
  • In South Korea, to effective and systematic response to disasters, the government will build wireless communication network for PPDR(Public Protection and Disaster Relief) on a national level by 2015. To do it, as MOPAS(Ministry of Public Administration and Security) requested the new frequency assignment for PPDR, KCC(Korea Communications Commission) has been examined new frequency allocations about TETRA and WiBro technologies. In this paper, we were defined the technical parameters, were estimated the spectrum of TETRA-TRS requirements for Korean wireless communication of PPDR based on M.2033 methodology recommended by ITU-R.

Distributed PNC Election Scheme with Guaranteeing QoS in WPANs (WPAN에서 QoS를 보장하는 분산적인 PNC 선출 방법)

  • Jeong, Soon-Gyu;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.133-142
    • /
    • 2007
  • WPANs are formed in relatively small area and a PNC that serves as a central control device plays an important role in the operation and organization of a piconet. Typical applications of WPANs are security system and health monitoring system. In these type of systems, guaranteeing realtime service is very important, and communications cannot take place when the PNC malfunctions. Thus, in this situation, it is necessary to elect a new PNC as soon as possible. For this reason, we propose distributed PNC election scheme that considers not only QoS support but also network connectivity to avoid possible network partition. Simulation results show proposed mechanism can select PNC with guaranteeing QoS and connectivity for a limited period.

Research on Artificial Intelligence Based De-identification Technique of Personal Information Area at Video Data (영상데이터의 개인정보 영역에 대한 인공지능 기반 비식별화 기법 연구)

  • In-Jun Song;Cha-Jong Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.1
    • /
    • pp.19-25
    • /
    • 2024
  • This paper proposes an artificial intelligence-based personal information area object detection optimization method in an embedded system to de-identify personal information in video data. As an object detection optimization method, first, in order to increase the detection rate for personal information areas when detecting objects, a gyro sensor is used to collect the shooting angle of the image data when acquiring the image, and the image data is converted into a horizontal image through the collected shooting angle. Based on this, each learning model was created according to changes in the size of the image resolution of the learning data and changes in the learning method of the learning engine, and the effectiveness of the optimal learning model was selected and evaluated through an experimental method. As a de-identification method, a shuffling-based masking method was used, and double-key-based encryption of the masking information was used to prevent restoration by others. In order to reuse the original image, the original image could be restored through a security key. Through this, we were able to secure security for high personal information areas and improve usability through original image restoration. The research results of this paper are expected to contribute to industrial use of data without personal information leakage and to reducing the cost of personal information protection in industrial fields using video through de-identification of personal information areas included in video data.

A Study on the ASK Communication Modem over Electrical Power Lines (전력선을 이용한 ASK통신 모뎀에 관한 연구)

  • 사공석진;송문규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.9
    • /
    • pp.951-962
    • /
    • 1992
  • The layout of electrical power distribution networks never involved communications aspects. As a result their transmission properties severly complicate the use as data links. Futhermore bandwidth as well as transmission power is restricted. Nevertheless, power distribution net works represent a most attractive medium for digital communication purposes due to an ever increasing demand, e.g., for environment management of buildings, office automation, and remote meter reading or security monitoring. In this paper, a power line modem which is capable of transmitting and receiving data at 1200 bps using OOK-BASK through 220V AC power lines is implemented. The receiver includes noncoherent detector and performs soft decision. The OLM circuits can be simplified by use of microprocessor. The PLM also satisfies CENELEC, European standards, and can be applied to home automation system.

  • PDF

A Design of TINA-based Performance Management Architecture

  • Seoung-Woo Kim;Young-Tak Kim
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1144-1152
    • /
    • 2000
  • In order to guarantee the user-requested quality-of-service(QoS) and keep the network utilization at maximum it is required to manage the network performance continuously after the network installation. The performance management function should provide the useful information for the network expansion and the capacity reallocation in the future. Currently the TINA provides the specification of the management function of configuration management connection management and fault management ; but the management function of performance management and security management are not well-defined yet. In this paper we propose a TINA-based performance management architecture for the efficient performance management of the heterogeneous networks or NEs with TMN and SNMP management functions. And we examine the proposed architecture into the ATM network (with SNMP and TMN) monitoring. The proposed architecture is based on the distributed processing architecture and the concept the TMN perfo mance management. The proposed architecture have been designed and implemented in multiprocess and multithread structure.

  • PDF

Efficient Post-Processing for Quantum Communication Systems (양자 통신 시스템의 효율적 후처리 방식)

  • Lee, Sun Yui;Jung, Kuk Hyun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • Quantum cryptography is one of the most feasible fields using quantum mechanics. Therefore, quantum cryptography has consistently been researched, and a variety of cryptographic exchange method has been developed, such as BB84, etc. This paper explains a basic concept of quantum communications and quantum key distribution systems using quantum mechanics. Also, it introduces a reason of the development of quantum cryptography and attack scenarios which threaten the security of QKD. Finally, the experiment of this paper simulates quantum key attack by estimating qubit phases through a modeled quantum channel, and discusses needs of post-processing methods for overcoming eavesdropping.

A ROI Image Encryption Algorithm Based on Cellular Automata in Real-Time Data Transmission Environment (실시간 데이터 전송 환경에서의 셀룰러 오토마타 기반의 ROI 이미지 암호 알고리즘)

  • Un-Sook Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1117-1124
    • /
    • 2023
  • The security of information, including image content, is an essential part of today's communications technology and is critical to secure transmission. In this paper, a new ROI-based image encryption algorithm is proposed that can quickly encrypt images with a security level suitable for environments that require real-time data transmission for images containing sensitive information such as ID cards. The proposed algorithm is based on one dimensional 5-neighbor cellular automata, which can be implemented in hardware and performed hardware-friendly operations. Various experiments and analyses are performed to verify whether the proposed encryption algorithm is safe from various brute-force attacks.

SDR Adaptation for Multimode Maritime Wireless Communications (다중모드 해상 무선통신 지원을 위한 SDR 적용 방안)

  • Kim, Jae-Myoung;Lee, Joa-Hyoung;Shim, Woo-Seong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.173-176
    • /
    • 2011
  • New paradigm is based on the e-navigation policy which is the harmonised collection, integration, exchange, presentation and analysis of maritime information onboard and ashore by electronic means to enhance berth to berth navigation and related services, for safety and security at sea and protection of the marine environment. One of the requirements is seamless communications between various communication systems. So we need the maritime wireless communications based on the SDR technology. In this paper we analyse characteristics and issues of maritime wireless communication technology and service framework and propose a SDR based maritime system platform which can operate in multi-mode.

  • PDF

Implementation of Stable Optical Information Security System using Interference-based Computer Generated Hologram iud $BaTiO_3$ (간섭을 기반으로한 컴퓨터형성홀로그램과 $BaTiO_3$를 이용한 안정한 광 정보보호 시스템의 구현)

  • 김철수;김종윤;박영호;김수중;조창섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8C
    • /
    • pp.827-834
    • /
    • 2003
  • In this paper, we implemented an optical information security system using computer generated hologram based on the principle of interference and BaTiO$_3$that is photorefractive material. First of all, we would generate binary phase hologram which can reconstruct the original image perfectly, and regard this hologram as the image to be encrypted. And then applying the interference rule to the hologram, encrypted and reference (fkey information) images are generated. In the decrypting process, we can get an interference intensity by interfering the reference image and the encrypted image in the Mach-Zehnder interferometer. and transforming interference intensity information into phase information using LCD(liquid crystal display) and finally recover original image by inverse Fourier transforming the phase information. In this process, the Intensity information generated by interference of two images is very sensitive to external vibrations. So, we get a stable interference using the characteristic of SPPCM(self pumped phase conjugate mirror) of BaTiO$_3$that is photorefractive material. The proposed method has an advantage of double image encryption by encrypting the hologram of the image instead of original image.

Key Distribution for Heterogeneous Public-Key Cryptosystems

  • Lv, Xixiang;Yi, Mu;Hui, Li
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.464-468
    • /
    • 2013
  • The widespread use of cryptographic technologies is complicated by inconsistencies and duplication in the key management systems supporting their applications. The proliferation of key management systems or protocols also results in higher operational and infrastructure costs, and fails in interoperability. Thus, it is essential to realize key management interoperability between different and heterogeneous cryptosystems. This paper presents a practical and separable key management system for heterogeneous public-key cryptosystems. We achieve the interoperability between different cryptosystems via cryptography approaches rather than communication protocols. With our scheme, each client can freely use any kind of cryptosystemthat it likes. The proposed scheme has two advantages over the key management interoperability protocol introduced by the organization for the advancement of structured information standards. One is that all the related operations do not involve the communication protocol and thus no special restrictions are taken on the client devices. The other is that the proposed scheme does not suffer from single-point fault and bottleneck problems.