• Title/Summary/Keyword: secure communications

Search Result 486, Processing Time 0.024 seconds

Improved Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 개선된 RFID 인증 프로토콜)

  • Oh, Sejin;Lee, Changhee;Yun, Taejin;Chung, Kyungho;Ahn, Kwangseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.12-18
    • /
    • 2013
  • In 2012, Woosik Bae proposed a DAP3-RS(Design of Authentication Protocol for Privacy Protection in RFID Systems) using the hash function and AES(Advanced Encryption Standard) algorithm to hide Tag's identification and to generates variable data in every session. He argued that the DAP3-RS is safe from spoofing attack, replay attack, traffic analysis and etc. Also, the DAP3-RS resolved problem by fixed metaID of Hash-Lock protocol using AES algorithm. However, unlike his argue, attacker can pass authentication and traffic analysis using by same data and fixed hash value on the wireless. We proposed authentication protocol based on AES algorithm. Also, our protocol is secure and efficient in comparison with the DAP3-RS.

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

Analysis of Sine Test Results with Prediction for Geo-stationary Satellite (정지궤도 위성의 정현파 가진 시험과 예측 비교)

  • Kim, Chang-Ho;Kim, Kyung-Won;Kim, Sun-Won;Lim, Jae-Hyuk;Hwang, Do-Soon
    • Journal of Satellite, Information and Communications
    • /
    • v.5 no.1
    • /
    • pp.80-84
    • /
    • 2010
  • Satellite structure should be designed to accommodate and support safely the payload and equipments necessary for its own missions and to secure satellite and payloads from severe laucnch enviroments. The lauch environments imposed on satellites are quasi-static accelerations, aerodynamic loads, acoustic loads and shock loads. To qualify the structure design against low-frequency dyanmic enviromnent, sine vibration test should be performed. During sine vibration test, the notchings are implemented in order to keep the payloads and equipments from excessive loading at their own main modes. This paper deals with sine test prediction, sine vibration test results, comparison of predicted values and tested values, and verification of Finite Element Model.

Performance Comparison of EFTS According by Modulations and Channel Codes (변조 방식과 채널 코드에 따른 EFTS 성능 비교)

  • Kang, Sanggee
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.94-98
    • /
    • 2013
  • A report of security problems and simultaneous operation limits of Standard tone currently used for FTS introduces the development of a next generation FTS. In this paper, BER performance by modulations and channel coding methods for EFTS are compared. Simulation results show that coherent modulations have better BER performance than noncoherent modulations. However the environments of a lunching vehicle may cause serious problems in achieving and maintaining synchronization and the increasing complexity of coherent systems also increases reliability problems. Therefore noncoherent systems are suitable for FTS even though BER performace of noncoherent systems is lower than coherent systems. Noncoherent DPSK has better BER performance than noncoherent CPFSK. However the PEP of noncoherent DPSK is 0.8dB higher than noncoherent CPFSK. Therefore a transmitter of noncoherent DPSK has more output power than noncoherent CPFSK. Convoltional code has better BER performance than RS code. However RS code has a tendency of steeply decreasing BER near the wanted $E_b/N_0$.

A study on the improvement of work and training to make better Korean 119 dispatcher's response ability (119 상황 접수 요원의 대응능력 향상을 위한 업무 및 훈련 개선방안 연구)

  • Kim, Tae-hwan;Kim, Jung-Gon;Woo, Nam-kyu;Kim, Je-hyun
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.4
    • /
    • pp.550-561
    • /
    • 2017
  • This paper deals with the improving issues and methods for 119 dispatcher's work and training manual in order to improve their emergency response ability in Korea. Firstly, it was investigated and compared on manuals and training methods for the reception of emergency calls between South Korea and the USA. And then, specific improvement methods were considered by questionnaire for 95 dispatchers who work at 119 communication center in Gyeonggi-do in the basis of surveys. As a result, people and equipment related to 119 have been continuously upgraded, however, their work depend on their personal experiences and capabilities but because of the insufficient pretraining for the dispatchers. Also, the manpower is still insufficient overall compared to the work. Therefore, it is necessary to secure the expertise of the dispatchers through the systematic training program and proper training and test standards for 119 dispatchers, and to prevent errors in the logic of the situation and systematize their work by standardizing the response work and arranging appropriate manpower.

The Role-Setting of Mathematical Education about Korean Populism (포퓰리즘에 대한 수학교육의 역할 연구)

  • Moon, Kwon-Bae
    • Communications of Mathematical Education
    • /
    • v.23 no.3
    • /
    • pp.849-862
    • /
    • 2009
  • The goal of this study is to present essential methods of minimalizing Korean populism in our society through the investigation of relations between populism and mathematical education which people don't easily recognize. We made a thorough analysis on the populism-generating elements and then presented mathematical methods which could convert micro-way of thinking into macro-one. We believe that an explicit investigation of the relations between Korean populism and mathematical education and the ensuing appropriate role-setting of mathematical education would help secure an essential solution for minimalizing populism in our society.

  • PDF

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

A Novel Digital Image Protection using Cellular Automata Transform (셀룰라 오토마타 변환을 이용한 정지영상 보호 방법)

  • Shin, Jin-Wook;Yoon, Sook;Yoo, Hyuck-Min;Park, Dong-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8C
    • /
    • pp.689-696
    • /
    • 2010
  • The goal of this paper is to present a novel method for protecting digital image using 2-D cellular automata transform (CAT). A copyright and transform coefficients are used to generate a new content-based copyright and an original digital image is distributed without any hidden copyright. The parameter, which is called gateway value, for 2-D CAT is consisted of rule number, initial configuration, lattice length, number of neighbors, and etc. Since 2-D CAT has various gateway values, it is more secure than conventional methods. The proposed algorithm is verified using attacked images such as filtering, cropping, JPEG compression, and rotation for robustness.

Multidimensional Networking Application of Ship Black Box and Forensic Data Extraction (다차원 네트워킹을 적용한 선박 블랙박스에서 Forensic자료 생성)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.387-390
    • /
    • 2009
  • Digital devices that apply Ubiquitous-IT Convergence in ship manufacture are used as ship automation device. Need sailing data recording of ship black box that equip integrity and consecutiveness as legal confesser fare that inquire responsibility whereabouts of disaster such as fire of ship. It is research that create Forensic data from ship black box using Multidimensional networking that use ZigBee radio short distance communications division Wireless LAN with short distance RFID sensor that is used in ship in this treatise, UWB communication, GPS and artificial satellite. Sailing recording of shipping that is recorded to black box is transmited, and stores doubly by real time on ship insurance company and ship administration recording membrane using SHA-1 hash function and secure consecutiveness and integrity as Forensic data through artificial satellite encoding by 3DES 1024bit.

  • PDF

A Study on Stability of Internet Information Resources for Academic Communications in LIS Domain of Korea (학술 커뮤니케이션을 위한 인터넷 정보자원의 안정성에 대한 연구 - 국내 문헌정보학 분야를 중심으로 -)

  • Kim, Sungwon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.3
    • /
    • pp.45-62
    • /
    • 2019
  • Rapid development and dissemination of ICT have brought about vast change in people's lives, including academic research and communication. Considering that the purpose of constructing Internet was to facilitate information exchange among research institutions and to secure stability through distributed preservation of critical information of the countries, increase in utilizing Internet resources for academic research seems to be natural consequences. This study examines the stability of Internet information resources by analyzing the following four factors. First, monitoring whether there is a change in accessibility to information resource as time passes. Second, examining various factors affecting the accessibility. Third, checking if there is a change in the content of information, if still accessible. Lastly verifying if any alternative access path is provided in case of original resource is no longer accessible.