• Title/Summary/Keyword: Wireless Security

Search Result 1,483, Processing Time 0.024 seconds

A New Physical Layer Transmission Scheme for LPI and High Throughput in the Cooperative SC-FDMA System

  • Li, Yingshan;Wu, Chao;Sun, Dongyan;Xia, Junli;Ryu, Heung-Gyoon
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.457-463
    • /
    • 2013
  • In recent days, cooperative diversity and communication security become important research issues for wireless communications. In this paper, to achieve low probability of interception (LPI) and high throughput in the cooperative single-carrier frequency division multiple access (SC-FDMA) system, a new physical layer transmission scheme is proposed, where a new encryption algorithm is applied and adaptive modulation is further considered based on channel state information (CSI). By doing so, neither relay node nor eavesdropper can intercept the information signals transmitted from user terminal (UT). Simulation results show above new physical layer transmission scheme brings in high transmission safety and secrecy rate. Furthermore, by applying adaptive modulation and coding (AMC) technique according to CSI, transmission throughput can be increased significantly. Additionally, low peak-to-average power ratio (PAPR) characteristic can still be remained due to the uniform distribution of random coefficients used for encryption algorithm.

Trends in Broadband Terahertz Detector Technology (광대역 테라헤르츠 검출 소자 기술 동향)

  • Shin, J.H.;Choi, D.H.;Lee, E.S.;Moon, K.W.;Park, D.W.;Joo, K.I.;Kim, M.G.;Choi, K.S.;Lee, I.M.;Park, K.H.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.53-64
    • /
    • 2020
  • The terahertz (THz) region lies in between the millimeter and infrared spectral bands. A THz wave has the characteristics of non-invasiveness and non-ionization due to low photon energies, while having high penetrability in dielectrics. In addition, since the resonance frequencies of various molecules are included in the THz band, research on the application of spectral analysis and non-destructive testing has been widely studied. Towards this end, the research and development of THz detectors has become increasingly important in order to assess their applications in different areas such as astronomy, security, industrial non-destructive evaluations, biological applications, and wireless communications. In this report, we summarize the operating principles, characteristics, and utilization of various broadband technologies in THz detection devices. Further, we introduce the development status of our Schottky barrier diode technology as one of the broadband THz detectors that can be easily adopted as direct detectors in many fields of applications.

The Ecosystem of the Smartphone Industry in Korea: Perspectives on Its Sustainable Growth (지속적 성장 관점에서 본 한국 스마트폰 산업 생태계)

  • Park, Jinsoo;Choi, Youngseok
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.25-43
    • /
    • 2013
  • The Korean Smartphone industry has advanced rapidly. There seems to have a considerable change in Korea smartphone industry as the security policy related to wireless devices is changed from Whitelist Policy to Blacklist Policy. In regard to such a change, this paper analyzes the smartphone market in terms of the Business Ecosystem Model suggested by Moore. This study examines how Korean Smartphone Ecosystem has been formed and how any shifts in policy will have an effect on the ecosystem. In line with this policy shift, this study also suggests the ways how these ecosystem members should establish a strategy for the continuous development of this smartphone ecosystem. Furthermore, this study presents cooperation directions among ecosystem members based on the organic connections in the ecosystem as well as each individual's corresponding measures. In addition, based on this analysis, this study puts forward Korean smartphone ecosystem's current problems, improvement, and its future.

  • PDF

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

Safe Bike : Secure your Bicycle with this smart Arduino based GPS device

  • Godfrey, Daniel;Song, Mi-Hwa
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.16-26
    • /
    • 2016
  • This proposed project is about a bicycle anti theft devised system which helps people protect the bicycle from theft and helps to track the stolen bicycle's location using a smart phone. Safety bike uses two main devices to keep the bicycle secured, the vibration sensor and GPS sensor. The purpose of this project is to put all these small devices into one well connected system which will help the bicycle owner have more control over the security of his own bicycle. The whole system can be divided into two main parts. The first part is about the hardware development whereby all electronics components are connected via the circuit design using wire wrapping technique. This hardware part includes, a vibrations sensor, a GPS receiver, a toggle switch, LED light, Bluetooth and a buzzer. Wireless Bluetooth signals are used as the means of communication between the smartphone and the microcontroller. The second part is the software part which is being to program and control the whole system. The program is written using MikroBasic, a full-featured Basic compiler for microcontroller based systems. In conclusion, this system is designed to enable user to have control in securing his/her bicycle also being able to find and locate it at any time using GPS receiver and mobile android application.

Multiple-Phase Energy Detection and Effective Capacity Based Resource Allocation Against Primary User Emulation Attacks in Cognitive Radio Networks

  • Liu, Zongyi;Zhang, Guomei;Meng, Wei;Ma, Xiaohui;Li, Guobing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1313-1336
    • /
    • 2020
  • Cognitive radio (CR) is regarded as an effective approach to avoid the inefficient use of spectrum. However, CRNs have more special security problems compared with the traditional wireless communication systems due to its open and dynamic characteristics. Primary user emulation attack (PUEA) is a common method which can hinder secondary users (SUs) from accessing the spectrum by transmitting signals who has the similar characteristics of the primary users' (PUs) signals, and then the SUs' quality of service (QoS) cannot be guaranteed. To handle this issue, we first design a multiple-phase energy detection scheme based on the cooperation of multiple SUs to detect the PUEA more precisely. Second, a joint SUs scheduling and power allocation scheme is proposed to maximize the weighted effective capacity of multiple SUs with a constraint of the average interference to the PU. The simulation results show that the proposed method can effectively improve the effective capacity of the secondary users compared with the traditional overlay scheme which cannot be aware of the existence of PUEA. Also the good delay QoS guarantee for the secondary users is provided.

Secure ID-Based Key Agreement Protocol with Anonymity for Mobile Ad Hoc Networks (이동 애드혹 네트워크에서의 익명성을 제공하는 아이디 기반의 안전한 키 교환 프로토콜)

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.92-101
    • /
    • 2012
  • Security support is a significant factor in ad hoc networks. Especially in dynamic topologies, key agreement with private key updating is essential in providing a secure system. And it is also necessary to protect the identities of individual nodes in wireless environments to avoid personal privacy problems. However, many of the existing key agreement schemes for ad hoc networks do not consider these issues concurrently. This paper proposes an anonymous ID-based private key update scheme and a key agreement scheme for mobile ad hoc networks. We also suggest a method of rekeying between different domains using service-coordinators. These schemes are secure against various attacks and are suitable for service-oriented mobile ad hoc networks.

A Study on the Moving Detection Algorithm for Mobile Intelligent Management System Based on the Cloud (클라우드 기반의 모바일 지능형 관제시스템에서의 움직임 감지 알고리즘에 관한 연구)

  • Park, Sung-Ki;Kim, Ok-Hwan
    • Journal of IKEEE
    • /
    • v.19 no.1
    • /
    • pp.58-63
    • /
    • 2015
  • This study suggested the mobile intelligent management system based on the cloud service. The mobile intelligent management system are composed of cloud server, middleware and sensor networks. Each modules are controlled on mobile environment and observed operating status of each apparatus for environment. In this pater, the image-based moving detection algorithm applied in order to detect an intruder and average 12.3% are measured in moving detection experiments. it was confirmed the validity of the security device.

Differential Fault Analysis on Lightweight Block Cipher LBlock (경량 블록 암호 LBlock에 대한 차분 오류 공격)

  • Jeong, Ki-Tae;Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.871-878
    • /
    • 2012
  • LBlock is a 64-bit ultra-light block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose a differential fault analysis on LBlock. Based on a random nibble fault model, our attack can recover the secret key of LBlock by using the exhaustive search of $2^{25}$ and five random nibble fault injection on average. It can be simulated on a general PC within a few seconds. This result is superior to known differential fault analytic result on LBlock.

m-Gov Strategy and Policy Challenges with ICT Ecosystem Changes (ICT 생태계 변화에 따른 m-Gov의 전략수립과 정책과제)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1531-1537
    • /
    • 2013
  • In its change in ICT Ecosystem, electronic government changes to its wireless m-Gov from existing PC-based e-Gov. Thus, in order to realize the smart government, m-Gov needs to be vitalized and the strategies for this realization are required. Also, some countermeasures for those strategies and political instructions which the electric government should follows are needed. Above two are the ultimate purpose in pursuing administrative ideals because the realization of m-Gov innovates the government and betters quality of national life off. Therefore, this paper, to realize the smart government, provides some strategies for vitalization of m-Gov's electric government services, their countermeasures, and political instructions for Smart m-Gov.