• Title/Summary/Keyword: Secure communication

Search Result 1,674, Processing Time 0.03 seconds

Secure Communication using N-double scroll in HyperChaos circuit. (N-double scroll을 이용한 하이퍼카오스 회로에서의 암호 통신)

  • 배영철;김주완
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.701-704
    • /
    • 2001
  • Nowadays there are being done many researches on chaos phenomenon among an assortment of group. Currently, already many applications has been developed, applying this phenomenon to engineering problem. now we are to show how we achieved secure communication through hyperchaotic synchronization system using 1-dimensional CNN(Cellular Neural Network). we focused on materializing secure communication.

  • PDF

Secure Communication using N-double scroll in Hyperchaos circuit. (N-double scroll을 이용한 하이퍼카오스 회로에서의 카오스 동기화)

  • 배영철;김주완
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.705-708
    • /
    • 2001
  • Nowadays there are being done many researches on chaos phenomenon among many kinds of people. Currently, already many applications has been developed, and they applied this phenomenon to engineering problem. now we have tried to make it possible to use secure communication through hyperchaotic synchronization system using 1-dimensional CNN(Cellular Neural Network). we focused on materializing secure communication.

  • PDF

The Secure Communication of Hyper-chaos circuit using SC-CNN (SC-CNN을 이용한 하이퍼카오스 회로에서의 비밀 통신)

  • 배영철;김주완
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.903-907
    • /
    • 2002
  • A hyper-chaos circuit is created by applying identical n-double scrolls with weak coupled method, to each cell. Hyper-chaos synchronization was achieved using dive response synchronization between the transmitter and receiver about each state variable in the SC-CNN. From result of the recovery signal through the demodulation method in the receiver, We shown that recovery quality of state variable $\chi$$_3$ is superior to that of $\chi$$_2$,$\chi$$_1$in secure communication.

  • PDF

Secure Communication using Embedding Drive Synchronization (임베딩 구동 동기화를 이용한 비밀통신)

  • Bae, Young-Chul;Kim, Ju-Wan;Kim, Yi-Gon;Shon, Young-Woo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.3
    • /
    • pp.310-315
    • /
    • 2003
  • In this paper, We introduce an embedding driven synchronization method using SC-CNN(State-Controlled Cellular Neural Network) which has the purpose to secure communication method through the embedding driven synchronization method in the SC-CNN. we proposed new embedding driven synchronization that this method is only using one state variable compare to the general driven synchronization methods which is using all state variables. In this paper, We achieved the usage of embedding driven synchronization and we also applied it to secure communication.

복잡계 비밀 통신

  • Bae, Young-Chul;Kim, Chun-Suk;Kim, Ju-Wan;Koo, Young-Duk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.289-293
    • /
    • 2005
  • this paper, we introduce a secure communication method using complex system. We make a complex system with the n-double scroll or Chua's oscillator. The Complex system is created by applying identical n0double scroll or non-identical n-double scroll and Chua's oscillator with weak soupled method to each cell. In order to secure communication, we have synthesizing the desired information with a complex system circuit by adding the information signal to the hyper-chaos signal. And then, transmitting the synthesized signal to the ideal channel, we confirm secure communication by separating the information signal and the complex system signal in the receiver.

  • PDF

A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks (IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Efficient and Secure Authenticated Key Exchange

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.3
    • /
    • pp.163-166
    • /
    • 2005
  • The Key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, Key confirmation, and Key freshness. In this paper, Two authenticated key exchange protocols TPEKE-E(Two Pass Encrypted Key Exchange-Exchange-Efficient) and TPEKE-S(Two Pass Encrypted Key xchange-Secure) are introduced. A basic idea of the protocols is that a password can be represented by modular addition N, and the number of possible modular addition N representing the password is $2^N$. The TPEKE-E is secure against the attacks including main-in-the-middle attack and off-line dictionary attack, and the performance is excellent so as beyond to comparison with other authenticated key exchange protocols. The TPEKE-S is a slight modification of the TPEKE-E. The TPEKE-S provides computational in feasibility for learning the password without having performed off line dictionary attack while preserving the performance of the TPEKE-E.

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.

A Study on Cloud-Based Secure File Management Security Solutions According yo Information Protection Needs (정보보호 필요에 따른 클라우드 기반의 안전한 파일관리 보안솔루션 연구)

  • Kim, Hee-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.243-250
    • /
    • 2019
  • In this paper, we develop a Secure File Management Security(: SFMS) based on media in a cloud environment to encrypt and decrypt cloud data on a computer using a Bluetooth - based cryptographic module. The Bluetooth cipher module makes it easy to browse files stored in the cloud, but it is never possible to browse without a module. It is a solution that fundamentally blocks the problems such as hacking and leakage of personal data that have recently become an issue.