• Title/Summary/Keyword: Mutual Channel

Search Result 123, Processing Time 0.03 seconds

Prevent Illegal Access Control for Secure Healthcare System (불법적인 접근 제어 방지를 위한 안전한 헬스케어 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Moon, Yong-Hyuk;Cho, Dong-Sub
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.3
    • /
    • pp.657-663
    • /
    • 2010
  • Today, rapid evolution of Internet makes various types of services in ubiquitous environment are intelligent and active. As a result, user's demand on high quality of life increases and health care service based on ubiquitous environment draws a lot of attention. However, user's private information used for health care service is illegally distributed and exposed, causing serious individual and social problems. Therefore, this thesis is intended to suggest a secure health care service to prevent unauthorized third party's access and to protect user's privacy in health care systems. The proposed scheme establishes a session key through communication channel between health care system and user based on explicit mutual authentication and provides secure communication and access control, improving security as one of the leading health care systems.

Secret Key Generation from Common Randomness over Ultra-wideband Wireless Channels

  • Huang, Jing Jing;Jiang, Ting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3557-3571
    • /
    • 2014
  • We develop a secret key generation scheme using phase estimation in ultra-wideband (UWB) wireless fading channels. Based on the reciprocity theorem, two terminals extract the phase of the channel as a common random source to generate secret bits. Moreover, we study the secret key rate by a pair of nodes observing correlated sources and communicating to achieve secret key agreement over public communication channels. As our main results, we establish a more practical upper bound from Cramer-Rao bound (CRB) and compare it with a universally theoretical upper bound on the shared maximum key rate from mutual information of correlated random sources. Derivation and numerical examples are presented to demonstrate the bound. Simulation studies are also provided to validate feasibility and efficiency of the proposed scheme.

Korean insurance market globalization and specialization of distribution agents -comparative study with French insurance market- (한국 보험산업 글로벌화에 따른 보험판매방식의 다각화와 보험인력 전문화에 관한 연구 -프랑스 보험산업과의 비교를 중심으로-)

  • Yeo, Hee-Jung
    • Management & Information Systems Review
    • /
    • v.26
    • /
    • pp.261-291
    • /
    • 2008
  • The EU holds about 50% of exports and imports in the world trade of services. The insurance markets have undergone a significant consolidation in solvency rule, cross-border registration, and standardized accounts. In the EU-Korea FTA negotiations the EU is interested in mutual certification of qualifications as well as market liberalization of law, finance and distribution and so forth. When the negotiation with respect to the mutual certification of qualifications comes to a settlement, the two countries will drive it in service areas. Korea should examine european certification regulations and improve domestic insurance-related institutions. France is the focal country of the EU. The paper provides a comparative study of insurance markets and agents in France and Korea. The paper argues that Korea should initiate institutional changes and be transformed into an insurance service exporting country for the specialized insurance agents to move to EU countries.

  • PDF

Authentication Protocol for Unmanned Combat Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인전투체계를 위한 인증 프로토콜)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.298-299
    • /
    • 2019
  • In this paper, we propose a stable mutual authentication protocol between unmanned combat systems in tactical wireless networks where long distance communications are not always guaranteed due to a poor channel condition. The proposed protocol generates an authentication code using hash collision of arbitrarily selected random data. The authentication requester encrypts and transmits it to the authenticator. They performs authentication by sharing the valid authentication code. We analyze the safety of the proposed method for various attack scenarios.

  • PDF

A Study of Channel Migration in Alluvial River (충적하천의 유로이동에 관한 연구)

  • Roh, Sub;Chung, Yong Tai;Song, Jai Woo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.13 no.5
    • /
    • pp.173-181
    • /
    • 1993
  • Under natural conditions, rivers do not in general take straight courses but instead take winding courses. This is known as meandering of rivers. Meandering of rivers are so complicated because of the mutual interactions between flow and movable boundaries. In quantitative information, it is important to predict the future location of a river channel(channel migration) because in selecting a bridge site or a location of a road. It may be valuable to know the future impact of a nearby river on those structures. When the prediction model of the migration of channel is used in domestic rivers with high coefficient of river regime, it is rational to use the periodical dominant discharge (PDD), which is named firstly by the author, instead of the average discharge. According to the analysis of the erosion coefficient, the mean deviation on the channel migration, and the bed scour factor, it can bring shedding light on the fact that the discharge is one of the dominant components in channel migration. In project area, the discharge that can shift the channel is slightly greater than 6,000CMS. The prediction model of the migration of channel estimated the erosion coefficient, $E_0$ by the data from the South Han River. This estimated value from the South Han River was also used to predict the migration of the South Han River in year 2000.

  • PDF

An Efficient Monitoring Method of a Network Protocol for Downloadable CAS

  • Jeong, Young-Ho;Kwon, Oh-Yung;Ahn, Chung-Hyun;Hong, Jin-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.32-35
    • /
    • 2010
  • This paper presents an efficient monitoring method of a network protocol for a downloadable conditional access system (DCAS) that can securely transmit conditional access software via a bi-directional communication channel. In order to guarantee a secure channel based on mutual authentication between a DCAS head end server and set-top boxes, DCAS messages are encrypted and digitally signed. Owing to applied cryptographic algorithms, it is impossible to get information from messages directly without additional processing. Through categorizing DCAS messages into several groups, the proposed monitoring method can efficiently parse and trace DCAS messages in real-time. In order to verify the stability and effectiveness of the proposed monitoring method, we implement a DCAS monitoring system capable of capturing and parsing all DCAS messages. The experimental results show that the proposed monitoring method is well designed.

  • PDF

Performance Analysis of Array Processing Techniques for GNSS Receivers under Array Uncertainties

  • Lee, Sangwoo;Heo, Moon-Beom;Sin, Cheonsig;Kim, Sunwoo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • In this study, the effect of the steering vector model mismatch due to array uncertainties on the performance of array processing was analyzed through simulation, along with the alleviation of the model mismatch effect depending on array calibration. To increase the reliability of the simulation results, the actual steering vector of the array antenna obtained by electromagnetic simulation was used along with the Jahn's channel model, which is an experimental channel model. Based on the analysis of the power spectrum for each direction, beam pattern, and the signal-to-interference-plus-noise ratio of the beamformer output, the performance deterioration of array processing due to array uncertainties was examined, and the performance improvement of array processing through array calibration was also examined.

Power Allocation for OFDM-Based Cooperative Relay Systems

  • Wu, Victor K. Y.;Li, Ye (Geoffrey);Wylie-Green, Marilynn P.;Reid, Tony;Wang, Peter S. S.
    • Journal of Communications and Networks
    • /
    • v.10 no.2
    • /
    • pp.156-162
    • /
    • 2008
  • Cooperative relays can provide spatial diversity and improve performance of wireless communications. In this paper, we study subcarrier power allocation at the relays for orthogonal frequency division multiplexing (OFDM)-based wireless systems. For cooperative relay with amplify-and-forward (AF) and decode-and-forward (DF) algorithms, we investigate the impact of power allocation to the mutual information between the source and destination. From our simulation results on word~error-rate (WER) performance, we find that the DF algorithm with power allocation provides better performance than that of AF algorithm in a single path relay network because the former is able to eliminate channel noise at each relay. For the multiple path relay network, however, the network structure is already resistant to noise and channel distortion, and AF approach is a more attractive choice due to its lower complexity.

Multiple-Channel Active Noise Control by ANFIS and Independent Component Analysis without Secondary Path Modeling

  • Kim, Eung-Ju;Lee, Sang-yup;Kim, Beom-Soo;Lim, Myo-Taeg
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.22.1-22
    • /
    • 2001
  • In this paper we present Multiple-Channel Active Noise Control[ANC] system by employing Independent Component Analysis[ICA] and Adaptive Network Fuzzy Inference System[ANFIS]. ICA is widely used in signal processing and communication and it use prewhiting and appropriate choice of non-linearities, ICA can separate mixed signal. ANFIS controller is trained with the hybrid learning algorithm to optimize its parameters for adaptively canceling noise. This new method which minimizes a statistical dependency of mutual information(MI) in mixed low frequency noise signal and there is no need to secondary path modeling. The proposed implementations achieve more powerful and stable noise reduction than Filtered-X LMS algorithms which is needed for LTI assumption and precise secondary error

  • PDF

Power analysis attack resilient block cipher implementation based on 1-of-4 data encoding

  • Shanmugham, Shanthi Rekha;Paramasivam, Saravanan
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.746-757
    • /
    • 2021
  • Side-channel attacks pose an inevitable challenge to the implementation of cryptographic algorithms, and it is important to mitigate them. This work identifies a novel data encoding technique based on 1-of-4 codes to resist differential power analysis attacks, which is the most investigated category of side-channel attacks. The four code words of the 1-of-4 codes, namely (0001, 0010, 1000, and 0100), are split into two sets: set-0 and set-1. Using a select signal, the data processed in hardware is switched between the two encoding sets alternately such that the Hamming weight and Hamming distance are equalized. As a case study, the proposed technique is validated for the NIST standard AES-128 cipher. The proposed technique resists differential power analysis performed using statistical methods, namely correlation, mutual information, difference of means, and Welch's t-test based on the Hamming weight and distance models. The experimental results show that the proposed countermeasure has an area overhead of 2.3× with no performance degradation comparatively.