• Title/Summary/Keyword: relay system

Search Result 1,269, Processing Time 0.025 seconds

Design and Implementation of Packet Filtering Mechanism for Secure Teredo Service (안전한 Teredo 서비스를 위한 패킷 필터링 메커니즘 설계 및 구현)

  • Heo, Seok-Yeol;Shin, Bum-Joo;Han, Ki-Jun;Lee, Wan-Jik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.47-59
    • /
    • 2007
  • IPv4 NAT, which often used in households or under SOHO environments, is one of the factors that delays IPv6 propagation. As IPv4 NAT does not operate properly under the transition mechanism like ISATAP or 6to4 that acts as IPv6-in-IPv4 tunneling type, Microsoft proposed Teredo in order to resolve this issue. However, tunneling transition mechanism like Teredo has a security problem. That is, being tunneled packets have dual IP headers; general firewall systems apply the filtering rules only to the outer header but not inner header when these packets pass the firewall. Furthermore, attacks using unregistered server and relay can take place in Teredo. To resolve these problems, we propose a new packet filtering mechanism exclusively for Teredo. The proposed packet filtering mechanism was designed and implemented by using Linux Netfilter and ip6tables. Through functional and experimental performance tests, this packet filtering system was found operating properly and solving the Teredo packet filtering problems without serious performance degradation.

  • PDF

Research Trend and Analysis of Altitude and Endurance for Fuel Cell Unmanned Aerial Vehicles (연료전지 무인항공기의 고도와 체공시간에 대한 특성 분석 및 최신 연구동향)

  • Cho, Seonghyun;Kim, Minjin;Son, Youngjun;Yang, Taehyun
    • Journal of Hydrogen and New Energy
    • /
    • v.25 no.4
    • /
    • pp.393-404
    • /
    • 2014
  • Unmanned aerial vehicles (UAVs) have been applied to not only military missions like surveillance and reconnaissance but also commercial missions like meteorological observation, aerial photograph, communication relay, internet network build and disaster observation. Fuel cells make UAVs eco-friendly by using hydrogen. Proton exchange membrane fuel cells (PEMFCs) show low operation temperature, high efficiency, low noise and high energy density and those characterisitcs are well fitted with UAVs. Thus Fuel cell based UAVs have been actively developed in the world. Recently, fuel cell UAVs have started to develope for high altitude UAVs because target altitude of UAVs is expanded upto stratosphere altitude. Long endurance of UAVs is essential to improve effects of the missions. Improvement of UAV endurance time could be fulfilled by developing a hydrogen fuel storage system with high energy density and reducing the weight of UAVs. In this paper, research trend and analysis of fuel cell UAVs are introduced in terms of their altitude and endurance time and then the prospect of fuel cell UAVs are shown.

An Approach for Multi-User Multimedia Requests Service to Overlay Multicast Trees (다중 사용자의 멀티미디어 요구 서비스를 위한 오버레이 멀티캐스트 트리의 구성과 복구 방안)

  • Kang, Mi-Young;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12B
    • /
    • pp.1058-1065
    • /
    • 2008
  • In the Internet, as computer resource is developed, multimedia data request being increase more and more. It is effective way that process both high capacity-data and real-time data. Overlay Multicast is an effective method for efficient utilization of system resources and network bandwidth without using hardware customization. Overlay Multicast is an effective method for multimedia data service to multi-users. Multicast tree reconstruction is required when a non-leaf host leaves or fails. In this paper, relay-frame interval is selected as revealed network-state with jitter. In our proposal, multi-user service control algorithm gives a delay effect in multimedia request time. The simulation results show that our proposal takes shorter period of time than the other algorithms to reconstruct a similar tree and that it is a more effective way to deal with a lot of nodes that have lost their multi-user nodes.

Aircraft Position Prediction and Shadow Zone Penetration Control Using Bezier Curve (베지에 곡선을 이용한 항공기 위치 예측 및 음영 지역 진입 제어 방법)

  • Jeong, Jae-Soon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1011-1022
    • /
    • 2014
  • Currently, the wireless network environment of air node is constructed mainly of ground relay station. However, as the Korean Peninsula is composed of 70% mountainous region, there are multiple shadow zones. This is calling for effective measures to prevent aircraft from losing communication link during low-mid altitude missions. In this article we propose the utilization of Bezier Curve for estimation of aircraft flight path and control method for entering shadow zone. This method successfully estimated aircraft track, and analyzed the existence, disseminated the warning, and took measures to avoid the shadow zone before entering. This article, suggested after simulated experiments, proves that the method enables seamless communication during air operations.

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

Development of Vending Machine for Electricity Based on Z-Wave Mesh Network (Z-Wave 메쉬 네트워크 기반의 전기 자판기 개발)

  • Kang, Ki-beom;Ahn, Hyun-kwon;Kim, Han-soo;Lee, Seung-hyun;Jwa, Jeong-woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1256-1262
    • /
    • 2016
  • As the population of camping is increased in campsites and auto camp sites, the electrical equipment can safely supply electricity to users in a variety of electricity bill policy is required in the campsite. In this paper, we develop the vending machine for electricity that can control the outdoor electrical outlet from the management server using the Z-Wave WPAN and android mobile application. The developed vending machine for electricity consists of the management server, the controller, the outdoor outlet box, and the mobile application. The management server provides reservation and electricity bill payment to users. The management server controls the electrical outlet box through the controller to safely supply electricity to users. The controller that is a relay device between the management server and the switch controls switches based on Z-Wave mesh network. Outdoor electrical outlet box has 2 meter switches. We receive the relevant authorization to provide commercial electricity services using the outdoor electrical outlet box in the campsite.

Precise Prediction of Optical Performance for Near Infrared Instrument Using Adaptive Fitting Line

  • Ko, Kyeongyeon;Han, Jeong-Yeol;Nah, Jakyoung;Oh, Heeyoung;Yuk, In-Soo;Park, Chan;Chun, Moo-Young;Oh, Jae Sok;Kim, Kang-Min;Lee, Hanshin;Jeong, Ueejeong;Jaffe, Daniel T.
    • Journal of Astronomy and Space Sciences
    • /
    • v.30 no.4
    • /
    • pp.307-314
    • /
    • 2013
  • Infrared optical systems are operated at low temperature and vacuum (LT-V) condition, whereas the assembly and alignment are performed at room temperature and non-vacuum (RT-NV) condition. The differences in temperature and pressure between assembly/alignment environments and operation environment change the physical characteristics of optical and opto-mechanical parts (e.g., thickness, height, length, curvature, and refractive index), and the resultant optical performance changes accordingly. In this study, using input relay optics (IO), among the components of the Immersion GRating INfrared Spectrograph (IGRINS) which is an infrared spectrograph, a simulation based on the physical information of this optical system and an actual experiment were performed; and optical performances in the RT-NV, RT-V, and LT-V environments were predicted with an accuracy of $0.014{\pm}0.007{\lambda}$ rms WFE, by developing an adaptive fitting line. The developed adaptive fitting line can quantitatively control assembly and alignment processes below ${\lambda}/70$ rms WFE. Therefore, it is expected that the subsequent processes of assembly, alignment, and performance analysis could not be repeated.

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Security Threats and Scenarios using Drones on the Battlefield (전장에서 드론을 활용한 보안 위협과 시나리오)

  • Park, Keun-Seog;Cheon, Sang-pil;Kim, Seong-Pyo;Eom, Jung-ho
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.73-79
    • /
    • 2018
  • Since 1910s, the drones were mainly used for military purposes for reconnaissance and attack targets, but they are now being used in various fields such as disaster prevention, exploration, broadcasting, and surveillance of risk areas. As drones are widely used from military to civilian field, hacking into the drones such as radio disturbance, GPS spoofing, hijacking, etc. targeting drones has begun to occur. Recently, the use of drones in hacking into wireless network has been reported. If the artificial intelligence technology is applied to the drones in the military, hacking into unmanned combat system using drones will occur. In addition, a drone with a hacking program may be able to relay a hacking program to the hacking drone located far away, just as a drone serves as a wireless communication station. And the drones will be equipped with a portable GPS jamming device, which will enable signal disturbance to unmanned combat systems. In this paper, we propose security threats and the anticipated hacking scenarios using the drones on the battlespace to know the seriousness of the security threats by hacking drones and prepare for future cyberspace.

  • PDF

Multi-Level Inverter Circuit Analysis and Weight Reduction Analysis to Stratospheric Drones (성층권 드론에 적용할 멀티레벨 인버터 회로 분석 및 경량화 분석)

  • Kwang-Bok Hwang;Hee-Mun Park;Hyang-Sig Jun;Jung-Hwan Lee;Jin-Hyun Park
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.5
    • /
    • pp.953-965
    • /
    • 2023
  • The stratospheric drones are developed to perform missions such as weather observation, communication relay, surveillance, and reconnaissance at 18km to 20km, where climate change is minimal and there is no worry about a collision with aircraft. It uses solar panels for daytime flights and energy stored in batteries for night flights, providing many advantages over existing satellites. The electrical and power systems essential for stratospheric drone flight must ensure reliability, efficiency, and lightness by selecting the optimal circuit topology. Therefore, it is necessary to analyze the circuit topology of various types of multi-level inverters with high redundancy that can ensure the reliability and efficiency of the motor driving power required for stable long-term flight of stratospheric drones. By quantifying the switch element voltage drop and the number and weight of inverter components for each topology, we evaluate efficiency and lightness and propose the most suitable circuit topology for stratospheric drones.