• Title/Summary/Keyword: Mutual communications

Search Result 221, Processing Time 0.033 seconds

A design and fabrication of active phased array antenna for beam scanning using injection-locking coupled oscillators (Injection-Locking Coupled Oscillators를 이용한 빔 주사 용 능동 위상배열안테나의 설계 및 제작)

  • 이두한;김교헌;홍의석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1622-1631
    • /
    • 1997
  • A 3-stages Active Microstrip Phased Array Antenn(AMPAA) is implemented using Injection-Locking Coupled Oscillators(ILCO). The AMPAA is a beam scanning active antenna with capability of electrical scanning by frequency varation of ILCO. The synchronization of resonance frequencies in array elements is occured by ILCO, and the ILCO amplifies the injection signal and functions as a phase shifter. The microstrip ptch is operated as a radiation element. The unilateral amplifier is a mutual coupling element of AMPAA, eliminates the reverse locking signal and controls the locking bandwidth of ILCO. The possibility of Monolithic Microwave Integrated Circuits(MMIC) of T/R module is proposed by simplified and integrated fabrication process of AMPAA. The 0.75.$lambda_{0}$ is fixed for a mutual coupling space to wide the scanning angle and minimize the multi-mode. The AMPAA has beam scanning angle of 31.4.deg., HPBW(Half Power Beam Widths) of 26.deg., directive gain of 13.64dB and side lobe of -16.5dB were measured, respectively.

  • PDF

Mutual Perceptions between Nuclear Plant Employees and General Public on Nuclear Policy Communication Applying the Co-orientation Analysis Model (원자력 관련 정책 커뮤니케이션에 관한 상호인식 연구: 일반 국민과 원전 직원 간의 상호지향성 분석)

  • Kim, Bong Chul;Kim, Ji Hyun;Chung, Woon Kwan
    • Journal of Radiation Industry
    • /
    • v.9 no.1
    • /
    • pp.37-46
    • /
    • 2015
  • This study examines mutual perceptions between general public and nuclear plant employees on understanding nuclear policy communication applying the co-orientation model. The total of 414 responses were analyzed including 211 of the general public and 203 of plant employees. Results indicate that agreement between general public and plant employees is relatively high, in that general public tends to have negative evaluation to nuclear policy communication, but plant employees tends to have positive one. In terms of congruence, general public perceive that plant employees might have more positive evaluation than themselves, and nuclear plant employees perceive that general public might have more negative evaluation than themselves. Finally, in terms of accuracy, general public accurately estimate how nuclear plant employees perceive on policy communication, whereas nuclear plant employees unaccurately estimate how general public perceive on policy communication.

Authentication Protocol for Unmanned Combat Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인전투체계를 위한 인증 프로토콜)

  • Lee, Jong-Kwan;Lee, Minwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.298-299
    • /
    • 2019
  • In this paper, we propose a stable mutual authentication protocol between unmanned combat systems in tactical wireless networks where long distance communications are not always guaranteed due to a poor channel condition. The proposed protocol generates an authentication code using hash collision of arbitrarily selected random data. The authentication requester encrypts and transmits it to the authenticator. They performs authentication by sharing the valid authentication code. We analyze the safety of the proposed method for various attack scenarios.

  • PDF

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

QoS-Oriented Solutions for Satellite Broadcasting Systems

  • Vargas, Aharon;Gerstacker, Wolfgang H.;Breiling, Marco
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.558-567
    • /
    • 2010
  • In this paper, we analyze the capability of satellite broadcasting systems to offer different levels of quality of service (QoS). We focus on the European telecommunications standards institute satellite digital radio and digital video broadcasting satellite handheld (DVB-SH) standards, which have recently been proposed for satellite broadcasting communications. We propose a strategy to provide different levels of QoS for the DVB-SH standard on the basis of an extension of the interleaving scheme, referred to as molded interleaver, which supports low latency service requirements for interactive services. An extensive analysis based on laboratory measurements shows the benefits of this solution. We also present a multilevel coding (MLC) scheme with multistage decoding designed for broadcasting communications as an alternative to the existing standards, where services with different levels of QoS are provided. We present a graphical method based on mutual information for the design and evaluation of MLC systems used for broadcasting communications. Extensive simulations for a typical satellite channel show the viability of the proposed MLC scheme. Finally, we introduce multidimensional constellations in the proposed MLC scheme in order to increase the number of different protection levels.

ROK's maritime security strategic concept and cooperation direction for the ROK Navy and Coast Guard (한국의 해양안보전략개념과 해군·해경 간 협력의 발전방향)

  • Chung, Samman
    • Strategy21
    • /
    • s.42
    • /
    • pp.258-292
    • /
    • 2017
  • This paper is designed to make a national strategic concept for the ROK's maritime security and to explore cooperation directions for the ROK Navy and Coast Guard in order to implement the newly-made maritime security strategic concept. As strategy is composed of three main categories(goals, ways, means), the goal of the ROK's maritime security strategy is 'Safe and Affluent Sea' and the way to realize the goal is the principle of cooperative leverage, and the means as tasks to implement the strategic concept are maritime safety, maritime security, and maritime stewardship. The concept of national fleet as used in the US is applied to promoting the cooperation between the ROK Navy and Coast Guard. Thus, under the newly-established maritime security strategic concept along with the national fleet model, followings are suggested as policy proposals for facilitating mutual cooperation between the ROK Navy and Coast Guard in dealing with not only traditional threats but also non-traditional treats at sea and from the sea as well. First, the ROK Navy and Coast Guard has been making efforts to enhance interoperability between the two sea services. However, the mutual cooperations have been focused mainly on areas on operational level rather than policy level. Therefore, the two sea services are recommended to enlarge exchanges and cooperation in policy areas. Second, there are still demands for further cooperation areas between the two sea services in command and communications. The interoperability in C2 between the two needs to be upgraded even to the areas of anti-terrorist activities ar sea, ASUW, ASW, maritime interdiction, etc. Third, mutual comparability between the two needs to be reflected in the maritime forces development to ensure the comparability in UNREP and other logistics areas. Fourth, the standardization of logistical materials and equipments is needed as a way of sustaining operational capability and logistical capacity for the ROK Navy and Coast Guard as well. Fifth, the ROK Navy and Coast Guard are recommended to participate more actively in international maritime cooperation activities such as PASSEX. Sixth, Complementary laws and regulations need further to be revised and to be newly made for collectively managing swiftly maritime accidents and natural disasters at sea.

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

Design of a U-Type Planar UWB Antenna Composed of Monopole Pair (모노폴 쌍으로 구성된 U자형 평면 UWB 안테나 설계)

  • Lee, Ho-Sang;Jang, Jae-Sam;Jung, Young-Ho;Kim, Cheol-Bok;Kim, Jae-Hoon;Park, Seung-Bae;Lee, Mun-Soo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.60-66
    • /
    • 2008
  • In this paper, the CPW-fed Ultra-wideband antenna is designed and fabricated for UWB communications. To achieve ultra-wide bandwidth of the antenna, we propose the mutual coupling of two planar monopole antennas. The mutual coupling of monopole pair of the proposed antenna is optimized by adjusting the parameters, the widths of the planar monopoles and the space between two monopoles. Two UWB antennas with different horizontal sections of the CPW-fed monopole antenna are fabricated and measured to examine the mutual coupling effects on the monopole pair antenna. The measured result show that two antennas are satisfied with UWB communication band(3.1$\sim$10.6Ghz).

Mutual Identification and Key Exchange Scheme in Secure Vehicular Communications based on Group Signature (그룹 서명 기반의 차량 네트워크에서 상호 신분 확인 및 세션키 교환 기법)

  • Kim, Dai-Hoon;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.41-50
    • /
    • 2010
  • This paper proposes a mutual identification and session key exchange scheme in secure vehicular communication based on the group signature. In VANETs, security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality are required to satisfy various vehicular applications. However, existing VANET security methods based on the group signature do not support a mutual identification and session key exchange for data confidentiality. The proposed scheme allows only one credential to authenticate ephemeral Diffie-Hellman parameters generated every key exchange session. Our scheme provides a robust key exchange and reduces storage and communication overhead. The proposed scheme also satisfies security requirements for various application services in VANETs.