• Title/Summary/Keyword: mutual information

Search Result 1,685, Processing Time 0.034 seconds

Analyses of Enhanced Security Protocol for HB Family RFID Mutual Authentication (HB 형의 RFID 상호 인증을 위한 향상된 보안 프로토콜의 해석)

  • Yang, Ji-Su;Kim, Seung-Min;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.791-792
    • /
    • 2012
  • RFID security protocol is widely discussed as an important issue, while the mutual authentication with the security agreement is mostly discussed enthusiastically. In this paper we improve HB family to achieve the property of mutual authentication, so that the user privacy can be protected. The future direction is to adapt the protocol for cloud computing.

  • PDF

A study on Mutual Cooperative Control in the Chaos Mobile Robot (카오스 로봇에서의 상호 연동 제어)

  • Bae, Young-Chul;Kim, Chun-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.942-946
    • /
    • 2005
  • In this paper, we propose that the mutual cooperative control in the chaotic mobile robot. In order to achieve mutual cooperative control in the mobile robot, we apply coupled synchronization technique and driven synchronization technique in the mobile robot with obstacle.

  • PDF

A study on Mutual Cooperative Control in the Chaos Mobile Robot (이동 로봇의 연동 제어를 위한 동기화 기법)

  • Bae, Young-Chul;Kim, Chun-Suk;Koo, Young-Duk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.355-359
    • /
    • 2005
  • In this paper, we propose that the synchronization method for mutual cooperative control in the mobile robot. In order to achieve the synchronization for mutual cooperative control in the mobile robot, we apply coupled synchronization technique and driven synchronization technique in the mobile robot with obstacle.

  • PDF

A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET

  • Lee, ByungKwan;Jeong, EunHee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1467-1480
    • /
    • 2016
  • This paper proposes "A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET." It consists of the Mutual Authentication Scheme (MAS) that processes a Mutual Authentication by transferring messages among a Gateway Node, a Sensor Node, and a User Node and the Black Hole Detection Protocol (BHDP) which detects a Non-Authentication Node by using the Session Key computed in the MAS and a Black Hole by using the Broadcasting Table. Therefore, the MAS can reduce the operation count of hash functions more than the existing scheme and protect a privacy from an eavesdropping attack and an information exposure by hashing a nonce and user's ID and password. In addition, the MAS prevents a replay attack by using the randomly generated nonce and the time stamp. The BHDP improves Packet Delivery ratio and Throughput more than the AODV with Black hole by 4.79% and 38.28Kbps. Also, it improves Packet Delivery ratio and Throughput more than the IDSAODV by 1.53% and 10.45Kbps. Hence it makes VANET more safe and reliable.

Improved Strong Password Mutual Authentication Protocol to Secure on Replay Attack (재전송 공격에 안전한 개선된 강력한 패스워드 상호인증 프로토콜)

  • Kim, Jun-Sub;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.415-425
    • /
    • 2010
  • In public network, user authentication is important security technology. Especially, password-based authentication method is used the most widely in distributed environments, and there are many authentication methods. Their SPMA protocol indicates vulnerability about problem that NSPA protocol does not offer mutual authentication, and proposed Strong Password Mutual Authentication protocol with mutual authentication. However, SPMA protocol has vulnerability of replay attack. In the paper, we analyzed vulnerability to replay attack of SPMA protocol. And we also proposed Improved Strong Password Mutual Authentication protocol to secure on replay attack with same efficiency.

MUTUAL COUPLING EFFECTS ON THE PERFORMANCE OF A SPACE-TAPERED RECTANGULAR PHASED ARRAY (공간체감된 구형 위상어레이의 성능에 미치는 상호결합의 영향)

  • Chang Byong-Kun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.415-421
    • /
    • 2005
  • The radiating or receiving characteristics of array elements (i.e., antennas) are changed from those of isolated elements due to mutual coupling effects and the array performance becomes different from those originally designed by assuming isolated elements. The effects of mutual coupling on the performance of a rectangular array with triangular grid geometry of dipoles above a ground plane are discussed with respect to element pattern. The concept of element gain function is used to examine the effects of mutual coupling on the array performance in terms of sidelobe level in the uniformly spaced and space-tapered rectangular arrays with triangular grid geometry of dipoles. It was shown that the sidelobe performance improved in the space-tapered array compared to the uniformly spaced array in the presence of mutual coupling effects. Computer simulation results are presented.

Estimation of Mutual Inductance Angle for 2-D Wireless Power Transfer System (2차원 무선전력전송 시스템의 상호 인덕턴스 각 추정)

  • Guo, Tianqi;Seol, Won-Kyu;Chung, Se-Kyo
    • Proceedings of the KIPE Conference
    • /
    • 2017.11a
    • /
    • pp.49-50
    • /
    • 2017
  • In a two-dimensional wireless power transfer system, the mutual inductance angle is the most important parameter for determining the power transmission efficiency. This paper presents a technique to estimate the mutual inductance angle from the voltage and current information of the transmitting (Tx) coils. The equation to estimate the mutual inductance angle is derived, and the validity of the proposed method is verified through simulation and experiment.

  • PDF

Adaptive Quantization Scheme for Multi-Level Cell NAND Flash Memory (멀티 레벨 셀 낸드 플래시 메모리용 적응적 양자화기 설계)

  • Lee, Dong-Hwan;Sung, Wonyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.6
    • /
    • pp.540-549
    • /
    • 2013
  • An adaptive non-uniform quantization scheme is proposed for soft-decision error correction in NAND flash memory. Even though the conventional maximizing mutual information (MMI) quantizer shows the optimal post-FEC (forward error correction) bit error rate (BER) performance, this quantization scheme demands heavy computational overheads due to the exhaustive search to find the optimal parameter values. The proposed quantization scheme has a simple structure that is constructed by only six parameters, and the optimal values of them are found by maximizing the mutual information between the input and the output symbols. It is demonstrated that the proposed quantization scheme improves the BER performance of soft-decision decoding with only small computational overheads.

Enhancement of Password-based Mutual Authentication Protocol against De-synchronization Attacks (비동기 공격에 안전한 패스워드기반 상호 인증 프로토콜)

  • Yuk, Hyeong-Jun;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.24-32
    • /
    • 2013
  • Authentication is one of the necessary elements in the network environment. Many researches have detected security vulnerabilities to the existing authentication mechanisms and suggested secure mutual authentication protocols by resolving these vulnerabilities. The representative ones of them are SPMA(Strong Pass Mutual Authentication) and I-SPMA(Improved Strong Password Mutual Authentication). However, these protocols cause a critical problem when the shared secret information is de-synchronized between the server and the client. This paper proposes a revised protocol to resolve the de-synchronization problem. Based on a security assessment on the proposed protocol, we consider the proposed protocol is safer than the previous ones and possible to effectively make a user authentication system mre secure.

Maximum mutual information estimation linear spectral transform based adaptation (Maximum mutual information estimation을 이용한 linear spectral transformation 기반의 adaptation)

  • Yoo, Bong-Soo;Kim, Dong-Hyun;Yook, Dong-Suk
    • Proceedings of the KSPS conference
    • /
    • 2005.04a
    • /
    • pp.53-56
    • /
    • 2005
  • In this paper, we propose a transformation based robust adaptation technique that uses the maximum mutual information(MMI) estimation for the objective function and the linear spectral transformation(LST) for adaptation. LST is an adaptation method that deals with environmental noises in the linear spectral domain, so that a small number of parameters can be used for fast adaptation. The proposed technique is called MMI-LST, and evaluated on TIMIT and FFMTIMIT corpora to show that it is advantageous when only a small amount of adaptation speech is used.

  • PDF