• Title/Summary/Keyword: Key Exchange System

Search Result 228, Processing Time 0.038 seconds

Applying Security Algorithms using Authentication Against Cyber Attacks in DAS Communication Network (배전자동화 시스템 통신망에 대한 사이버 공격에 대해 인증의 기법을 이용한 보안 알고리즘 적용방안)

  • Lim, Il-Hyung;Choi, Myeon-Song;Lee, Seung-Jae;Lim, Seong-Il;Lee, Sung-Woo;Ha, Bok-Nam;Hong, Sug-Won
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.327-335
    • /
    • 2008
  • As communication is becoming increasingly prevalent and especially communication architecture is more relying on the open standard communication protocols, the security issues become major concerns. In this paper we consider possible cyber attacks in the applications based on the current distribution communication architecture, and then derive the security goals. Next we propose how the security algorithms can be adapted to achieve these security goals. We intend to adapt the most efficient ways of secure message exchange, taking the resource-constrained FRTUs into account Finally we show some experiments to validate the protocols.

A Study on the Fairy tale Narration System with Key-word Exchange (맞춤형 동화구연 시스템구연에 관한 연구)

  • Park, Won;Bae, Myung-Jin
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.819-822
    • /
    • 2000
  • 최근 유아기 아이들을 위한 교육매체의 발달로 각종 CD-ROM이나 테이프 등에서 성우의 목소리로 동화를 읽어주는 시스템이 많이 나와 있고, 또한 Web Book이 점차적으로 보편화가 되 가고 있다. 하지만 이런 획일적이고 균일화된 매체들은 아이들에게 금새 실증을 내게 하기 때문에 흥미 유발을 위해 동화의 주인공을 자기자신이나 친근한 사람의 이름 등으로 바꾸어 발성해 준다면 더욱 친근감 있게 받아들일 것이다. 본 논문에서는 기존의 성우가 발성하는 동화의 주인공 이름을 Test화자가 새로운 이름으로 발성을 해주면 기존 성우의 목소리패턴으로 바꾸어 동화를 읽어주는 시스템에 대해서 제안하고자 한다. 우선 Test화자가 발성한 목소리를 성우의 목소리로 바꾸어 주기 위해서 기존의 성우가 발성한 동화주인공 이름과 Test화자가 발성한 이름과의 운율패턴을 비교하여 성우의 운율패턴에 일치시키고 성우의 목소리 패턴으로 변경된 새로운 주인공의 이름만을 기존의 동화 DB에 삽입하였다. 또한 에너지 패턴조절은 기존의 성우가 발성한 기준패턴에 근사화 시켰고 끝점을 스므딩 시킴으로써 자연스런 발성이 되게 만들어주었다. 결과적으로 Mos Score가 3.873로 비교적 좋은 결과를 얻을 수 있었다.

  • PDF

3-Dimensional Concurrent Geometric Modeling on High Speed Network (초고속 통신망상에서 3차원 동시 형상 설계)

  • 정운용;한순흥
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.141-157
    • /
    • 1996
  • Data sharing is a major challenge to implement CALS. STEP is the international standard for the product model data exchange among heterogeneous systems and plays a key role in CALS. Advances in computer networks are rapidly changing the product development processes. The network oriented modeling system premises to integrate design activities across the enterprise. To achieve goals of CALS 3-dimensional concurrent modeling that complies international standard is required since integrity and common perception of product data can be assured. This paper presents 3-dimensional concurrent geometric modeling on high speed network using STEP and methodologies.

  • PDF

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.

Robot Gesture Reconition System based on PCA algorithm (PCA 알고리즘 기반의 로봇 제스처 인식 시스템)

  • Youk, Yui-Su;Kim, Seung-Young;Kim, Sung-Ho
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.400-402
    • /
    • 2008
  • The human-computer interaction technology (HCI) that has played an important role in the exchange of information between human being and computer belongs to a key field for information technology. Recently, control studies through which robots and control devices are controlled by using the movements of a person's body or hands without using conventional input devices such as keyboard and mouse, have been going only in diverse aspects, and their importance has been steadily increasing. This study is proposing a recognition method of user's gestures by applying measurements from an acceleration sensor to the PCA algorithm.

  • PDF

A Security Communication Protocol between CA and Vehicle for WAVE System (WAVE 시스템 환경에서 CA와 차량간 보안통신 프로토콜)

  • Seo, Dong-Won;Park, Seung-Peom;Ahn, Jae-Won;Kim, Eun-Gi
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.416-418
    • /
    • 2014
  • WAVE (Wireless Access in Vehicular Environments) 시스템 환경은 차량 간 무선통신을 가능하게 해주는 환경이다. 무선통신의 활용이 증가하면서 그에 따른 공격 방법도 증가하여, 통신 시 제3자에 의해 패킷이 변조될 수 있다. 제3자로부터 패킷을 보호하기 위해 통신 전 차량은 CA (Certificate Authority)로부터 자신이 적합한 호스트라는 것을 인증 받아야 한다. 본 논문에서는 차량과 CA의 통신 과정에서 Diffie-Hellman Key Exchange 알고리즘과 AES (Advanced Encryption Standard) 알고리즘 등을 이용하여 패킷의 기밀성과 무결성을 보장하는 프로토콜을 설계하였다.

A Design of DRM System Key Exchange Mechanism (DRM 보안 강화를 위한 키 교환 메커니즘 설계)

  • Lim, Hun-Jung;Jung, Sung-Min;Eom, Jeong-Ho;chung, Tae-Myeong
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1059-1062
    • /
    • 2010
  • 최근 전자 문서 및 콘텐츠 보호를 위하여 디지털 저작권 관리 시스템에 대한 연구 및 개발이 활발히 진행 되고 있다. 본 논문에서는 기존에 개발된 단순 메시지 암호화 단계의 디지털 저작권 관리 시스템 보안 기능상 문제점을 파악하고 보안 요구사항을 만족하기 위하여 마스터키 생성, 공개키 교환, 공유키 공유, 세션키 생성의 네 단계의 키 교환 단계를 설계하고 설계된 키 교환 메커니즘이 충족 시키는 보안 기능에 대하여 정리 하였다.

A data security transmission system and method based on key exchange encryption protocol (키 교환 암호 프로토콜 기반 데이터 보안 전송 시스템 및 방법)

  • Jaekyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.423-424
    • /
    • 2024
  • 본 논문은 TCP/IP 네트워크 및 암호 프로토콜을 결합하여 CCTV 카메라 영상 데이터를 안전하게 전송하는 시스템에 관한 것이다. 특히, TCP Handshake에서 암호 키를 교환하고, 디바이스의 시그니처 정보를 활용하여 키를 생성하는 키 교환 암호 프로토콜을 도입한다. 이를 통해 CCTV 카메라의 영상 데이터를 암호화하여 전송하고, 수신 시 복호화하여 저장한다. 또한, 적어도 하나 이상의 CCTV 카메라에 대한 보안 인증과 네트워크 연결 상태를 제어하며, 중간자 공격을 방지하기 위한 안전한 키 교환을 수행한다. 이로써 안전성이 강화된 CCTV 카메라 시스템을 제공할 수 있다.

  • PDF

Noisy Weighted Data Aggregation for Smart Meter Privacy System (스마트 미터 프라이버시 시스템을 위한 잡음 가중치 데이터 집계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.49-59
    • /
    • 2018
  • Smart grid system has been deployed fast despite of legal, business and technology problems in many countries. One important problem in deploying the smart grid system is to protect private smart meter readings from the unbelievable parties while the major smart meter functions are untouched. Privacy-preserving involves some challenges such as hardware limitations, secure cryptographic schemes and secure signal processing. In this paper, we focused particularly on the smart meter reading aggregation,which is the major research field in the smart meter privacy-preserving. We suggest a noisy weighted aggregation scheme to guarantee differential privacy. The noisy weighted values are generated in such a way that their product is one and are used for making the veiled measurements. In case that a Diffie-Hellman generator is applied to obtain the noisy weighted values, the noisy values are transformed in such a way that their sum is zero. The advantage of Diffie and Hellman group is usually to use 512 bits. Thus, compared to Paillier cryptosystem series which relies on very large key sizes, a significant performance can be obtained.

A Review on SEBS Block Copolymer based Anion Exchange Membranes for Water Electrolysis (SEBS 블록 공중합체를 기반으로 한 수전해용 음이온 교환막에 대한 총설)

  • Kim, Ji Eun;Park, Hyeonjung;Choi, Yong Woo;Lee, Jae Hun
    • Membrane Journal
    • /
    • v.32 no.5
    • /
    • pp.283-291
    • /
    • 2022
  • Hydrogen energy has received much attention as a solution to the supply of renewable energy and to respond to climate change. Hydrogen is the most suitable candidate of storing unused electric power in a large-capacity long cycle. Among the technologies for producing hydrogen, water electrolysis is known as an eco-friendly hydrogen production technology that produces hydrogen without carbon dioxide generation by water splitting reaction. Membranes in water electrolysis system physically separate the anode and the cathode, but also prevent mixing of generated hydrogen and oxygen gases and facilitate ion transfer to complete circuit. In particular, the key to next-generation anion exchange membrane that can compensate for the shortcomings of conventional water electrolysis technologies is to develop high performance anion exchange membrane. Many studies are conducted to have high ion conductivity and excellent durability in an alkaline environment simultaneously, and various materials are being searched. In this review, we will discuss the research trends and points to move forward by looking at the research on anion exchange membranes based on commercial polystyrene-b-poly(ethylene-co-butylene)-b-polystyrene (SEBS) block copolymers.