• Title/Summary/Keyword: Network Technique

Search Result 4,424, Processing Time 0.028 seconds

Microwave Absorbing Properties of M-type Barium Ferrites with BaTi0.5Co0.5Fe11O19 Composition in Ka-band Frequencies (BaTi0.5Co0.5Fe11O19 조성을 갖는 M형 바륨 페라이트의 Ka-밴드 전파흡수특성)

  • Kim, Yong-Jin;Kim, Sung-Soo
    • Journal of the Korean Magnetics Society
    • /
    • v.19 no.6
    • /
    • pp.203-208
    • /
    • 2009
  • Magnetic and Ka-band absorbing properties have been investigated in Ti-Co substituted M-type barium hexaferrites with $BaTi_{0.5}Co_{0.5}Fe_{11}O_{19}$ composition. The ferrite powders were prepared by conventional ceramic processing technique and used as absorbent fillers in ferrite-rubber composites. The magnetic properties were measured by vibrating sample magnetometer. The complex permeability and dielectric constant were measured by using the WR-28 rectangular waveguide and network analyzer in the frequency range 26.5~40 GHz. For the Ti-Co substituted M-hexaferrites, the ferromagnetic resonance is observed at Ka-band (29.4 GHz). The matching frequency and matching thickness are determined by using the solution map of impedance matching. A wide band microwave absorbance is predicted with controlled ferrite volume fraction and absorber thickness.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Spatio-Temporal Query Processing System based on GML for The Mobile Environment (모바일 환경을 위한 GML 기반 시공간 질의 처리 시스템)

  • Kim, Joung-Joon;Shin, In-Su;Won, Seung-Ho;Lee, Ki-Young;Han, Ki-Joon
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.95-106
    • /
    • 2012
  • Recently, with increase and development of the wireless access network area, u-GIS Service is supported in various fields. Especially, spatio-temporal data is used in the mobile environment for the u-GIS service. However, there is no standard for the spatio-temporal data used in different spaces, spatio-temporal data processing technology is necessary to makes interoperability among mobile u-GIS services. Furthermore, it is also necessary to develop the system of gathering, storing, and managing the spatio-temporal data in consideration of small capacity and low performance of mobile devices. Therefore, in this paper, we designed and implemented a spatio-temporal query processing system based on GML to manage spatio-temporal data efficiently in the mobile environment. The spatio-temporal query processing system based on GML can offer a structured storage method which maps a GML schema to a storage table and a binary XML storage method which uses the Fast Infoset technique, so as to support interoperability that is an important feature of GML and increase storage efficiency. we can also provide spatio-temporal operators for rapid query processing of spatio-temporal data of GML documents. In addition, we proved that this system can be utilized for the u-GIS service to implement a virtual scenario.

Analysis of Level and Capacity for Multi-piconet in Koinonia High-Rate WPAN (Koinonia 고속 WPAN의 다중 피코넷 레벨 몇 용량 분석)

  • Jung Ssang-Bong;Yim Soon-Bin;Lee Tae-Jin;June Sun-Do;Lee Hyeon-Seok;Kwon Tai-Gil;Cho Jin-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.216-223
    • /
    • 2006
  • The KOINONIA is developed to communicate with connection of the short-range devices by the technique of the WPAN. The piconet consists of one master and slaves above one, the multi-poconet consists of parent piconet and child piconets which is formed the basis of parent piconet. The child piconet consists of the child master and slaves. The child master takes a role of the master in the child piconet and the slave in the parent piconet. In this paper, the multi-piconet is made as above, then we estimate the max capacity of assigned CTA by level, number of slaves in child piconet. A super-frame is the maximum 65.535ms of usable capacity. Because of it is a fued number, We suggested quantitatively the fixed reduction of an usable capacity by increases of number of slave and child-master in the piconet. And we analyze the reduction of an available capacity by the increase of number of child piconet.

Contents Based Partial Encryption of GIS Vector Map (GIS 벡터맵의 콘텐츠 기반 선택적 암호화 기술)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.88-98
    • /
    • 2011
  • Recently, according as the importance of GIS(geography information system) database security is embossed, much researches had been achieved about GIS network security. But most such researches are weak against sourceful illegal reproductions and distributions of GIS vector data map. In this paper, we proposed an efficient layer unit contents based partial encryption technique in the vector map compression domain to prevent illegal distributions and unauthorized accesses. This method achieves a partial encryption about each central coordinate and directional parameters of a MCA(minimum coding attribute) that is created at the vector map compression processing in the vector space. First, the position encryption is applied as permutating randomly the center coordinate of each record that is minimum unit of vector map shape. And second, the direction encryption that changing shapes of vector map topography is applied as encrypting the direction of vertices's coordinates of each record. In experimental results, we confirmed that our proposed method can encipher the large volumed vector map data effectively in low computational complexity. Also, we could minimize the decline of compression efficiency that occurred by conventional contents based encryption schemes using AES or DES algorithms.

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

A Study on Geoid Model Development Method in Philipphines (필리핀 지오이드모델의 개발방안 연구)

  • Lee, Suk-Bae;Pena, Bonifasio Dela
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.6
    • /
    • pp.699-710
    • /
    • 2009
  • If a country has her geoid model, it could be determine accurate orthometric height because the geoid model could provide continuous equi-gravity potential surface. And it is possible to improve the coordinates accuracy of national control points through geodetic network adjustment considering geoidal heights. This study aims to find the best way to develop geoid model in Philippines which have similar topographic conditions as like Malaysia and Indonesia in Eastsouth asia. So, in this study, it is surveyed the general theories of geoid determination and development cases of geoid model in Asia and it is computed that the geoidal heights and gravity anomalies by spherical harmonic analysis using EGM2008, the latest earth geopotential model. The results show that first, the development of gravimetric geoid model based on airborne gravimetry is needed and second, about 200 GPS surveying data at national benchmark is needed. It is concluded that it is the most reasonable way to develop the hybrid geoid model through fitting geometric geoid by GPS/leveling data to gravimetric geoid. Also, it is proposed that four band spherical Fast fourier transformation(FFT) method for evaluation of Stokes integration and remove and restore technique using EGM2008 and SRTM for calculation of gravimetric geoid model and least square collocation algorithm for calculation of hybrid geoid model.

Optimal Release Problems based on a Stochastic Differential Equation Model Under the Distributed Software Development Environments (분산 소프트웨어 개발환경에 대한 확률 미분 방정식 모델을 이용한 최적 배포 문제)

  • Lee Jae-Ki;Nam Sang-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7A
    • /
    • pp.649-658
    • /
    • 2006
  • Recently, Software Development was applied to new-approach methods as a various form : client-server system and web-programing, object-orient concept, distributed development with a network environments. On the other hand, it be concerned about the distributed development technology and increasing of object-oriented methodology. These technology is spread out the software quality and improve of software production, reduction of the software develop working. Futures, we considered about the distributed software development technique with a many workstation. In this paper, we discussed optimal release problem based on a stochastic differential equation model for the distributed Software development environments. In the past, the software reliability applied to quality a rough guess with a software development process and approach by the estimation of reliability for a test progress. But, in this paper, we decided to optimal release times two method: first, SRGM with an error counting model in fault detection phase by NHPP. Second, fault detection is change of continuous random variable by SDE(stochastic differential equation). Here, we decide to optimal release time as a minimum cost form the detected failure data and debugging fault data during the system test phase and operational phase. Especially, we discussed to limitation of reliability considering of total software cost probability distribution.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

Estimation of Groundwater Recharge in Junggwae-Boeun Area in Ulsan City Using the Water Balance and Hydrogeological Analyses (물수지 및 수리지질 분석을 통한 울산광역시 중괘천-보은천 지역의 지하수 함양량 산정)

  • An, Jeong-Hoon;Hamm, Se-Yeong;Lee, Jeong-Hwan;Kim, Nam-Hoon;Yang, Dae-Bok;Hwang, Jee-Gwang
    • Economic and Environmental Geology
    • /
    • v.41 no.4
    • /
    • pp.427-442
    • /
    • 2008
  • Estimation of groundwater recharge is one of the most critical issues in sustainable management of groundwater resources. This study estimated groundwater recharge in the Junggwae-Boeun area in Ulsan City, by using the water balance and hydrogeological characteristics of geology and soil. Evapotranspiration was computed by using the Thornthwaite method, and direct runoff was determined by using the SCS-CN technique. Groundwater recharge was obtained as 266 mm/a (20.6% of the average annual precipitation, 1296 mm/a), with 779 mm/a (60.1%) of evapotranspiration and 119 mm/a (9.2%) of direct runoff. Precipitation and groundwater recharge was highly correlated, comparing with the relationships between precipitation and evapotranspiration, and between precipitation and direct runoff. This fact indicates that groundwater recharge responds more sensitively to precipitation than evapotranspiration and direct runoff do.