• Title/Summary/Keyword: Security transmission

Search Result 866, Processing Time 0.024 seconds

A Study on Secure Routing Technique using Trust Value and Key in MANET (신뢰도와 키를 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.69-77
    • /
    • 2015
  • MANET is composed of only the mobile nodes have a limited transmission range. The dynamic topology by the frequent movement of nodes makes routing difficult and is also cause exposed to security vulnerabilities. In this paper, we propose the security routing technique consisted of mechanism of two steps in order to respond effectively to attack by the modification of the routing information and transmit secure data. The hierarchical structure is used and the authentication node that issues the key of the nodes within each cluster is elected in this proposed method. The authentication node manages key issues and issued information for encrypting the routing information from the source node. The reliability value for each node is managed to routing trust table in order to secure data transmission. In the first step, the route discovery is performed using this after the routing information is encrypted using the key issued by the authentication node. In the second step, the average reliability value of the node in the found path is calculated. And the safety of the data transmission is improved after the average reliability value selects the highest path. The improved performance of the proposed method in this paper was confirmed through comparative experiments with CBSR and SEER. It was confirmed a better performance in the transmission delay, the amount of the control packet, and the packet transmission success ratio.

A Study on the Algorithms of One-way Transmission for Stable Data Sharing (안정적인 데이터 공유를 위한 일방향 전송 알고리즘에 대한 연구)

  • Kang, Min Kyung;Koh, Keun Ho;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.61-68
    • /
    • 2016
  • As many high-tech researches are shown in various field by sharing data via computer network, a necessity for stable data-sharing environment has suggested steadily. This research covers one-way communication protocol which is newly developed through the necessity. In this protocol, data is transmitted only in one way. One-way transmission has strong possibility to protect system from uncertain and potential risk, but it is impossible to receive ACK(Acknowledge Character) packet about data. Therefore, we need to find a way which duplex protocol such as TCP, ICMP works properly and practical communication falls under one-way transmission environment. To conclude, we analysed possible scenario in each protocol from three layers - interface layer, internet layer and transmission layer and approached how to resolve the problem in each way.

A Study on Multilevel Communication Drive of Full-Duplex Method with Security (보안성을 겸비한 전이중방식의 다중레벨 통신드라이브에 관한 연구)

  • Cho, Su-Eog;Park, Seong-Mi
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.1
    • /
    • pp.41-48
    • /
    • 2020
  • Currently, the industry uses MODBUS communication method using RS485 as a communication method used when constructing distributed equipment and networks. However, this method has a rather good transmission and reception distance, but has a disadvantage of being a half-duplex communication method. Therefore, there is a great need for a full-duplex communication method that can simultaneously transmit and receive two-wire communications. Therefore, in this paper, we propose a new communication hardware equipment that can implement full-duplex communication method by communication signal level to overcome the disadvantage of communication speed. The proposed communication hardware is a structure that can transmit and receive at the same time on the same communication line in two equipments communicating in a two-wire system. The characteristic of this communication hardware is that the transmitter generates two-level signal for data transmission, but the receiver generates three-level electric signal according to the status of the transmission data generated by the receiver. The data transmission signal information of the receiver is present at the same time. Therefore, the receiving side can analyze the received signal based on the information on the current transmission signal and can analyze the signal only in the two communicating devices, so it can be seen that the communication security is very excellent.

Autonomous Transmission Power Adjustment Strategy for Femtocell Base Station

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.367-373
    • /
    • 2022
  • Femtocells have recently been recognized for their potential to boost network capacity, improve end-user QoS and throughput, and do so at a cheap cost and with ease of implementation. The use of femtocells in indoor environments, such as residential buildings with neighboring homes, is becoming more popular. Femtocells are subject to interference from other femtocells, and the unwanted effects of interference are amplified when femtocells are deployed in close proximity to one another. As a consequence, the network's overall performance is degraded to a significant degree. One of the strategies that is thought to be effective in reducing the impact of interference is altering the transmission power of the femtocells. In this paper, a dynamic downlink transmission power of femtocells is suggested. In accordance with the observed cost function unit, each femtocell automatically changes its transmission power. If a femtocell causes too much interference for its neighbors, its transmission power level will be limited by that interference's rate. A simulation experiment is conducted to validate the effectiveness of the suggested system when compared with other schemes. When compared to previous schemes, which are addressed in this study, the numerical results show that the proposed strategy could provide more capacity while also ideally mitigating the influence of interference among co-channel deployed femtocells.

Design and Implementation of PDA-based Image Surveillance System for Harbor Security using IP Camera

  • Shim, Joon-Hwan
    • Journal of Navigation and Port Research
    • /
    • v.31 no.9
    • /
    • pp.779-784
    • /
    • 2007
  • This paper describes a new progressive embedded Internet Protocol(IP) camera available for real-time image transmission. It was applied for ship safety and security on seashore area. The functions of developed embedded system was more effective and excellent than conventional systems. Nowadays, each nation has established harbor security systems to jump up their ports to international port. Recently Incheon port has tried to change man security into center security system used by image security system. The security system of Incheon port has some advantages like effectivity of security system and reduction of manpower and cost, installed by image security system with CCTV cameras at the entrance gate and around the fence. Thus in this paper, we have designed and implemented a Personal Digital Assistants(PDA) based Image Surveillance System for Harbor Security using IP Camera under ubiquitous environment. This system has big advantages which are more effective in an emergency and low cost and small manpower than conventional systems.

Research on the Implementation of the AES-CCM Security Mode in a High Data-Rate Modem (고속 모뎀에서의 AES-CCM 보안 모드 구현에 관한 연구)

  • Lee, Hyeon-Seok;Park, Sung-Kwon
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.4
    • /
    • pp.262-266
    • /
    • 2011
  • In high data-rate communication systems, encryption/decryption must be processed in high speed. In this paper, we implement CCM security mode which is the basis of security. Specifically, we combine CCM with AES block encryption algorithm in hardware. With the combination, we can carry out encryption/decryption as well as data transmission/reception simultaneously without reducing data-rate, and we keep low-power consumption with high speed by optimizing CCM block.

A Security and Authentification for ATM Network (ATM망에서의 보안과 인증)

  • 임청규
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.3
    • /
    • pp.83-87
    • /
    • 1998
  • This paper presents a security and authentification scheme against unauthorized disclose and attack in ATM(Asynchronous Transmission Method) with various service. Four various options to place security layer between the AAL and ATM layers is discussed. The suggested security and authentification can be integrated with the call setup procedures of ATM.

  • PDF

Features Extraction and Mechanism Analysis of Partial Discharge Development under Protrusion Defect

  • Dong, Yu-Lin;Tang, Ju;Zeng, Fu-Ping;Liu, Min
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.344-354
    • /
    • 2015
  • In order to study the development of partial discharge (PD) under typical protrusion defects in gas-insulated switchgear, we applied step voltages on the defect and obtained the ${\varphi}-u$ and ${\varphi}-n$ spectrograms of ultra-high frequency (UHF) PD signals in various PD stages. Furthermore, we extracted seven kinds of features to characterize the degree of deterioration of insulation and analyzed their values, variation trends, and change rates. These characteristics were inconsistent with the development of PD. Hence, the differences of these features could describe the severity of PD. In addition, these characteristics could provide integrated characteristics regarding PD development and improve the reliability of PD severity assessment because these characteristics were extracted from different angles. To explain the variation laws of these seven kinds of parameters, we analyzed the relevant physical mechanism by considering the microphysical process of PD formation and development as well as the distortion effect generated by the space charges on the initial field. The relevant physical mechanism effectively allocated PD severity among these features for assessment, and the effectiveness and reliability of using these features to assess PD severity were proved by testing a large number of PD samples.

Numerical Simulation of the Characteristics of Electrons in Bar-plate DC Negative Corona Discharge Based on a Plasma Chemical Model

  • Liu, Kang-Lin;Liao, Rui-Jin;Zhao, Xue-Tong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1804-1814
    • /
    • 2015
  • In order to explore the characteristics of electrons in DC negative corona discharge, an improved plasma chemical model is presented for the simulation of bar-plate DC corona discharge in dry air. The model is based on plasma hydrodynamics and chemical models in which 12 species are considered. In addition, the photoionization and secondary electron emission effect are also incorporated within the model as well. Based on this model, electron mean energy distribution (EMED), electron density distribution (EDD), generation and dissipation rates of electron at 6 typical time points during a pulse are discussed emphatically. The obtained results show that, the maximum of electron mean energy (EME) appears in field ionization layer which moves towards the anode as time progresses, and its value decreases gradually. Within a pulse process, the electron density (ED) in cathode sheath almost keeps 0, and the maximum of ED appears in the outer layer of the cathode sheath. Among all reactions, R1 and R2 are regarded as the main process of electron proliferation, and R22 plays a dominant role in the dissipation process of electron. The obtained results will provide valuable insights to the physical mechanism of negative corona discharge in air.

A study of analysis and improvement of security vulnerability in Bluetooth for data transfer (블루투스 환경에서 데이터 전송 시 보안 취약점 분석 및 개선 방안 관련 연구)

  • Baek, Jong-Kyung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2801-2806
    • /
    • 2011
  • During data transmissions via Bluetooth networks, data to be encrypted, or plain text between the application layer and the device layer, can be hacked similar to a key-logger by the major function hooking technique of Windows Kernel Driver. In this paper, we introduce an improved protection module which provides data encryption transmission by modifying the data transmission driver of the Bluetooth device layer, and also suggest a self-protecting scheme which prevents data exposure by various hacking tools. We implement the protection module to verify the confidentiality guarantee. Our protection module which provides data encryption with minimal latency can be expected the widespread utilization in Bluetooth data transmission.