• Title/Summary/Keyword: Network Security Systems

Search Result 1,659, Processing Time 0.025 seconds

An automatic Notification Service Using the OSGi Service Platform and SMS module

  • Kang, Kyu-Chang;Kang, Dong-Oh;Lee, Jeon-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.55.1-55
    • /
    • 2002
  • In the era of home automation, we need more context-aware and intelligent service applications than before. For these applications, a service gateway as a platform is required to bridge the gap between external data networks to internal home networks. Also, the sonics gateway enables customers to receive new classes of home services. The OSGi service platform is a good solution for the service gateway since it can deliver new applications dynamically from a broader network. In the near future, every home will be equipped with a residential gateway powered by the OSGi, and will demand value-added service applications, such as home security monitoring and safety alerts. In this pa...

  • PDF

Technical Trends on Security of Control and Non-payload Communications Network for Unmanned Aircraft Systems (무인기 제어용 네트워크의 보안기술 동향)

  • Wang, G.C.;Lee, B.S.;Lim, K.J.;Ahn, J.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.1
    • /
    • pp.82-92
    • /
    • 2017
  • 최근 들어 무인기와 무선통신기술의 비약적인 발전은 무인기들을 국가 공역에 진입시켜 운행할 필요성과 택배, 긴급 통신영역 확장, 재해 감시 및 대처, 위험지역 정찰, 항공촬영과 같은 다양한 분야로의 활용에 대한 요구를 크게 증가시켰다. 다수의 무인기를 안전하게 운행 및 조종하기 위해서는 고신뢰성 및 고보안성을 제공하는 무인기 제어 전용 네트워크가 요구되며, 이러한 네트워크를 무인기 제어용 통합 네트워크라고 한다. 본고는 무인기 제어용 통합 네트워크의 보안 적용 구간을 분류하고, 구간별로 보안 요구사항과 요구사항을 달성할 수 있는 보안기술들을 차례로 제시한다. 또한, 향후에 무인기 제어용 통합 네트워크의 보안성을 강화하기 위해 개선되어야 하는 부분들을 제시한다.

  • PDF

Comparison of Deep-Learning Algorithms for the Detection of Railroad Pedestrians

  • Fang, Ziyu;Kim, Pyeoungkee
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.28-32
    • /
    • 2020
  • Railway transportation is the main land-based transportation in most countries. Accordingly, railway-transportation safety has always been a key issue for many researchers. Railway pedestrian accidents are the main reasons of railway-transportation casualties. In this study, we conduct experiments to determine which of the latest convolutional neural network models and algorithms are appropriate to build pedestrian railroad accident prevention systems. When a drone cruises over a pre-specified path and altitude, the real-time status around the rail is recorded, following which the image information is transmitted back to the server in time. Subsequently, the images are analyzed to determine whether pedestrians are present around the railroads, and a speed-deceleration order is immediately sent to the train driver, resulting in a reduction of the instances of pedestrian railroad accidents. This is the first part of an envisioned drone-based intelligent security system. This system can effectively address the problem of insufficient manual police force.

Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming

  • Guan, Xinrong;Cai, Yueming;Yang, Weiwei;Cheng, Yunpeng;Hu, Junquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1041-1062
    • /
    • 2012
  • In this paper, we propose a hybrid cooperative scheme to improve the secrecy rate for a cooperative network in presence of multiple relays. Each relay node transmits the mixed signal consisting of weighted source signal and intentional noise. The problem of power allocation, the joint design of beamforming and jamming weights are investigated, and an iterative scheme is proposed. It is demonstrated by the numerical results that the proposed hybrid scheme further improves secrecy rate, as compared to traditional cooperative schemes.

A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks

  • Shi, Fei;Song, Joo-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1565-1585
    • /
    • 2012
  • The characteristics of ad hoc networks, such as the absence of infrastructure, a dynamic topology, a shared wireless medium and a resource-constrained environment pose various security challenges. Most previous studies focused on the detection of misbehavior after it had occurred. However, in this paper we propose a new way of thinking to evade the occurrence of misbehavior. In our scheme, we firstly present a clustering algorithm that employs a powerful analytic hierarchy process methodology to elect a clusterhead for each cluster. The clusterhead in each cluster is then allowed to assign the backoff values to its members, i.e., originators, rather than permitting the originators to choose the backoff values by themselves. Through this media access control layer misbehavior detection mechanism, the misuse of the backoff in the media access control layer in the 802.11 distributed coordination function can be detected.

Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter

  • Yan, Xi-ai;Shi, Wei-qi;Tian, Hua
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1265-1276
    • /
    • 2019
  • Data deduplication is a common method to improve cloud storage efficiency and save network communication bandwidth, but it also brings a series of problems such as privacy disclosure and dictionary attacks. This paper proposes a secure deduplication scheme for cloud storage based on Bloom filter, and dynamically extends the standard Bloom filter. A public dynamic Bloom filter array (PDBFA) is constructed, which improves the efficiency of ownership proof, realizes the fast detection of duplicate data blocks and reduces the false positive rate of the system. In addition, in the process of file encryption and upload, the convergent key is encrypted twice, which can effectively prevent violent dictionary attacks. The experimental results show that the PDBFA scheme has the characteristics of low computational overhead and low false positive rate.

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

A study on development of multimedia SCADA system for electric facility (영상정보 통합형 전기설비 감시시스템 개발 연구)

  • Lee, W.T.;Lee, J.J.;Jeong, Y.K.;Kim, K.H.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2445-2447
    • /
    • 1998
  • For increasing the quality of SCADA system, the application of image information is demanded from typical SCADA system based on data information. Until now, the remote control and monitoring systems combine data information but now gradually have trends to combine voice, data and image information. So multimedia technology is applied to realize new SCADA system. Depends on these requires, we apply new concepts of communication network and multimedia technology to the SCADA system for electric facility. In this paper, we aim at developing multi media supervisory control and data acquisition system based on data and image information, which used electric power system and security system.

  • PDF

A Study on Real-Time Dynamic Image Data Transmission in a Moving Train (이동하는 철도차량에서의 실시간 동영상 데이터 전송에 관한 연구)

  • Yang, Doh-Chul;Lee, Won-Young
    • Proceedings of the KSR Conference
    • /
    • 2006.11b
    • /
    • pp.689-694
    • /
    • 2006
  • Wireless LAN is getting more popularity and plays a main role in electronic and telecommunication field. Wireless LAN is more convenient than wired LAN when mobility is required, and are sometimes the only feasible choice. Wireless LAN can also pose a significant security risk when not properly installed and maintained. Thus, this paper studies real-time message transmission using existing mobile telecommunication network and describes considerations and procedures when introducing wireless LAN concept and wireless LAN systems. It also studies integrated wired and wireless networking including wireless LAN bridge and AP technology of International Organization for Standardization, and especially real-time dynamic image data transmission in a moving train.

  • PDF

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.