• 제목/요약/키워드: end-to-end security

검색결과 721건 처리시간 0.03초

광파이비를 이용한 침입자 감시시스템 (Fiber Optic Security System based on Multimode Fiber)

  • 김요희;김인수;박해수;오상기
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1997년도 하계학술대회 논문집 E
    • /
    • pp.1887-1889
    • /
    • 1997
  • This paper reports the principle, design, configuration, and test results of the fiber optic security system using multimode fiber. In this system, optical fiber works as a sensing element. The length of sensing element may be from several meters to several killometers. Physical principle of this system is the dependence of interferometric pattern on the end of the fiber on mechanical perturbation in the area, where this fiber is situated. Near and far field patterns of the output light for multimode fiber are speckle pattern. A number of speckles on the fiber depends on mode numbers. Light intensity in each point of the fiber end depends on phase difference of modes. Finally we introduced a "Fiber Optic Security System based on Multimode" Fiber which we developed, it may be available in the field of the important area and building.

  • PDF

낮은 계산량을 이용한 효율적인 WTLS 시스템 구현에 관한 연구 (A Study on the Effective WTLS System Implementation using Low-Computation)

  • 정우열
    • 한국컴퓨터정보학회논문지
    • /
    • 제8권3호
    • /
    • pp.138-143
    • /
    • 2003
  • 정보통신과 네트워크의 발전으로 인하여 유/무선망의 통합이 일반화되어가고 있다. 이러한 시점에서 무선환경에서 데이터 통신을 위한 프로토콜로서 WAP이 사용되고 있다. 이러한 WAP에서 안전한 통신을 위하여 개발된 WTLS는 인터넷 프로토콜인 TCP/IP에서 사용되는 TLS를 무선환경에 맞도록 최적화한 것이다. 그러나 WTLS는 WAP 보안문제, 종간 문제, 소비전력 등의 문제점을 가지고 있다. 그러므로 본 논문에서는 WTLS의 단점들을 없애고자 WTLS에 사용되는 암호알고리즘을 제안하였다. 제안된 알고리즘은 단일형태가 아닌 혼합형 알고리즘을 사용하기 때문에 계산상의 복잡도를 줄여 소비전력 및 보안문제를 해결할 수 있다.

  • PDF

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob;Alma Shamas;Jawwad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.23-32
    • /
    • 2024
  • Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Interoperable DRM Framework for Multiple Devices Environment

  • Hwang, Seong-Oun;Yoon, Ki-Song
    • ETRI Journal
    • /
    • 제30권4호
    • /
    • pp.565-575
    • /
    • 2008
  • As networks increase and cross-convergence occurs between various types of devices and communications, there is an increasing demand for interoperable service in the business environment and from end users. In this paper, we investigate interoperability issues in the digital rights management (DRM) and present a practical framework to support interoperability in environments with multiple devices. The proposed architecture enables end users to consume digital content on all their devices without awareness of the underlying DRM schemes or technologies. It also enables DRM service providers to achieve interoperability without costly modification of their DRM schemes.

  • PDF

전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜 (RFID Tag's Security Level Based RFID Authentication Protocol)

  • 오수현;곽진
    • 한국통신학회논문지
    • /
    • 제30권6C호
    • /
    • pp.593-600
    • /
    • 2005
  • 최근 들어 RFID 시스템을 물류${\cdot}$유통 시스템을 비롯한 여러 산업분야에 널리 활용하기 위해 태그에 저장된 정보를 보호하고 임의의 태그에 대한 추적 방지가 가능한 인증 프로토콜에 대한 연구가 활발히 진행 중이다. 본 논문에서는 보안 레벨(security level)의 개념을 이용하여 태그를 인증하기위해 back-end DB에 요구되는 계산량을 감소시킬 수 있는 RFID 인증 프로토콜을 제안한다. 제안하는 방식은 해쉬 함수에 기반하며 재전송 공격, 스푸핑 공격, 트래픽 분석, 위치 프라이버시 등에 대해 안전하다는 장점이 있다.

SPRT-based Collaboration Construction for Malware Detection in IoT

  • Jun-Won Ho
    • International journal of advanced smart convergence
    • /
    • 제12권1호
    • /
    • pp.64-69
    • /
    • 2023
  • We devise a collaboration construction method based on the SPRT (Sequential Probability Ratio Test) for malware detection in IoT. In our method, high-end IoT nodes having capable of detecting malware and generating malware signatures harness the SPRT to give a reward of malware signatures to low-end IoT nodes providing useful data for malware detection in IoT. We evaluate our proposed method through simulation. Our simulation results indicate that the number of malware signatures provided for collaboration is varied in accordance with the threshold for fraction of useful data.

Price Monitoring Automation with Marketing Forecasting Methods

  • Oksana Penkova;Oleksandr Zakharchuk;Ivan Blahun;Alina Berher;Veronika Nechytailo;Andrii Kharenko
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.37-46
    • /
    • 2023
  • The main aim of the article is to solve the problem of automating price monitoring using marketing forecasting methods and Excel functionality under martial law. The study used the method of algorithms, trend analysis, correlation and regression analysis, ANOVA, extrapolation, index method, etc. The importance of monitoring consumer price developments in market pricing at the macro and micro levels is proved. The introduction of a Dummy variable to account for the influence of martial law in market pricing is proposed, both in linear multiple regression modelling and in forecasting the components of the Consumer Price Index. Experimentally, the high reliability of forecasting based on a five-factor linear regression model with a Dummy variable was proved in comparison with a linear trend equation and a four-factor linear regression model. Pessimistic, realistic and optimistic scenarios were developed for forecasting the Consumer Price Index for the situation of the end of the Russian-Ukrainian war until the end of 2023 and separately until the end of 2024.

Survey on the Authentication and Key Management of 802.11s

  • ;이상곤
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2012년도 춘계학술발표대회논문집
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

IPTV 컨버전스 환경에서 콘텐츠 보안 기술 동향

  • 나재훈
    • 정보보호학회지
    • /
    • 제19권3호
    • /
    • pp.18-21
    • /
    • 2009
  • 차세대 IPTV 서비스는 4A (Any-time, Anywhere, Any-device, Any-content)를 특징으로 하는 통방 융합의 서비스이다. 4A서비스는 일반 대중이 자유롭게 콘텐츠의 생성과 소비가 가능하며, 전송환경과 디바이스의 종류에 맞게 안전한 미디어 변환과 콘텐츠의 재사용을 가능하게 한다. 본 고에서는 멀티미디어 보안에 적합한 선택적(Selective)보안의 필요성과 이를 근간으로 하여 End-to-End 보안서비스를 제공하는 Transcodable 보안과 현재까지의 연구동향을 살펴본다.

무선 환경에서의 진동 소음 분석 시스템의 개발 (Design of an End-to-End Home Network Security frame for Heterogeneous System)

  • 이지용;류대현;신승중;나종화;김정태;최만림
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.259-262
    • /
    • 2004
  • 본 논문에서는 무선 랜과 시리얼 통신장치를 지원하는 센서들을 활용하여 무선 환경에서 원격으로 진동 및 소음을 계측할 수 있는 유비쿼터스 컴퓨팅 플랫폼을 개발하였다. COTS (Commercial Off The Shelf) 개념을 활용하기 위하여 무선 랜과 시리얼 통신을 지원하는 PDA를 메인보드로 사용하였다. 구현된 플랫폼은 건설용 중장비의 소음을 원격 환경에서 계측하는 응용에 활용하였다.

  • PDF