• Title/Summary/Keyword: LTE Security

Search Result 67, Processing Time 0.042 seconds

Probability-based IoT management model using blockchain to expand multilayered networks (블록체인을 이용하여 다층 네트워크를 확장한 확률 기반의 IoT 관리 모델)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2020
  • Interest in 5G communication security has been growing recently amid growing expectations for 5G technology with faster speed and stability than LTE. However, 5G has so far included disparate areas, so it has not yet fully supported the issues of security. This paper proposes a blockchain-based IoT management model in order to efficiently provide the authentication of users using IoT in 5G In order to efficiently fuse the authentication of IoT users with probabilistic theory and physical structure, the proposed model uses two random keys in reverse direction at different layers so that two-way authentication is achieved by the managers of layers and layers. The proposed model applied blockchain between grouped IoT devices by assigning weights to layer information of IoT information after certification of IoT users in 5G environment is stratified on a probabilistic basis. In particular, the proposed model has better functions than the existing blockchain because it divides the IoT network into layered, multi-layered networks.

Home Security System Based on IoT (IoT 기반 홈 보안 시스템)

  • Kim, Kang-Chul;Wang, Ding-Hua;Han, Seok-Bung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.147-154
    • /
    • 2017
  • This paper aims to build a home security system based on IoT to monitor a home on a mobile phone. The system consists of data gathering sensors, camera, gateway and Xively platform. The Raspberry Pi collects data from the three sensors and sends the data to Xively, and sends the video stream of home to a client in a smart phone through a internet. The servers are composed of Xively, socket server in Raspberry Pi and E-mail server in Google. The proposed system transmits e-mail, text message, and video stream when there are motion, fire, and gas leakage, and can control the gas valve through Raspberry Pi. The experimental results show that a user gets 'emergency E-mail' and text message and watches the video stream of the home through WIFI or LTE on a smart phone.

A Study of VoIP Encryption and Authentication Technologies in 4G WiBro Services (4G WiBro서비스에서 VoIP 암호화와 인증기술 연구)

  • Baek, Jong-Il;Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.291-294
    • /
    • 2011
  • 4G WiBro service in Korea, the world's fourth-generation communication is standardized. VoIP service has been activated one of the application in WiBro communications infrastructure. When using VoIP in the WiBro service, complementing the existing VoIP vulnerabilities in the encryption and authentication technology is a need for research. In this paper, fourth-generation WiBro, LTE, and the definition, 1G, 2G, 3G and 4G compares. And, WiBro service in the VoIP edaehan technical, administrative, physical, and hacker attacks and vulnerability analysis is the study of security measures. Enhanced security measures for the WiBro service to VoIP security through encryption and authentication technologies are studied.

  • PDF

Technology and Policy for Blockchain-based Spectrum Sharing (블록체인 기반의 전파 공유 기술과 전파 정책)

  • Shin, Na Yeon;Nam, Ji-Hyun;Choi, Ye Jin;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.13-21
    • /
    • 2019
  • The restricted network or the unbalanced distribution of spectrum is causing the problems of lack of spectrum resources and deterioration of the service quality. In addition, the existing centralized radio sharing method has not been a fundamental solution for radio sharing and is inefficient in terms of cost, convenience, and security. In this paper, we propose a blockchain-based spectrum sharing as a low-cost, trustworthy, high-efficiency platform that can distribute and share spectrum resources, and propose policies to realize this. In the spectrum sharing platform, spectrum information about Wi-Fi AP and LTE mobile hotspot is registered in the blockchain, and spectrum sharers and users can conclude peer-to-peer spectrum sharing contract quickly and efficiently through smart contract. The pay for the shared spectrum resources and reward for spectrum quality management open platform ecosystem to activate the circulation-sharing and it can provide a convenient and efficient public wireless infrastructure.

A Design of Access Control Method for Security Enhance based Smart Device (스마트 디바이스 기반의 보안성 강화를 위한 접근제어 기법 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.11-20
    • /
    • 2018
  • Smart devices refer to various devices and control equipment such as health care devices, imaging devices, motor devices and wearable devices that use wireless network communication (e.g., Wi-fi, Bluetooth, LTE). Commercial services using such devices are found in a wide range of fields, including home networks, health care and medical services, entertainment and toys. Studies on smart devices have also been actively undertaken by academia and industry alike, as the penetration rate of smartphones grew and the technological progress made with the fourth industrial revolution bring about great convenience for users. While services offered through smart devices come with convenience, there is also various security threats that can lead to financial loss or even a loss of life in the case of terrorist attacks. As attacks that are committed through smart devices tend to pick up where attacks based on wireless internet left off, more research is needed on related security topics. As such, this paper seeks to design an access control method for reinforced security for smart devices. After registering and authenticating the smart device from the user's smart phone and service provider, a safe communication protocol is designed. Then to secure the integrity and confidentiality of the communication data, a management process such as for device renewal or cancellation is designed. Safety and security of the existing systems against attacks are also evaluated. In doing so, an improved efficiency by approximately 44% compared to the encryption processing speed of the existing system was verified.

5G 단독모드 기기 보안 인증 현황

  • Kwon, Sungmoon;Park, Seongmin;Kim, Dowon
    • Review of KIISC
    • /
    • v.31 no.6
    • /
    • pp.37-40
    • /
    • 2021
  • 미국, 중국 등에 이어 국내에서도 KT에서 2021년 7월 5G 단독모드(StandAlone)를 상용화 하였다. 5G 비단독모드(Non-StandAlone)에서는 다년간 사용되었던 기존 LTE(Long Term Evolution) 망의 장비를 재활용하기 때문에 신규 장비의 도입은 5G 기지국으로 제한된다. 그러나 5G 단독모드에서는 새롭게 정의된 5G 장비들을 사용하기 때문에 이에 대한 위협 분석과 보안 기능의 정의에 따라 각 장비에 보안의 구현이 제대로 되어 있는지 검증하는 절차가 요구된다. 이러한 환경에서 본 논문은 5G 단독모드 기기의 보안 인증 현황을 제공하고자 한다.

A Study on Policy Making for e-Navigation from the Viewpoint of a Maritime Digital Communication Network (e-Navigation을 위한 해상디지털통신 구축에 관한 정책 연구)

  • Lim, Hyuntaek;Cho, Yong-Gab
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.6
    • /
    • pp.679-685
    • /
    • 2018
  • In order to reduce marine accidents using advanced information and communication technology, various research and development projects are conducted globally on e-Navigation related technologies and services. Existing studies do not provide policy measures for LTE-M. In order for these technologies and services to be installed on vessels and to contribute to the prevention of accidents at sea, the law should be expand operational organizations and systems. In particular, communication equipment and related technical standards should be prepared, and its digital communication technology (LTE-M, VDES, Digital-MF / HF, etc.) In this study, we conducted short, medium, and long term performance assessment of the identification system and the policy for effective implementation of Korean e-Navigation. We presented a visible plan of the relevant policy. For example, e-Navigation core services, e-Navigation communication networks and operating systems, e-Navigation international standard leading technologies and e-navigation services activated in the field. To do this, we conducted research based on the progress data of the Korean e-Navigation project, which was led by the Ministry of Maritime Affairs and Fisheries, and conducted research discussions with practitioners and experts in related fields. As a result of this study, it is expected that the proposed policies will contribute to the reduction of marine accidents, the promotion of the maritime industry and the development of additional government policies for national security.

A Study on Improving the Reliability of Cloud Computing (클라우드 컴퓨팅의 신뢰성 향상 방안에 관한 연구)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.107-113
    • /
    • 2012
  • Cloud computing has brought changes to the IT environment. Due to the spread of LTE, users of cloud services are growing more. This which provides IT resources to meet the needs of users of cloud services are noted as a core industry. But it is not activated because of the security of personal data and the safety of the service. In order to solve this, intrusion detection system is constructed as follows. This protects individual data safely which exists in the cloud and also protects information exhaustively from malicious attack. The cause of most attack risk which exists to cloud computing can find in distributed environment. In this study, we analyzed about necessary property of network-based intrusion detection system that process and analyze large amount of data which occur in cloud computing environment. Also, we studied functions which detect and correspond attack occurred in interior of virtualization.

Dual-Band Fractal Antenna with Bandwidth Improvement for Wireless Applications

  • Nsir, Chiraz Ben;Boussetta, Chokri;Ribero, Jean-Marc;Gharsallah, Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.75-80
    • /
    • 2021
  • In this paper, a dual-band Koch Snowflake antenna is proposed for wireless communication systems. Fractal geometry, CPW-feed and stepped ground planes are used to improve the impedance bandwidth. By properly introducing a hexagonal split-ring slot to radiating element, a lower frequency band is generated. The proposed structure is fabricated and tested. Experiment results exhibit dual-band of 0.73-0.98 GHZ and 1.6-3.1 GHz which makes this antenna suitable candidate for GSM900, GSM1800, UTMS2100, Wi-Fi 2400 and LTE2600 bands. In addition, a good radiation pattern, a satisfactory peak gain and a radiation efficiency, which reaches 95%, are achieved.

Fast Video Data Encryption for Swarm UAVs Using Hybrid Crypto-system (하이브리드 암호시스템을 이용한 군집 영상의 고속 암호화)

  • Cho, Seong-Won;Kim, Jun-Hyeong;Chae, Yeo-Gyeong;Joung, Yu-Min;Park, Tae-Kyou
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.7
    • /
    • pp.602-609
    • /
    • 2018
  • This paper proposes the hybrid crypto-system for fast video data encryption of UAV(Unmanned Aerial Vehicle) under the LTE(Long-Term Evolution) wireless communication environment. This hybrid crypto-system is consisted of ECC(Elliptic Curve Cryptography) public key algorithm and LEA(Light-weight Encryption Algorithm) symmetric key algorithm. ECC is a faster public key algorithm with the same security strength than RSA(Rivest Shamir Adleman), and Korean standard LEA with the same key size is also a faster symmetric key algorithm than AES(Advances Encryption Standard). We have implemented this hybrid crypto-system using OpenSSL, OpenCV and Socket programs under the Swarm 8-UAV. We have shown the efficient adaptability of this hybrid crypto-system for the real-time swarm UAV through the experiments under the LTE communication environment.