• Title/Summary/Keyword: Spreading Code

Search Result 228, Processing Time 0.023 seconds

A Design of Client BBS System for Secure HVA

  • Park, Jae-Kyung;Kim, Young-Ja
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.73-80
    • /
    • 2018
  • In this paper, we propose a new type of client server environment to improve the architecture vulnerable to hacking in an existing client server environment. On the server side, move the existing Web server to the client side and This is a way for clients to communicate only the data they need and suggests a structure that completely blocks the web attack itself to the server. This can completely prevent a server from being hacked, spreading malicious code and hacking data on a server. It also presents a new paradigm that will not affect servers even if malware is infected with client PCs. This paper validates the proposed environment through BBS (Big Bad Stick) hardware in the form of USB on the client side. This study proof that secure services are provided through encryption communication with server-side security equipment, indicating that this study is a system with new security.

Design of digital communication systems using DCSK chaotic modulation (DCSK 카오스 변조를 이용한 디지털 통신 시스템의 설계)

  • Jang, Eun-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.5
    • /
    • pp.565-570
    • /
    • 2015
  • Spread spectrum communications have increased interest due to their immunity to channel fading and low probability of intercept. One of the limitations of the traditional digital spread spectrum systems is the need for spreading code synchronization. Chaotic communication is the analogue alternative of digital spread spectrum systems beside some extra features like simple transceiver structures. In this paper, This paper was used instead of the digital modulation and demodulation carriers for use in the chaotic signal in a digital communication system among the chaotic modulation schemes, the Differential Chaos Shift Keying(DCSK) is the most efficient one because its demodulator detects the data without the need to chaotic signal phase recovery. Also Implementation of Differential Chaos Shift Keying Communication System Using Matlab/Simulink and the receiver con decode the binary information sent by the transmitter, performance curves of DCSK are given in terms of bit-error probability versus signal to noise ratio with spreading factor as a parameter and we compare it to BPSK modulation.

A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail (전자우편을 이용한 악성코드 유포방법 분석 및 탐지에 관한 연구)

  • Yang, Kyeong-Cheol;Lee, Su-Yeon;Park, Won-Hyung;Park, Kwang-Cheol;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.93-101
    • /
    • 2009
  • This paper proposes the detection method of spreading mails which hacker injects malicious codes to steal the information. And I developed the 'Analysis model' which is decoding traffics when hacker's encoding them to steal the information. I researched 'Methodology of intrusion detection techniques' in the computer network monitoring. As a result of this simulation, I developed more efficient rules to detect the PCs which are infected malicious codes in the hacking mail. By proposing this security policy which can be applicable in the computer network environment including every government or company, I want to be helpful to minimize the damage by hacking mail with malicious codes.

Symbol Power Allocation and Channel Estimation Method for LR-WPAN System (LR-WPAN 시스템에서 심볼 전력 할당과 2개의 직교 코드를 사용한 채널 추정 기법)

  • Lee, Kyung-Tak;Lee, Sung-Jun;Sohn, Sung-Hwan;Kim, Jae-Moung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.11
    • /
    • pp.1-10
    • /
    • 2007
  • In this paper, we proposed channel estimation scheme for LR-UWB system which has low data rate for WPAN in IEEE 802.15.4a. At the transmitter, we proposed dynamic power level allocation depends on channel condition in specific period when we modulate signal. We use two orthogonal code to estimate channel at once. It can estimate channel more accurately by using two code which shows good correlation characteristic then it can estimate more accurately by spreading gain. Using estimated channel condition, we synchronize symbol timing of transmitted signal. Then determined power allocation scheme and channel information is transmitted to transmiter side. Finally, using these information, transmiter side change the power level of repeated pulse to adopt to channel condition. Simulation is performed under S-V channel for LR-WPAN in IEEE 802.15.4a and we compare the performance with a different type of receiver type. We use coherent and non-coherent method at the receiver. Simulation result shows us at the NLOS channal performance evaluation is greater than that of LOS channel and the result is independent of receiver type. In the NLOS channel, as the signal delay spreading is big, performance evaluation is also increased.

Performance of VLC-CDMA Communication System Using LED (LED를 이용한 VLC-CDMA 통신 시스템 성능 분석)

  • Bae, Su-Jin;Hong, Yeong-Jo;Lee, Kye-San
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.83-90
    • /
    • 2009
  • White LEDs(Light Emitting Diode) offer advantageous properties such as high brightness, improved reliability, lower power consumption, and long lifetimes. An LED is an electronic device that converts an electrical signal into a tight signal and is used not only in Optical Communication Indoor wireless optical illuminating rooms, but also for wireless optical communication systems. Currently, studies about these white LEDs have been being progressed, and in this raper, we discuss the multiplex and the multiple access method of VLC(Visible Light Communication) systems using white LEDs. In proposed system, CDMA(Code Division Multiple Access) apples to VLC system to reduce interference of VLC system, and improve capacity. The superiority of OOK modulation is presented in analysis of results by comparing VLC-CDMA communication system using OOK(On-off keying) modulation and BPSK modulation in AWGN(Additive White Gaussian Noise) channel and Diffuse channel. And we investigate the significance of a solution of interference by multipath by comparing BER in multipath channel and AWGN channel. In the proposed system, we assume Directed LOS(Line Of Sight) and Diffuse Link, and suppose VLC-CDMA using OOC(Optical Orthogonal Code) as methods to increase efficiency of system by removing ISI(Inter Symbol Interference) caused by multiple access, optical spreading code, and also present an analysis of its performance.

  • PDF

Rare Malware Classification Using Memory Augmented Neural Networks (메모리 추가 신경망을 이용한 희소 악성코드 분류)

  • Kang, Min Chul;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.847-857
    • /
    • 2018
  • As the number of malicious code increases steeply, cyber attack victims targeting corporations, public institutions, financial institutions, hospitals are also increasing. Accordingly, academia and security industry are conducting various researches on malicious code detection. In recent years, there have been a lot of researches using machine learning techniques including deep learning. In the case of research using Convolutional Neural Network, ResNet, etc. for classification of malicious code, it can be confirmed that the performance improvement is higher than the existing classification method. However, one of the characteristics of the target attack is that it is custom malicious code that makes it operate only for a specific company, so it is not a form spreading widely to a large number of users. Since there are not many malicious codes of this kind, it is difficult to apply the previously studied machine learning or deep learning techniques. In this paper, we propose a method to classify malicious codes when the amount of samples is insufficient such as targeting type malicious code. As a result of the study, we confirmed that the accuracy of 97% can be achieved even with a small amount of data by applying the Memory Augmented Neural Networks model.

A new type of lightweight stream encryption algorithm motif for applying low capacity messaging data encryption for IoT / QR / electronic tags (IoT/QR/전자태그용 저용량 메시지 데이터 암호화 적용을 위한 새로운 방식의 스트림 경량 암호화 알고리즘 모티브 제안)

  • Kim, Jung-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.46-56
    • /
    • 2017
  • Recently, the spread of IoT technology has been spreading, and it has been applied to all industrial fields such as home / home appliance / medical care. Due to the low specification, low power consumption characteristic and communication data characteristic of IoT, implementation of existing algorithm is difficult thing. From this reason, we have proposed for the first time that encryption and decryption can be proceeded by introducing a kind of variable length bit XOR operation method which changes a variable the bit length value by using carry up and carry down method. We confirmed the practicality of encrypting short message data frequently processed by IoT device / QR code / RFID / NFC without changing the size of data before and after encryption.

A Single-User ]deceiver using Pilot-Assisted Channel Equalizer for DS-CDMA Downlink (DS-CDMA 하향링크에서 파일럿지원 채널등화기를 이용한 단일사용자 수신기)

  • 남옥우;김재형;김응배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.661-669
    • /
    • 2000
  • DS-CDMA downlink distinguishes actual user by orthogonal spreading codes ,but its orthogonality may be lost by the multiple access interference(MAI) caused by the multipath channel. Therefore in this paper, we proposed the single-user receiver, which use linear channel equalizer to eliminate the interference due to multipath channel and to recover orthogonality and then use code-matched filter to detect transmitted data. Unlike existing research, which mainly assumed ideal channel information, we use pilot channel assisted methods that is a kind of transmission of a parallel reference method to estimate the channel coefficients. Especially we use guard symbols which are inserted periodically to estimate channel coefficients exactly without interference from user signal. The results show that we accepted an approximately ideal channel information and achieved excellent performance improvement using proposed receiver compared with the conventional receiver especially user populations are high.

  • PDF

Optimum and Sub-optimum Decoding Methods of Space-Time Trellis Coded Code Division Multiple Access Systems (시공간 트렐리스 부호화 CDMA 시스템의 최적, 준최적 복호 방식과 성능 연구)

  • Ki, Young Min;Kim, Dong Ku
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.2
    • /
    • pp.130-137
    • /
    • 2002
  • We present Space-Time Trellis Coded Code Division Multiple Access systems, which maintain the full diversity and coding gain of Space-Time Trellis Codes(STTC) and have the immunity to performance degradation caused by multipath fading. These STTC CDMA systems are constructed by adding the spreading and despreading processes of PN codes to STTC systems. In multipath fading channels, delay spreaded signals are detected and combined, then decoded. According to the combining and decoding methods, there are four decoding methods. There are optimum ML decoding without combining, adding multipath signals in each receive antenna before decoding, combining multi path signals in each antenna before decoding, and combining all received signals before decoding. Performance of these methods is proportional to complexity. Besides, all methods are shown to compensate the irreducible error rate which appears in multipath fading channels.

  • PDF

Phisical layer of ETRI wideband CDMA with 5 MHz bandwidth (5MHz 대역폭을 갖는 ETRI Wideband CDMA 시스템의 물리계층)

  • Bang, Seung-Chan;Park, Hyeong-Rae;Han, Yeong-Nam;Lim, Myeong-Seop;Lee, Heon;Han, Gi-Cheol;Park, Hang-Gu
    • Information and Communications Magazine
    • /
    • v.13 no.4
    • /
    • pp.56-63
    • /
    • 1996
  • In this paper, the phisical layer of 4.3008 Mcps wideband CDMA which is proposed as the standard of personal communication service system is introduced. It is designed to fit 5 MHz bandwidth by using $28{\times}2^n$ Hadamard code. 13 kbps CELP vocoder is chosen as the main one and 32 kbps ADPCM can be applied. In the reverse link, the burst pilot scheme is proposed and produces the increase of capacity compared with the continuous pilot method. In order to maintain the service quality when the signaling data is increased, the information data and signaling data are time-multiplexed and making use of signaling activity brings the increase of capacity. QPSK data and QPSK spreading, variable frame size, and code pair assignment for high data rate are accomplished and then information data is transmited up to 64 kbps. It is expected that the proposed techiniques here are used in the FPLMTS.

  • PDF