• Title/Summary/Keyword: secure communications

Search Result 492, Processing Time 0.025 seconds

Conceptual Design of Structure Subsystem for Geo-stationary Multi-purpose Satellite (정지궤도복합위성 구조계 개념설계)

  • Kim, Chang-Ho;Kim, Kyung-Won;Kim, Sun-Won;Lim, Jae-Hyuk;Kim, Sung-Hoon
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.110-115
    • /
    • 2012
  • Satellite structure should be designed to accommodate and support safely the payload and equipments necessary for its own missions and to secure satellite and payloads from severe launch environments. The launch environments imposed on satellites are quasi-static accelerations, aerodynamic loads, acoustic loads and shock loads. Currently KARI(Korea Aerospace Research Institute) is developing Geo-KOMPSAT-2(Geostationary Earth Orbit KOrea Multi-Purpose Satellite) with technologies which were acquired during COMS(Communication, Ocean and Meteorological Satellite) development. As compared to COMS Geo-KOMPSAT-2 requires more propellant due to mass increase of Advanced Meteorological Payload with high resolution and increase of miss life, it is difficult to apply the design concept of COMS to Geo-KOMPSAT-2. This paper deals with conceptual design of Structural Subsystem for Geo-KOMPSAT-2.

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

A Study on the Facing Problem for Science of Communication (통신과학의 당면과제)

  • 조정현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.2 no.1
    • /
    • pp.2-13
    • /
    • 1977
  • Along with the evolution of social phenomena such as politics, econmics, and culture, communication that is also one of social activities or social procedures has been developed as an independent science with integral characteristics.Originally formed in the United States of America in 1950s, the science of communication is now greatly spreading all over the world. Indebted to this world tendency, Korean Institute of Communication Science was inaugulated in February of 1575, acknowledging the need of accepting this science in Korea with the objectives to secure social and national development. The science of communication is to analyze its internal elements and search for the scientific trait and their relativities. Moreover, this science aims to contribute to human welfare by means of systematizing communication activities intimately related with various adjoining sciences. In other words, the science of communication is to logically systematize the principles and theories based on communication practices and to a great extent cultivate the applying theory and efficient method of communication.Accordingly, 1 would like to suggest that many scholars, educators, practitioner, and managers interested in communication fields have a new acknowledgment and outlook for· communication andeavor to make it scientific and self - independent .

  • PDF

A study on synchronization of lorenz-based dicrete chaotic with application to communcation encryption (통신암호화에 응용된 로렌츠 기반 이산 카오스의 동기화에 관한 연구)

  • Park, Chul;Kim, Young-Tae;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2488-2497
    • /
    • 1997
  • In this paper, a computer simulation of the Lornz discrete chaotic system is described. The chotic behavior closely matches the results predicted by numerical simulations. Using the concept of discrete synchronized chaotic systems, the possibility of a secure communication is proved by simulating the Lorenz system in both the transmitter and receiver. In the proposed approach, at first, a chaotic modulating signal is multiplied with the message, and these are transmitted with adding a chaotic modulating signals, and then at the receiver, the chaotic modulating signal is regenerated and divided from the receiver signal. Varying a smapling time interval to calibrate the robustness of the Lorenz discrete synchronized chaotic system as a nonlinear state estimator, we measured the performance of the Lorenz discrete syncrhonized chaotic system by comparing the synchronization error and the error between transmitted signal and received signal.

  • PDF

A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments (MIH 환경에서 카멜레온 해쉬 기반의 인증값을 이용한 선행 인증 기법)

  • Chae, Kang-Suk;Choi, Jae-Duck;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.840-848
    • /
    • 2010
  • This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.

A Study on the Information Protection Plan for the Smartwork Service Environments (스마트워크 서비스 환경 구축을 위한 정보보호 방안에 대한 연구)

  • Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.3 no.2
    • /
    • pp.19-32
    • /
    • 2013
  • An explosive growth of mobile devices and smart phones, such as Tablet PC using wireless Internet, is changing the Information environment rapidly. Smart technology telecommuting work or smart work centers, mobile devices, and configure your environment to take advantage of remote collaboration. Also, you do not have the limitations of time and space provides a flexible working environment. Smartwork environment is an IT environment to be provided to carry out the business by accessing remotely via smart device outside of the internal IT infrastructure of an existing. Smartwork system to increase the work efficiency is present to what information protection threats according to their convenience. Safeguards information that can be utilized to build a secure smartwork environment is required. Therefore, in this paper, we examined the worksmart information protection measures that can protect the information be reconciled smoothly to fit the smartwork environment.

  • PDF

A Study on the Improvements of the Big Data Guideline in Korea (빅데이터 개인정보보호 가이드라인(안)의 개선 방향에 관한 연구)

  • Kim, Sunnam;Lee, Hwansoo
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.20-39
    • /
    • 2014
  • The age of big data has not only opened new opportunities for economic growth in various industries, but it has also created new problems related to personal information protection and privacy invasion. Given this situation, Korea's communications commission has proposed a big data guideline that specifies how companies should collect and utilize personal information in the big data environment. However, this guideline is more focused on industrial development than personal information protection, and it contains many features that conflict with personal information protection law as it currently exists. As a result, civic groups strongly oppose the guideline, as it may create serious privacy issues for subjects of information gathering. Thus, this paper analyses the limitations of the guideline by comparing it with domestic and foreign laws about personal information protection and privacy. We also discuss the direction of legalization and institutionalization with respect to the secure use of big data.

Smart Cold-Chain Monitoring Automation System Architecture based on Internet of Things (사물 인터넷 기반 스마트 콜드 체인 모니터링 자동화 시스템 구조)

  • Kim, Seok-Hoon;Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.351-356
    • /
    • 2014
  • Generally, although securing the condition and location of container freights or normal freights, which load a fresh goods, has been a very important issue in the cold-chain system implementations, it has not gotten out of the traditional methods in the related business world yet. To solve this problem, we propose the designing method and architecture which can be used to implement a smart cold-chain monitoring automation systems. The proposed system architecture is based on the oneM2M standards, and it has 3 layers and entities, which can be implemented to S/W and H/W, network services layer and entity, common services layer and entity, application layer and entity. Based on this architecture, we will not only expect an innovative retrenchment of distribution cost, but also automatically secure the freight condition and location.

Intelligent Safe Network Technology for the Smart Working Environments based on Cloud (클라우드 기반 스마트 사무환경 구축을 위한 지능형 세이프 네트워크 기술)

  • Kim, Seok-Hoon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.345-350
    • /
    • 2014
  • According to the necessity of smart working with various mobile devices, and the increasing services based on the converged infrastructures such as Cloud, Wearable Computing, Next Generation Wired/Wireless Mobile Networks, the network reliability has been one of the most important things. However, the research related to the network reliability is still insufficient. To solve these problems, we propose the ISNTC (Intelligent Safe Network Technology based on Cloud), which uses the safe network technique based on SDN, to be adopted to the smart working environments. The proposed ISNTC guarantees secure data forwarding through the synchronized transmission path and timing. We have verified the throughput which outperformed the existing techniques through the computer simulations using OPnet.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.