• 제목/요약/키워드: secure communication

검색결과 1,677건 처리시간 0.03초

N-double scroll을 이용한 하이퍼카오스 회로에서의 암호 통신 (Secure Communication using N-double scroll in HyperChaos circuit.)

  • 배영철;김주완
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2001년도 추계종합학술대회
    • /
    • pp.701-704
    • /
    • 2001
  • 최근 카오스현상에 대한 연구가 지속적으로 이루어지고 있다 카오스 철상을 이용하여 많은 분야에서 다양하게 연구되고 있는바 본 논문에서는 1차원 CNN을 구성하여 하이퍼카오스 신호를 생성하고 하이퍼카오스 동기화에 기반을 둔 암호화 통신을 적용하여 구현하는데 초점을 맞추었다.

  • PDF

N-double scroll을 이용한 하이퍼카오스 회로에서의 카오스 동기화 (Secure Communication using N-double scroll in Hyperchaos circuit.)

  • 배영철;김주완
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2001년도 추계종합학술대회
    • /
    • pp.705-708
    • /
    • 2001
  • 최근 카오스현상에 대한 연구가 지속적으로 이루어지고 있다. 카오스 현상을 이용하여 많은 분야에서 다양하게 연구되고 많은 응용기술이 개발되고 있다. 본 논문에서는 1차원 CNN을 구성하여 하이퍼카오스 신호를 생성하고 하이퍼카오스 동기화 구현하는데 초점을 맞추었다.

  • PDF

SC-CNN을 이용한 하이퍼카오스 회로에서의 비밀 통신 (The Secure Communication of Hyper-chaos circuit using SC-CNN)

  • 배영철;김주완
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2002년도 추계종합학술대회
    • /
    • pp.903-907
    • /
    • 2002
  • 본 논문에서는 하이퍼카오스 회로에서의 비밀통신 방법을 제시한다. 하이퍼카오스 회로는 n-double scroll CNN 회로를 이용하였으며, 동일한 2개 또는 4개의 셀을 가진 n-double scroll 회로를 이용하여 송ㆍ수신부를 구성하고 이송ㆍ수신부 사이에 구동 동기를 이용한 동기화를 이루었으며, 상태 변수 $\chi$$_3$에 의한 비밀통신이 상태 변수 $\chi$$_2$,$\chi$$_1$에 의한 방법보다 우수함을 보였다.

  • PDF

임베딩 구동 동기화를 이용한 비밀통신 (Secure Communication using Embedding Drive Synchronization)

  • 배영철;김주완;김이곤;손영우
    • 한국지능시스템학회논문지
    • /
    • 제13권3호
    • /
    • pp.310-315
    • /
    • 2003
  • 본 논문에서는 SC-CNN의 특성을 이용한 임베딩 구동 카오스 동기화(Embedding Drive Synchronization) 방법을 소개하고 이 동기화 방법을 통한 비밀통신을 제안한다. 새로 제안한 임베딩 구동동기는 일반적인 구동동기 방법에서 모든 상태 변수를 구동시키는 방법과 달리 상태 변수 중 한 성분만을 구동시키는 방법이다. 본 논문에서는 SC_CNN에서 임베딩 구동 동기화를 먼저 이룬 후 비밀통신에 적용하였다.

복잡계 비밀 통신

  • 배영철;김천석;김주완;구영덕
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.289-293
    • /
    • 2005
  • this paper, we introduce a secure communication method using complex system. We make a complex system with the n-double scroll or Chua's oscillator. The Complex system is created by applying identical n0double scroll or non-identical n-double scroll and Chua's oscillator with weak soupled method to each cell. In order to secure communication, we have synthesizing the desired information with a complex system circuit by adding the information signal to the hyper-chaos signal. And then, transmitting the synthesized signal to the ideal channel, we confirm secure communication by separating the information signal and the complex system signal in the receiver.

  • PDF

IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조 (A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks)

  • 박종순;박찬길
    • 디지털산업정보학회논문지
    • /
    • 제17권4호
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Efficient and Secure Authenticated Key Exchange

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제3권3호
    • /
    • pp.163-166
    • /
    • 2005
  • The Key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, Key confirmation, and Key freshness. In this paper, Two authenticated key exchange protocols TPEKE-E(Two Pass Encrypted Key Exchange-Exchange-Efficient) and TPEKE-S(Two Pass Encrypted Key xchange-Secure) are introduced. A basic idea of the protocols is that a password can be represented by modular addition N, and the number of possible modular addition N representing the password is $2^N$. The TPEKE-E is secure against the attacks including main-in-the-middle attack and off-line dictionary attack, and the performance is excellent so as beyond to comparison with other authenticated key exchange protocols. The TPEKE-S is a slight modification of the TPEKE-E. The TPEKE-S provides computational in feasibility for learning the password without having performed off line dictionary attack while preserving the performance of the TPEKE-E.

A Secure Operating System Architecture Based on Linux against Communication Offense with Root Exploit for Unmanned Aerial Vehicles

  • Koo, KwangMin;Lee, Woo-yeob;Cho, Sung-Ryung;Joe, Inwhee
    • Journal of Information Processing Systems
    • /
    • 제16권1호
    • /
    • pp.42-48
    • /
    • 2020
  • This paper proposes an operating system architecture for unmanned aerial vehicle (UAV), which is secure against root exploit, resilient to connection loss resulting in the control loss, and able to utilize common applications used in Linux. The Linux-based UAVs are exposed to root exploit. On the other hand, the microkernel-based UAVs are not able to use the common applications utilized in Linux, even though which is secure against root exploit. For this reason, the proposed architecture uses a virtualized microkernel on the Linux operating system to isolate communication roles and prevent root exploit. As a result, the suggested Operating system is secure against root exploit and is able to utilize the common applications at the same time.

정보보호 필요에 따른 클라우드 기반의 안전한 파일관리 보안솔루션 연구 (A Study on Cloud-Based Secure File Management Security Solutions According yo Information Protection Needs)

  • 김희철
    • 한국전자통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.243-250
    • /
    • 2019
  • 본 연구는 클라우드 환경에서 매체기반의 SFMS(: Secure File Management Security) 개발을 통하여 블루투스 기반의 암호모듈을 이용하여 컴퓨터에서 클라우드 데이터를 암 복호화 한다. 블루투스 암호모듈은 클라우드에 저장된 파일을 손쉽게 열람 가능하지만 모듈이 없으면 절대 열람이 불가능하다. 최근 이슈화 되고 있는 해킹이나 개인자료유출 등의 문제점을 근본적으로 차단하는 솔루션이라 할 수 있다.