• Title/Summary/Keyword: Intrusion Sensor

Search Result 93, Processing Time 0.027 seconds

The Intrusion Sensor Using the Variations of Speckle Patterns (스페클 패턴을 이용한 침입자 센서)

  • Eom, Yeon-Sik;Kim, Yo-Hui;Yang, Seung-Guk;O, Sang-Gi;Kim, In-Su;Park, Jae-Hui;Gang, Sin-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.236-241
    • /
    • 2001
  • The speckle pattern is formed by laser light from a multimode optical fiber. The speckle fluctuation is the result of interference among propagation modes when the optical fiber is subjected to a mechanical perturbation at any point along its length. The experiments were carried on for the study of the feasibility of producing an intrusion detection system using the speckle fluctuation. The speckle fluctuation signals were monitored at real time by an oscilloscope which was connected with a rectifier and a FVC. We used a jig as a PD holder to improve the sensitivity of speckle phenomena and simplify its structure. So we can know the time and magnitude of perturbation.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.

Light Propagation in Multimode GRIN(graded-index) Fibers with Intrusion Sensing Capability (침입 감지기능을 가진 다중모드 GRIN(graded-index) 광섬유 내에서의 광파의 전파)

  • Sohn, Young-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.273-278
    • /
    • 2002
  • An intrusion-sensitive capability of multimode graded-index (GRIN) optical fibers under bending has been investigated. In this system, the data light is transmitted in the fundamental mode while alarm monitor light is launched in a high-order mode at the same time. An attempted intrusion to drain data by bending the fiber results in greater attenuation of a monitor signal in higher order modes, thereby setting off an alarm at the receiver. Light propagation in a multimode graded-index fiber is also analyzed theoretically when the fundamental mode is selectively excited and the fiber is bent around a constant radius mandrel. The bending generates coupling between the various modes of the fiber. Power transitions of the fundamental mode by changing the bending radius were also analyzed numerically using program simulation. It is shown that Asawa-Taylor model[4] is valid up to 1cm of the radius of curvature of the fiber bend.

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

A Multi-hop Reservation Method for End-to-End Latency Performance Improvement in Asynchronous MAC-based Wireless Sensor Networks (비동기식 MAC프로토콜 기반의 무선 센서 네트워크에서 단대단 시간 지연 성능 향상을 위한 멀티 홉 예약 기법의 제안)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2638-2647
    • /
    • 2010
  • X-MAC reduces transmission delay and energy consumption by using a short preamble instead of the existing long preamble. To solve the problem of X-MAC, this paper proposes a new MAC protocol called Express-MAC. The wireless sensor network is mainly used for the purpose of gathering event data or situation information. Especially, the transmission pattern of the sensor network with the purpose of event detection such as intrusion detection is very intermittent as well as successively occurring when a single event takes place in most cases. By reflecting sensor network's key transmission patterns as above, EX-MAC has used multi-hub path's path reservation system and awake section's transmission time reservation method in data transmission when the first event takes place. The awake time reservation in transmission path has improved successive data transmission's end-to-end delay, and it has also increased efficiency in terms of energy consumption by reducing the preamble length of data transmission and reception node.

Reliability Improvement of the Electronic Security Fence Using Friction Electricity Sensor by Analyzing Frequency Characteristic of Environmental Noise Signal (환경잡음신호의 주파수특성 분석에 의한 전자보안펜스의 신뢰성 향상)

  • Yun, Seok Jin;Won, Seo Yeon;Kim, Hie Sik;Lee, Young Chul;Jang, Woo Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.173-180
    • /
    • 2015
  • A passive type of fence security system was developed, which was based on electric charge detection technique. The implemented fence security system was installed at outskirts of greenhouse laboratory in the University of Seoul. The purpose of this research is to minimize false alarms by analyzing environmental noise. The existing system determines the intrusion alarm by analyzing the power of amplified signal, but the alarm was seriously affected by natural strong wind and heavy rainfall. The SAU(Signal Analysis Unit) sends input signals to remote server which displays intrusion alarm and stores all the information in database. The environmental noise such as temperature, humidity and wind speed was separately gathered to analyze a correlation with input signal. The input signal was analyzed for frequency characteristic using FFT(Fast Fourier Transform) and the algorithm that differentiate between intrusion alarm and environmental noise signal is improved. The proposed algorithm is applied for the site for one month as the same as the existing algorithm and the false alarm data was gathered and analyzed. The false alarm number was decreased by 98% after new algorithm was applied to the fence. The proposed algorithm improved the reliability at the field regarding environmental noise signal.

Key Pre-distribution using the Quorum System in Wireless Sensor Networks (센서 네트워크에서의 쿼럼 시스템을 이용한 키 사전 분배)

  • Kang Ji-Myung;Lee Sung-Ryeoll;Cho Seong-Ho;Kim Chong-Kwon;Ahn Joung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.193-200
    • /
    • 2006
  • The security feature is essential in wireless sensor network such as intrusion detection or obstacle observation. Sensor nodes must have shared secret between nodes to support security such as privacy. Many methods which provide key pre-distribution need too many keys or support poor security. To solve this problem, probabilistic key pre-distribution is proposed. This method needs a few keys and use probabilistic method to share keys. However, this method does not guarantee key sharing between nodes, and neighbor nodes nay not communicate each other. It leads to waste of network resource such as inefficient routing, extra routing protocol. In this paper, we propose new key distribution method using quorum system which needs a few keys and guarantee key sharing between nodes. We also propose extension of the method which needs fewer keys and guarantee key sharing when node deployment knowledge is well known.

The Design and Implementation of Intruder Access Control System by based of Ubiquitous Sensor Network (USN기반의 외부인 출입감시시스템 설계 및 구현)

  • Lee, Kyu-Su;Sim, Hyeon;Oh, Jai-Cheol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1165-1171
    • /
    • 2012
  • Latest, it is dealt with seriously problems that an intruder kidnapping students in elementary school. Especially young students is more vulnerable in these risks. Elementary School has many limitations in controlling the intrusion of trespassers. A problem occurs that requires a lot of manpower through the deployment and management of security systems such as CCTV and control systems. In this paper, we is designed and implemented the outsider access management system using a sensor network and PZT camera called the USN's core technology to monitoring the access control for controlling the mobility of the trespassers.