• Title/Summary/Keyword: secure transmission

Search Result 429, Processing Time 0.029 seconds

Physical Layer Security for Two-Way Relay NOMA Systems with Energy Harvesting

  • Li, Hui;Chen, Yaping;Zou, Borong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2094-2114
    • /
    • 2022
  • Due to the wide application of fifth generation communication, wireless sensor networks have become an indispensable part in our daily life. In this paper, we analyze physical layer security for two-way relay with energy harvesting (EH), where power splitter is considered at relay. And two kinds of combined methods, i.e., selection combining (SC) and maximum ratio combining (MRC) schemes, are employed at eavesdropper. What's more, the closed-form expressions for security performance are derived. For comparison purposes, this security behaviors for orthogonal multiple access (OMA) networks are also investigated. To gain deeper insights, the end-to-end throughput and approximate derivations of secrecy outage probability (SOP) under the high signal-to-noise ratio (SNR) regime are studied. Practical Monte-Carlo simulative results verify the numerical analysis and indicate that: i) The secure performance of SC scheme is superior to MRC scheme because of being applied on eavesdropper; ii) The secure behaviors can be affected by various parameters like power allocation coefficients, transmission rate, etc; iii) In the low and medium SNR region, the security and channel capacity are higher for cooperative non-orthogonal multiple access (NOMA) systems in contrast with OMA systems; iv) The systematic throughput can be improved by changing the energy conversion efficiency and power splitting factor. The purpose of this study is to provide theoretical direction and design of secure communication.

A Study of TRM and ATC Determination for Electricity Market Restructuring (전력산업 구조개편에 대비한 적정 TRM 및 ATC 결정에 관한 연구)

  • 이효상;최진규;신동준;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.3
    • /
    • pp.129-134
    • /
    • 2004
  • The Available Transfer Capability (ATC) is defined as the measure of the transfer capability remaining in the physical transmission network for further commercial activity above already committed uses. The ATC determination s related with Total Transfer Capability (TTC) and two reliability margins-Transmission Reliability Capability (TRM) and Capacity Benefit Margin(CBM) The TRM is the component of ATC that accounts for uncertainties and safety margins. Also the TRM is the amount of transmission capability necessary to ensure that the interconnected network is secure under a reasonable range of uncertainties in system conditions. The CBM is the translation of generator capacity reserve margin determined by the Load Serving Entities. This paper describes a method for determining the TTC and TRM to calculate the ATC in the Bulk power system (HL II). TTC and TRM are calculated using Power Transfer Distribution Factor (PTDF). PTDF is implemented to find generation quantifies without violating system security and to identify the most limiting facilities in determining the network’s TTC. Reactive power is also considered to more accurate TTC calculation. TRM is calculated by alternative cases. CBM is calculated by LOLE. This paper compares ATC and TRM using suggested PTDF with using CPF. The method is illustrated using the IEEE 24 bus RTS (MRTS) in case study.

Secure VPN Performance in IP Layers (IP계층에서의 VPN 전송성능에 관한 연구)

  • 임형진;권윤주;정태명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.102-112
    • /
    • 2001
  • This paper analyzes Security Performance and Processing Performance to measure performance between nodes by using AH and ESP protocol. IPsec VPN provides application with security service implemented in IP Layer while traffic cost and packet processing time it increased by encryption, decryption and authentication in AH and ESP. We measured overall packet processing time and IPsec module processing time. The result of the efficiency test showed that the factors of influencing electrical transmission efficiency were the size of electrical transmission packets, codes used for tunnelling, authentication functions, CPU velocity of host7, and the embodiment of IPsec; for a high capacity traffic, IPsec transmission was not appropriate, because transmission velocity was delayed by more than ten times in comparison with Non-IPsec.

  • PDF

A Study on the Hazard Factor and Safety Management at Transmission Line During Live Line Works (송전선로 직접활선공법의 위험요인과 안전대책에 관한 연구)

  • Choi, Seung-Dong;Kang, Kyong-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.3
    • /
    • pp.51-66
    • /
    • 2006
  • This study was attempted to analyze risk factors and suggest accident prevention in live line works for power transmission lines to be developed and applied in Korea. Safety problem cannot but occur at development of live line works and application to the field. With respect to this, problems likely to occur in the field among works adopting methods of works including live line works for power transmission lines were investigated and analyzed through documentary survey and risk assessment method. The results are summarized as follows. A risk assessment method model was suggested. This method enables scientific and systematic development of safety control. That is, the owner may autonomously induce safety control and build risk assessment database by work process to use them as best training data for workers. Also, in the field, it may induce all workers to participate in safety program and secure safety by making workers seek for safety working method under smooth flow from looking at risk factors to accident prevention activities. It is deemed that this humble study will prevent both accident and injury likely to occur in live line works for power transmission lines.

The Transmission Direction and Tasks of Ssireum as a National Intangible Cultural Heritage (씨름의 국가무형문화재 전승방향 및 과제)

  • Kwak, Nak-hyun
    • (The)Study of the Eastern Classic
    • /
    • no.67
    • /
    • pp.203-236
    • /
    • 2017
  • The objective of this study is to suggest the transmission direction and tasks of Ssireum, and the conclusions are like below. First, Ssireum has been designated as a national intangible cultural heritage(No.131) in December 2016. Second, in the current status of preservation and spread of Ssireum, there is no system related to the transmission of Ssireum such as cultivation of professional manpower, and facilities, programs, and administration/finance for transmitting Ssireum. Third, based on the "Intangible Cultural Heritage Preservation & Promotion Act", the transmission direction of Ssireum was suggested. (1)The designation of a college to transmit Ssireum would be needed. (2)The Ssireum curriculum should be established. (3) It would be necessary to secure trainees for transmitting Ssireum. (4)The production of teaching materials for transmitting Ssireum would be needed. (5)It would be needed to secure training institutes designated in each region and also teaching personnels for transmitting Ssireum. (6)The research direction for the correct transmission of Ssireum should be set up. Fourth, based on the "Ssireum Promotion Act", the transmission direction of Ssireum was suggested. (1)It is urgent to complement provisions for transmitting Ssireum. (2)For the transmission of Ssireum, instead of the transmission direction of Ssireum as a national intangible cultural heritage in the standardized perspective, it would be necessary to seek for the joint transmission direction between South & North Korea for research & documentation of Ssireum that could be systematized/shared between South & North Korea, development/spread of contents for discovering the original form of Ssireum, and the establishment of a base of transmission system for the preservation/promotion of Ssireum through the academic/institutional exchanges regarding Ssireum between South and North Korea. Moreover, the overall and fundamental transmission measures for the education, transmission, research, record, and informatization of Ssireum, and the cultivation of professional manpower should be established. Fifth, the contents of institutional tasks for Ssireum are like following. (1)The institutional complementation of the "Ssireum Promotion Act" should be done for the domestic/foreign promotion of Ssireum. (2)For the integration of Ssireum organizations, the administrative system should be unified. (3)The standard technical system manual for Ssireum should be produced. (4)The 'Ssireum Transmission Center' should be built for the preservation and systematic transmission of Ssireum. (5)The selection of a college for transmitting Ssireum and the establishment of a system to cultivate Ssireum successors should be done. (6)It would be necessary to establish database(DB) for the use of Ssireum techniques essential for the transmission of Ssireum.

Attachment Representations in Korean-American Mothers and Their College Students : Intergenerational Transmission (성인 애착 표상의 세대간 전이 : 미주 한인 1세대 어머니와 대학생 자녀를 중심으로)

  • Lee, Goh-Eun;Lee, Young
    • Korean Journal of Child Studies
    • /
    • v.32 no.4
    • /
    • pp.63-81
    • /
    • 2011
  • The purpose of this study was to examine the first generation Korean-American mothers' attachment representation as well as the attachment representation of their second generation Korean-American college students. The subjects consisted of 25 first generation Korean-American mothers and 27 second generation college students residing in Los Angeles. The Adult Attachment Interview (George, Kaplan, & Main, 1985) was used for assessing attachment representation patterns. The results of this study were as follows. First, 36% of the subject mothers were classified as secure, 64% were insecurely attached and there was no unresolved/disorganized pattern in the insecure group. Second, 33% of the subject students were classified as secure. 67% were insecure on the AAI, and there was 4% unresolved/disorganized patterns in the insecure group. Third, a difference of 76% was found between the correspondence between the first generation Korean-American mothers' attachment representation pattern and the attachment representation of the second generation Korean-American college students.

Efficient Image Chaotic Encryption Algorithm with No Propagation Error

  • Awad, Abir;Awad, Dounia
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.774-783
    • /
    • 2010
  • Many chaos-based encryption methods have been presented and discussed in the last two decades, but very few of them are suitable to secure transmission on noisy channels or respect the standard of the National Institute of Standards and Technology (NIST). This paper tackles the problem and presents a novel chaos-based cryptosystem for secure transmitted images. The proposed cryptosystem overcomes the drawbacks of existing chaotic algorithms such as the Socek, Xiang, Yang, and Wong methods. It takes advantage of the increasingly complex behavior of perturbed chaotic signals. The perturbing orbit technique improves the dynamic statistical properties of generated chaotic sequences, permits the proposed algorithm reaching higher performance, and avoids the problem of error propagation. Finally, many standard tools, such as NIST tests, are used to quantify the security level of the proposed cryptosystem, and experimental results prove that the suggested cryptosystem has a high security level, lower correlation coefficients, and improved entropy.

A Model-Based Analysis of Secure Video Transmission Based on IPSec and IPv4

  • Van, Quang-Dao;Wei, Anne;Geller, Benoit;Dupeyrat, Gerard
    • ETRI Journal
    • /
    • v.27 no.2
    • /
    • pp.219-222
    • /
    • 2005
  • A promising solution to protect wired Internet networks is to use the Secure Internet Protocol (IPSec); however, this has some drawbacks, particularly on the quality of service (QoS). This paper aims at evaluating the video traffic QoS in terms of end-to-end delay and packet loss rate. Based on some basic assumptions, our analysis shows that the performance with IPSec is rapidly inferior to the IPv4 performance. We thus suggest adding some QoS parameters into IPSec in order to achieve a compromise between QoS and security.

  • PDF

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.