Skip to main content

2012 | Buch

Computer Applications for Security, Control and System Engineering

International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings

herausgegeben von: Tai-hoon Kim, Adrian Stoica, Wai-chi Fang, Thanos Vasilakos, Javier García Villalba, Kirk P. Arnett, Muhammad Khurram Khan, Byeong-Ho Kang

Verlag: Springer Berlin Heidelberg

Buchreihe : Communications in Computer and Information Science

insite
SUCHEN

Über dieses Buch

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

Inhaltsverzeichnis

Frontmatter
Novel Compositing Method for Quantification of Wireless Network Security

Network security quantification techniques are required by many organizations because they are very effective at highlighting malicious threats. In most cases, however, research in this area has not been accessible by administrators and clients thus far. For this reason, the accessibility of security reports should be considered with the intention of making such reports concise and readable. This paper suggests a novel compositing method for the quantification of wireless network security as an approach to simplifying security reports.

Sungmo Jung, Jong Hyun Kim, Seoksoo Kim
Obfuscation Method for Location Trajectory

In this paper, we propose an obfuscation scheme for the information contained in a trajectory of locations. The scheme requires no trusted entity for the obfuscation. The scheme includes two obfuscation methods,

amplification

and

amalgamation

, which obfuscates time-location information into a cylinder.

Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
Performance of Physical Unclonable Functions with Shift-Register-Based Post-processing

Physical unclonable functions (PUFs) are encoded in the unique physical structure of a system, which stems from process variation, and represent a minimalistic yet secure alternative for authentication on integrated circuits. However, the amount of randomness in the PUF output could be a significant limitation. However, by passing the PUF response to a shift register, the randomness of the PUF output could be greatly increased while maintaining reliability. Here we discuss the performance of an arbiter- and ring-oscillator-type PUF with a simple shift register from the viewpoint of biometrics. Experimental results show that authentication with the shifted response data is superior to that with non-shifted data.

Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh
A Pseudo State-Based Distributed DoS Detection Mechanism Using Dynamic Hashing

As distributed denial-of-service (DDoS) attacks have caused serious economic and social problems, there have been numerous researches to defend against them. The current DDoS defense system relies on a dedicated security device, which is located in front of the server it is required to protect. To detect DDoS attacks, this security device compares incoming traffic to known attack patterns. Since such a defense mechanism cannot prevent an influx of attack traffic into the network, and every packet must be compared against the known attack patterns, the mechanism often degrades the service. In this paper, we propose a pseudo state-based DDoS detection mechanism using dynamic hashing scheme, which runs on network devices to defend against DDoS attacks without sacrificing performance in terms of data forwarding. The proposed mechanism is suitable for both low- and high-rate attacks. In addition, we verified the performance of the proposed mechanism by evaluating its performance using a DDoS attack similar to the one that occurred in Korea and the USA on July 7th, 2009.

PyungKoo Park, SeongMin Yoo, Su-il Choi, Jaehyung Park, Ho Yong Ryu, JaeCheol Ryou
An Engineering Environment for Supporting Information Security Management Systems

Information Security Management Systems (ISMSs) have been playing an important role to help organizations managing their information securely. However, organizations facing many challenges in from establishment phase to optimization phase of ISMSs because organizations have to perform a lot of tasks with various participants and manage a vast amount of documents. As a result, it is difficult for an organization to establish and maintain a good and effective ISMS. This paper proposes an engineering environment to support organizations with ISMSs which is an engineering environment that integrating various support tools to provide organizations with comprehensives facilities to perform all tasks in ISMS life cycle processes consistently and continuously based on ISO/IEC 27000 series standards.

Ahmad Iqbal Hakim Suhaimi, Yuichi Goto, Jingde Cheng
Multiple Watermark Generation Using Dot Code A and Hadamard Transform for Audio Content

In this paper, we propose an audio watermarking algorithm for embedding information of multiple users into audio content in order to trace illegal distribution. The information is generated by Dot Code A, which can express multiple user information with error correction. A Hadamard transform is used to spread Dot Code A. This also ensures the algorithm is robust. The embedding range of the AC coefficients is within [-0.5, -0.3] and [0.3, 0.5] in the discrete cosine transform domain. At an embedding strength of 0.7, the signal-to-noise ratio of the test audio is over 53 dB, and we are able to extract the Dot Code A from the watermarked audio exactly.

Jizhe Cui, Jungjae Lee, Jongweon Kim
Modeling of a Copyright Protection System for the BitTorrent Environment

In this paper, we investigate the problem of copyright infringement in the peer-to-peer (P2P) environment, and propose a method of protection against piracy. The P2P software BitTorrent has become the main tool used to pirate copyright materials. Thus, we study the bit torrent packet itself in order to detect the destination and source of the piracy. The torrent meta-file is also analyzed to identify copyright material. As a result, we propose a system model for copyright protection against BitTorrent piracy. Our system consists of a hash database and protocol analyzer, a torrent meta-file crawler, and a copyright identifier.

Jungjae Lee, Jongweon Kim
Security Enhancements of an Improved Timestamp-Based Remote User Authentication Scheme

Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2011, Awasthi et al. proposed an improved timestamp-based remote authentication scheme to remove the drawbacks of Shen et al.’s scheme. In this paper, we show that Awasthi et al.’s scheme is vulnerable to the user impersonation attack, the password guessing attack, the insider attack and does not provide mutual authentication. Also, we propose the enhanced scheme to overcome these security drawbacks, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is relatively more secure than the related scheme in terms of security.

Younghwa An
Symbian Smartphone Forensics: Linear Bitwise Data Acquisition and Fragmentation Analysis

In this paper, we propose a forensics evidentiary acquisition tool for the Symbian smartphones. We design and build the acquisition tool to support a low-level bit-by-bit acquisition of the phone’s internal flash memory, including the unallocated space. After acquiring the raw image of the phone’s memory, we conduct experiments and analysis to perform a detailed study of the fragmentation scenarios on the Symbian smartphone. The objective of this work is to create a complete evidentiary data acquisition tool for the Symbian smartphone, analyse the latest Symbian OS version, S60 5th Edition smartphone (i.e. find out how user’s data files are being stored on the phone) and to provide a better understanding for the purpose of further in-depth mobile phone forensics evidence reconstruction and security analysis.

Vrizlynn L. L. Thing, Tong-Wei Chua
Enhanced Hash-Based RFID Mutual Authentication Protocol

Radio frequency identification (RFID) system is a promising automatic identification technology that uses communication via radio waves to identify and track moving objects. Privacy and security concerns inhibit the fast adaption of RFID technology for many applications. A number of authentication protocols that address these concerns have been proposed but real-world solutions that are secure and maintain low communication cost are still needed and being investigated. Recently, Cho et al. proposed a hash-based RFID mutual authentication protocol and the protocol is secure. However, this paper proposes an enhanced hash-based RFID mutual authentication protocol to remedy the desynchronization problem in the previous protocol. This protocol requires little computation and achieves both privacy and authentication, making it sufficient enough for use in supply chain management.

Hyunsung Kim
Modeling Multiple Modes of Operation with Alloy

Specification (or modeling) languages can be very handy in describing certain aspects of a system and check properties of interest about it. Also, once a model is constructed, one is able to use the associated analyzer to create examples and/or counterexamples to explore hypotheses posed about the system. In the context of cryptography this verification process is of great importance as it can contribute towards finding weaknesses and assessing system’s robustness. This paper capitalizes on the well-known Alloy language to model and analyze attacks on DES triple modes namely ECB∣ECB∣CBC

− 1

and ECB∣OFB∣OFB. We model attacks described in [5] and show that they can be fruitful in the general case. This work can serve as a framework in modeling similar cryptosystems and assessing certain attacks on them.

Christos Kalyvas, Elisavet Konstantinou, Georgios Kambourakis
Non-interactive Hierarchical Key Agreement Protocol over Hierarchical Wireless Sensor Networks

Wireless sensor networks (WSNs) have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. Key agreement in WSNs is a critical security issue due to their unattended and hostile deployment. Recently, Guo et al. proposed an efficient and non-interactive hierarchical key agreement protocol applicable to mobile ad-hoc networks. However, their protocol could not be applied to the WSNs as it is due to the WSN’s uniqueness. Thereby, we propose a non-interactive hierarchical key agreement protocol over the hierarchical WSNs. Our revision could support security and robustness over the hierarchical WSNs.

Hyunsung Kim
Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform

As electronic technology has been developing, a number of ship- and shore-based electronic devices has been used for vessels such as Automatic Identification System(AIS), Electronic Chart Display and Information System(ECDIS), Long Range Identification and Tracking(LRIT) systems. In addition, internet technology is being adopted for safe, economic and efficient movement of vessels and maritime disasters. Therefore electronic gadgets on a vessel and protocols between vessel traffic systems need to be standardized. e-Navigation is a concept developed under the auspices of the UN’s International Maritime Organization (IMO) to bring about increased safety and security in commercial shipping through better organization of data on ships and on shore, and better data exchange and communication between the two. In this paper, we propose the design based on IVEF that has been developing as the protocol for e-Navigation’s data communication. And we show the implementation. We used the smart-phone adopted Android platform for the emulation of a voyaging ship and the desktop computer for the emulation of a VTS.

Kyunghwan Kim, Byung-Doo Kim, Byunggil Lee, Namje Park
Security Issues and Threats According to the Attribute of Cloud Computing

Cloud computing is one of the key current issues in the IT industry. Concern over the security of cloud computing has particularly been the subject of continuous disputes. Such security issues have magnified because of the attribute of cloud computing. This paper will observe the security issues according to the attribute of cloud computing and introduce which countermeasures are needed to strengthen the security which is the key problem that impedes the adoption of cloud computing.

Hyangjin Lee, Jeeyeon Kim, Youngsook Lee, Dongho Won
Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology

STEAM education allows students to improve themselves in cognitive and affective domains in math․science. Visualizing and storytelling science as described above is a good approach towards learning science in an easy and exciting way. Aware of such, our paper plans to advocate convergence curriculum to nurture students’ creativity, problem-solving skills and ultimately support them to become a creative talent built on convergence.

Yeonghae Ko, Jaeho An, Namje Park
The Effect of STEAM Education on Elementary School Student’s Creativity Improvement

Lately, education on convergence and invention from the perspective of cultivating ingenious talents is becoming increasingly critical. The time has come for us to establish goal and content structure of convergence education based on its theoretic framework and link it with various contests on creativity education to promote innovative convergence and invention education at schools. This paper aims to establish the theoretic framework of convergence education based on education activities using Rube Goldberg Machines both home and abroad, identifying its link with invention education at schools and educational benefits to eventually examine if they do contribute to boosting creativity.

Yilip Kim, Namje Park
Security Improvement on a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment

In 2012, Kim et al. analyzed Martinez-Pelaez et al.’s dynamic IDbased remote user authentication scheme with session key agreement for multiserver environment. They described that Martinez-Pelaez et al.’s scheme is vulnerable to masquerade attack, server spoofing attack, stolen smart card attack, and is not easily repairable. In this paper, we show how to solve the vulnerabilities in Martinez-Pelaez et al.’s scheme.

Mijin Kim, Namje Park, Dongho Won
An Analysis of Effects and Benefits of STS Model Based on Universal Design for Learning

STS(Science Technology in Society) emphasizes interaction between science and technology, impact of scientific and technological advancement on a society, and vice versa. Application of STS approach at school can have quite a few benefits. For example, by introducing social issues in science education, teachers can give a more comprehensive and larger picture of the scientific system for the students. Social issues usually have interdisciplinary elements, and form a complex system. Further, STS can reveal real-life aspect of science, as it addresses scientific facts and technologies that have a direct bearing upon the society.

Hyunsoo Lee, Namje Park
Program Development of Science and Culture Education Tapping into Jeju’s Special Characteristics for Adults

STS (Science and Technology in Society) is about seeing science and technology from a historic and social perspective. It observes the social impact of science and technology, and citizens should develop such perspective in order to make a proper judgment on social issues related to science and technology. This makes STS program for adults a part of a life-long education after compulsory education. This paper proposed a comprehensive program design by developing adult-only STS programs and analyzing overseas cases under the theme of communicating science and culture.

Gyujung Kim, Namje Park
A Study on the Learner Participation Interaction for Multi-modality Integration for Smart Devices

This paper suggests a method to provide the users with better experiences in designing the products with integration of multiple functions and multitasks in aspects of modality. The studies on modality and interruption were carried out from the perspective of cognitive burden on the users when the modality before and after tasks are the same in continuous tasks based on multiple resource theory. Based on this, this study attempted to examine the multitasking support and types of modalities of tasks as well as the interruption orders and frequency when an interruption occurs during a task and how they affect the task performance.

Jun Wook Lee, Gyujung Kim, Namje Park
A Practical Study on Advanced Persistent Threats

Recently, many Advanced Persistent Threats (APTs) have emerged. APTs persistently collect information and data on a specific target using diverse attack techniques, examine the vulnerabilities of the target, and then carry out hacking using the data and examination result. An APT is very intelligent, as it selects a clear target and carries out specific attacks, unlike traditional hacking attempts. The APT has a very precise attack type because it employs indirect attacks on the terminals of the employees working for the target, as well as direct attacks. For this reason, it is very difficult to detect and handle an APT. In this paper, the recent attack methods used by APTs are described, and the attack pattern is analyzed to propose efficient countermeasures for preventing and handling APTs.

Inkyung Jeun, Youngsook Lee, Dongho Won
Individual Information Protection in Smart Grid

Smart grid is a new electricity grid which transmits and distributes electricity intelligently by converging the information technology into the traditional electricity grid. Recently, the smart grid projects are promoted rapidly because the ‘Green IT’ becomes more and more interesting. However, Modernization of the grid will increase the level of personal information detail available as well as the instances of collection, use and disclosure of personal information. This paper’s proposals will contribute the smart grid security and guarantee promotion of the smart grid.

Jun Wook Lee, Namje Park
A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security

Various computing technologies involving wireless sensors, Internet, personal computers, and mobile devices are coming together to create machine-to-machine (M2M) communications. As modern mobile devices continue to approach the capabilities and extensibility of standard desktop workstations and servers, mobile devices are also beginning to face many of the same security threats as desktops and servers experience. An enabler for security issues in mobile devices is virtualization, an established technology in the desktop and server domains. In this paper, we address the security challenges by presenting a virtualization technique in M2M communications for cloud computing security. Then virtualization technique serves as security control mechanism for mobile devices which provides strong protection against the identified mobile threats as well as performance efficiency. The mobile virtualization approach and its elements are discussed in detail taking into account the existing limitations of mobile devices. This paper aims to spend bandwidth resources to significantly reduce on-device CPU, memory, and power resources using extremely lightweight technology. Our result shows that the virtualization technique enhances mobile security and reduces on-device software complexity.

Giovanni Cagalaban, Seoksoo Kim, Minho Kim
A Multilevel Security Framework for Cloud-Based Ubiquitous Healthcare Application Service

In this paper, the need for security mechanisms for healthcare domains with appropriate levels of protection is addressed. Specifically, we design security framework for multiple level of security in a ubiquitous healthcare service provisioning based on cloud computing. The goal is to provide a localized and dynamic security structure of a typical cloud computing communication for patient data access, storage, transmission, and processing as well as provide security and privacy risk mitigation strategies in ubiquitous health serve provisioning.

Giovanni Cagalaban, Donghyun Kim, Seoksoo Kim, E-Jung Choi
A Study on Android-Based Real Number Field Elliptic Curve Key Table Generation

Encryption algorithms are used to protect data, but encrypted data depend on the safety of the key used in the encryption algorithm, so it is very important to generated a key that cannot be easily inferred for a safer protection of data. For this, in order to broaden the choice of keys used in encryption algorithm, this paper proposed the method to generate a key table by expanding the previously proposed elliptic curve algorithm to real number field, and the proposed method was applied to Android-based smartphone cryptosystem for verification.

Eun-hee Goo, Seung-dae Lee
A Study on Governing Law Arising from Cyber Intellectual Property Disputes in Korea

With rapid IT technology developments in the world, many users can enjoy the benefits of some body’s intellectual property easily in cyber space. But when it comes to the use of business, there are disputes over the intellectual property right (IPR) in various respects. Infringement upon IPRs may happen in the several countries simultaneously. If the disputes contain foreign matters, a problem arises as to which country or rule shall be applied as the governing law. In this respect, Korea set a provision, but it was not clarified as to the scope and intention. But this has been cleared through several court cases. The court should, however, be cautious in applying

lex loci protectionis

in IPR disputes as IPR is much more complicated with the involvement of a number of foreign factors simultaneously.

Ki-Moon Han, Younsik Shin, Woong Eun
Impedance Control for Body Motion of Quadruped Robot

One of the basic assumptions in the conventional wave gait for a walking robot is that the weight of a leg should be negligible compared to that of body, so that the total gravity center of the robot is always kept inside of the support polygon, not affected by a motion of a leg. In case that a leg is relatively heavy, however, while the gravity center of the body is kept inside of the support polygon, the total gravity center can be out of the support polygon due to moving leg, which causes instability in walking. In this paper, an impedance control for body motion is proposed to make the total gravity center of a quadruped robot track the pre-designed trajectory for the gravity center of the body, so that the walking stability is secured even in case that the weight of a leg has serious influence on the total gravity center of the robot.

Sooyeong Yi
Model Reduction of Bilinear System Using Balanced Singular Perturbation

This paper is concerned with generalize model order reduction using the balanced singular perturbation for bilinear system. We first transform the bilinear system to be balanced realization and then we divide the state into the fast and the slow mode. By setting the velocity of the fast mode equal to zeros, we obtain the bilinear system with lower order. To verify the proposed method, the simulation is carried out on a nonlinear RC circuit and the results show that this method is able to approximate a high order model is similar to the balanced truncation method.

Roberd Saragih, Fidya Indah Dewanti
On Benchmarking the Predictability of Real-Time Mechanisms in User and Kernel Spaces for Real-Time Embedded Linux

Benchmarking the response time of real-time mechanisms is a good measure for predicting the performance of real-time systems. We report on analysis results obtained by comparing the response characteristics of real-time mechanisms in the kernel space to those in the user space for real-time embedded Linux: RTAI and Xenomai. Evaluations were performed on a semaphore, real-time FIFO, and Mailbox and Message queue. The periodicity of tasks was relatively consistent in the kernel space and Xenomai performed better than RTAI in the user space. For real-time mechanisms, the response times in the kernel space were better at low latencies. In Xenomai, the semaphore showed a good response time in both the kernel and user space, but real-time FIFO in RTAI showed a faster response. These results are promising for the estimation of deterministic real-time task execution to implement real-time systems using real-time embedded Linux.

Jae Hwan Koh, Byoung Wook Choi
Design of Adaptive Friction Control of Small-Scaled Wind Turbine System Considering the Distant Observation

The aim of this research is to reduce down the angular velocity against strong wind during the storm considering the distant observation. Our expectation of this small-scaled wind turbine is to operate continuously even in storm days. However, since the small-scaled wind turbine consists of small blade, it may exceed the limitation of angular velocity in storm condition due to the low inertia moment and consequences of centrifugal force. So it would be broken down the system. Our target is to somehow reduce down the angular velocity using the stall factor control. Stall factor control mainly used in the junction of axis of blade of wind turbines gear wheel. Subsequently, the stall factor is operated when the angular velocity exceeds the limitation. Therefore, adaptive controller is designed and in order to evaluate the angular velocity’s behavior phase space method is introduced. As consequences, the stall factor preserves the stability and angular velocity performs under desired value constantly.

Faramarz Asharif, Shiro Tamaki, Tsutomu Nagado, Tomokazu Nagtata, Mohammad Reza Alsharif
Analysis of the Optimal Capacity and Energy Consumption of the Dynamic Braking Resistor

The motor block braking resistor of the high speed train is a railroad car component that causes the problems of the grinding and burning of the resistance steel and the cracking of the insulator while the train is running, and that damages the movement chopper, which affects the traction inverter. To remedy these problems of the motor block braking resistor, this research presents a new braking resistor model to help enhance the reliability of braking and energy saving, by calculating and analyzing the action cycle, optimal capacity, and energy consumption of the existing braking resistor model, and to obtain technological capabilities to secure stable functioning so as to enhance and guarantee the quality and life of the railroad car components in the course of designing the braking resistor.

Dae-Dong Lee, Jae-Myung Shim, Dong-Seok Hyun
Structure Vibration Analysis by Active Noise Control of Power Transformer

Most cases of power transformer failure are caused by physical factors linked to the transient vibrations of multiple 120 Hz combinations. In addition, the noise generated in the transformer from this vibration not only directly contributes to the worsening of the work environment but also causes psychological stress, resulting in the worsening of the workers’ efficiency and of the living environment of the inhabitants around the power plant. Thus, to remedy these problems, the mechanical-excitation forces working on a power transformer were categorized in this study, and the mechanical-damage mechanism was identified through the vibration transfer paths acting on machines or structures. In addition, a study on active noise cancellation in a transformer using the FXLMS algorithm was conducted to develop a system that is capable of multiple-sound/channel control, which resulted in the active noise reduction effect when applied on the field.

Young-Dal Kim, Jae-Myung Shim, Keun-Seok Park, Yun-Mi Jeong, Dae-Dong Lee
A Fuzzy Adaptive Fading Kalman Filter Approach for Accuracy Improvement of a Laser Interferometer

The advantage of a laser interferometer is in a high resolution required especially in extremely sensitive nano-metrology. However, there are some restrictions to overcome for precision measurement. One of the problems is a nonlinearity error. In this paper, we compensate for the nonlinearity error by applying the fuzzy adaptive fading Kalman filter (FAFKF) algorithm. To demonstrate the effectiveness of the proposed FAFKF algorithm, we simulated with a real system model. Experimental results show the improved accuracy and reliability.

Pyeongjun Kim, Joohyun An, Kwanho You
Study on the Resonant HF DC/DC Converter for the Weight Reduction of the Auxiliary Power Supply of MAGLEV

One of the major trends in traction power electronics is increasing the switching frequencies. The advances in the frequency elevation have made it possible to reduce the total size and weight of the passive components such as capacitors, inductors and transformers in the DC/DC converter and hence to increase the power density. The traction dynamic performance is also improved. This paper describes several aspects relating to the design of resonant DC/DC converter operating at high frequency (10 kHz) and the converter topologies and the control method of maglev, which result in soft switching, are discussed.

Kyoung-Bok Lee, Seounng-Gil Baek, Yeonho Jung, Won Seok Choi
The Development of Functional Requirement for ICT-Based Train Control System

Recently, system innovation has been accomplished with the application of relative technologies in various fields in accordance with the development of ICT(Information & Communication Technology), and the railway field is no exception also. Especially, it is expected that the significance and effect of study to plan the enhancement in safety and operational efficiency of train operation by converging train control fields into ICT will be very great. In this paper, we explained a study on development of the new concept on-board centered train control system through convergence of ICT into train control field as the relative study currently under progress in Korea.

Baek Jonghyen
Development of the On-Board Centered Train Control System to Enhance Efficiency of Low-Density Railway Line

In the low-density branch line section of domestic railway, the necessity for development of new concept on-board centered train control system which can control the trackside equipment directly from the on-board of train is on the rise since it is problematic in the aspect of efficiency because of its operation in deficits, etc. in accordance with the operation of high-priced wayside equipment being applied to main lines. Accordingly, this paper proposed an on-board control system which can minimize wayside equipment and replace the existing system with it simultaneously by grafting the advanced domestic Information & Communication Technology(ICT), and presented contents of performing confirmation of function through results of concept and detailed design and by building model test environments.

Jo Hyunjeong, Kim Gonyop, Baek Jonghyen, Lee Kangmi, Yongkyu Kim
Design of a Current-Mode Bandpass Filter with Controllable Cutoff Frequency

In this paper, a bandpass filter with controllable cutoff frequency is designed by using current mode synthesis method which is good to design the low-voltage and low-power filter. The designed bandpass filter is composed of cascade connection between 3

rd

Butterworth highpass filter and 3

rd

Chebychev lowpass filter. And as a core circuit in the current-mode filter, a current-mode integrator and differentiator are designed and apply to designing filters. The cutoff frequency of the designed 6

th

bandpass filter can be controlled to 120kHz~54MHz according to control voltage, 0.7V~1.5V.

Junho Bang, Jeho Song, Myeongjun Noh, Inho Ryu
Monitoring and Control of Energy Consumption Using Smart Sockets and Smartphones

In this paper, we present a way of monitoring and controlling energy consumption of electronics and devices using smart sockets and smartphones. We developed wireless smart power sockets which can measure power consumption of electrical devices, and transmit the collected data set to a gateway connected to a host server. A Java-based program running on the host server puts the received data set into MySQL-based database tables, and a Web interface using JSP (JavaServer Pages) offers access to the data set stored in the database. In addition to energy consumption monitoring, energy use of devices and electronics can be controlled by turning on and off relays embedded into smart sockets. We send smart sockets the command signal through an Android-based smartphone app we developed, which changes control values of smart sockets that are registered in database. It also offers the functionality of displaying energy consumption graphs in real-time on smartphones. We hope to encourage users to recognize how much energy they are using, but also help them save energy use by remotely controlling everyday electronics and devices.

Jaeseok Yun, Sang-Shin Lee, Il-Yeop Ahn, Min-Hwan Song, Min-Woo Ryu
Development and Accuracy Evaluation of GPS Data Processing Automation Module

Actually, software used for GPS data processing has its result according to user’s skill. Also, it takes much time and effort for general user to make a normal user of GPS data processing software. Accordingly, this research developed the automation module of GPS data processing that even general users can interpret the location at a professional level. Automation module made possible decision of precise position based on C# and Bernese 5.0, and performed the interpretation of precise position of the national GPS observatory for the precise evaluation of developed module. The research calculated the deviation within 0.020m by X,Y,Z and result of RMSE less than ±0.021m, and presented its application. Based on the research result, the future web based GPS data processing service development will be able to contribute to GPS related area but also for general user to interpret the precise position, and reducing the dependence upon foreign software would reduce the economic loss and contribute to raising the national economy.

Joon-Kyu Park, Min-Gyu Kim, Jong-Sin Lee
Micro Auto Blogging System by Using Granular Tree-Based Context Model

This paper suggests an automatic blogging system based on context cognition technology considering the context of a user’s location and time. This system is modeled by preprocessing and combining user context and using granular tree. This modeled context infers user’s behavior by using Naive Bayes Classification and user’s destination by using sequence matching technique. Sentences that fit situations are generated and automatically blogged using 4W structure. The evaluation of blogging sentences shows 85.7% accuracy on average and verifies that the context modeling technique that suggests automatic blogging is effective.

Il-Kyoung Kwon, Sang-Yong Lee
Design Strategy of Smart Phone-Based Diabetic Patient Management System

With the advent of the internet and wireless technology, a worldwide communication system is available enabling people to communicate at anytime and anywhere and to exchange information online. Telemedicine systems have been proposed for nearly two decades as a means of supporting patients with chronic medical diseases such as diabetes and high blood pressure. In this paper we propose a strategic approach method for diabetic patient management system based on smart phone. The proposed method is categorized into three categories which are a hardware design, a software design and a social network service. At the strategy of a hardware design, we focus on the convenient use of a diabetes measurement system, so the data communication between a smart phone and a diabetes measurement system must be a wireless and we also focus on the patient- customizing software at the software design strategy. And the bidirectional clinical data communication between a patient and a hospital must be a real-time by the social network service.

Youngseok Lee, Soonkwan Hong, Myungwoo Nam
Implementation of Smart Classroom Information Display System Using RFID

In this study, we have implemented smart classroom information display system with 13.56MHz of RFID, in order to identify and distinguish individual users through RFID tag UID and to provide various services to the users. This system efficiently manages RFID and Database information through MS-SQL and provides specialized RFID services to the applications. RFID smart classroom information display system focuses mainly on individual student identification, timetable, lecture plans, announcements, entry through password confirmation and the system was manufactured so that students are identified through direct matching of student id information in UID tag with that in the student information database.

Jae-Wook Kim
Consumer Preference for Smart-Phones Based on NLP Primary Senses

This research analyzes the correlation between user’s behavioral patterns based on preferred sensory organs and their preference for smart phones so that smart phone developers may have better idea of which user types to focus on in the future. First, The participants were divided into four types: visual-preferred V, auditory-preferred A, kinesthetic-preferred K, and auditory-digital-preferred D. This research did NLP survey to find out people’s preference for smart phones. The result of this research indicated that, in terms of NLP primary preferred sense types, those who prefer Galaxy phones and i-Phones did not differ by much in their responses, however; in terms of individual types, almost 60% of type V, which is about 25.8% of the whole demographic, preferred i-Phone. On the other hand, type A, D, and K tend to prefer Galaxy phone. In fact, 13 out of 20 type K subjects preferred Galaxy phone over i-Phone and that is about 14% of the whole demographic.

Young Ju Lee
Study on the Smart Logistics System to Curb CO2 Emission of Shipping Trucks

For this study, researchers designed a real-time Green Smart Logistics System which collects Track and Trace data from electronic tachometers installed in the shipping trucks of 3PL companies before processing, searching and managing the collected data. After the design is finished, a test was conducted on the logistic network of a shipping company, targeting to reduce an amount of CO2 emission by optimizing the company’s shipping route and operation of logistic centers. This will provide a realistic logistic target to be reflected in establishing an enterprise-wise logistic strategy. This study aimed to develop a competitive and efficient integrated logistics control system capable of rationalizing the enterprise logistics.

Do-Chul Lee, Hye-Jeong Ahn, Byung-Jun Song
Design of Interval Type-2 Fuzzy Relation-Based Neuro-Fuzzy Networks for Nonlinear Process

In this paper, we introduce the design of interval type-2 fuzzy relation-based neuro-fuzzy networks (IT2FRNFN) for modeling nonlinear process. IT2FRNFN is the network of combination between the neuro-fuzzy network (NFN) and interval type-2 fuzzy set with uncertainty. The premise part of the network is composed of the fuzzy relation division of input space and the consequence part of the network is represented by polynomial functions with interval set. And we also consider genetic algorithms to determine the structure and estimate the values of the parameters. The proposed network is evaluated with the nonlinear process.

Dong-Yoon Lee, Keon-Jun Park
Preparation of Colloidal Nickel Particles by Polyol Process

Colloidal Ni particles were prepared by polyol process. Colloidal Pt particles were used as seed. PVP and poly(acrylic acid, sodium salt) were used as stabilizers for Ni particles. When PVP was used as a stabilizer, resulting colloidal Ni particles were partially precipitated within 10 days. In case of poly(acrylic acid, sodium salt), stable colloidal Ni particles could be obtained through the formation of protective shell by esterification reaction between ethylene glycol and poly(acrylic acid, sodium salt).

Dae-Wook Kim, Seong-Geun Oh, Seung-Bo Shim, Yong-Jin Chun
A Current-Mode Filter for Analog Front End of Power Line Communication

In this paper a 6

th

1 MHz~30 MHz bandpass filter for power line communication (PLC) modem receiver is designed by using current mode synthesis method which is good to design the low-voltage and low-power filter. The designed bandpass filter is composed of cascade connection between 3

rd

Butterworth highpass filter and 3

rd

Chebychev lowpass filter. As a core circuit in the current-mode filter, a current-mode integrator is designed with new architecture which can improve gain and unity gain frequency of the integrator. The gain and the unity gain frequency of the designed integrator is each 32.2 dB and 247 MHz. And the cutoff frequency of the designed 6

th

bandpass filter can be controlled to 50 MHz from 200 kHz according to controlling voltage and the power consumption is 2.85 mW with 1.8 V, Vdd. The designed bandpass filter was verified using a 0.18

μm

CMOS parameter.

Junho Bang, Inho Ryu, Taehyung Kim, Byungmoon So, Jeho Song, Jaeyoung Yu, Myeongjun Noh, Woochoun Lee
Development of RF Communication System for Rehabilitation Device

Since diverse rehabilitation devices for people with disabilities are wired for data processing, they accompany difficulties in terms of spatial use due to complicated installation and configuration. Accordingly in this study, based on cost reduction considering economic feasibility and development of medical engineering technology, an RF communication system was developed to not only transfer various data produced by rehabilitation devices to medical staffs in remote locations but also to directly transmit appropriate exercise prescriptions by rehabilitation experts to rehabilitation devices. In particular using RF transceiver module at ISM frequency band in low power wireless stations, data processing between multiple electric bicycles and one PC was made possible.

Hyoung-Keun Park, Seong-Gon Kim
A Size-Reduced Wilkinson Power Dividers Using Defected Microstrip Structure

A size-reduced Wilkinson power divider is designed using defected mcirostrip structure (DMS). DMS patterns are inserted for the desirable effects of periodic structure such as size-reduction and increased line width for high characteristic impedance. As an example of circuit application, a DMS is adopted in a microwave Wilkinson power divider. The microstrip line with DMS is designed first for the 70.7Ω line impedance. The line width of 70.7Ω with DMS is wider than that of normal microstrip line. The size of designed power divider with DMS patterns is only 82% of normal power divider composed of standard microstrip lines, while the circuit performances are well preserved even after the size-reduction.

Jongsik Lim, Yuckhwan Jeon, Kyunghoon Kwon, Jeseung Yoo, Yongchae Jeong, Dal Ahn
A Development of Algorithms Curriculum Using Robotics

Even though algorithms education is an important area which influenced to develop a fundamental aspect in information industry, it has suffered too much. To solve this problem, it motivated to appear an additional way with prohibiting usage of computer programs while it uses robots especially in modern society. However, in previous studies, the usage of robots for existing algorithms education were extremely limited. Because algorithms education based on data structure was not appropriate. In this study, we proposed five areas of algorithm design patterns which is unrelated to the data structure but with an operating robots. Because we expected a better result of the algorithms education through a visual expression with the Pico robotics than the previous one.

Jin-Hee Ku, Soo-Bum Shin, Jeong-Beom Song
Comparison the Combination of Different Power Generators with Photovoltaic Panels and Batteries

Nowadays, the use of solar panels to generate electricity is common. Given the discontinuous nature of solar energy, use of batteries to store energy in a day and supply it at night is essential. But by using one auxiliary system can reduce the number of solar panels and cost and increase reliability. In this study, the combination of different auxiliary system by solar panels and batteries compare in terms of economic, ecological and reliability. Auxiliary systems are diesel generator, gas generator, solid oxide fuel cell (SOFC) and micro gas turbine. Of course, in this study the effect of fuel price and the effect of technology development in SOFC cost have been considered. A multi-objective evolutionary algorithm was used to obtain the best solutions of every configuration. The evolutionary algorithm is Pareto Envelope-based Selection Algorithm (PESA).

S. Sadeghi, M. Ameri
Refinement of Diffusion Profiles in TCAD for Calibrated and Predictive MOSFET Simulations

Calibrated TCAD tool is useful in new device engineering activities as this feature could guide the user to accurately predict the actual measurement result even from the simulation data. This paper presents a methodology to improve the accuracy of calibrated TCAD tool for MOSFET device with respect to diffusion profile refinement. Physical parameters such as channel and halo diffusion, interstitial injection for source-drain extension and dose loss near gate oxide are involve in the analysis. The comparisons between measured and simulated data of critical electrical parameters from both calibrated data with and without the related improvement are presented for the verification purposes. The proposed methodology is applied into the actual process fabrication to show the significant of the presented refinement parameters.

Muhamad Amri Ismail, Mohd Hezri Abu Bakar, Khairil Mazwan Mohd Zaini, Iskhandar Md Nasir
Simulation and Fabrication of Extended Gate Ion Sensitive Field Effect Transistor for Biosensor Application

In this paper, we present the Extended Gate Ion Sensitive Field Effect Transistor (EGFET) which has a same function as the Ion Sensitive Field Effect Transistor (ISFET). In contrast to the traditional ISFET, the EGFET retains the original metal/polysilicon portion of the gate electrode and the sensing membrane is deposited on the other end extended from the metal/polysilicon gate. This type of ion sensor is suitable for in vivo and in vitro measurement, especially for biosensor applications. Basic concept, fabrication techniques and process/device characterization of EGFET for biosensor development will be discussed in this paper. To support the fabrication process, a simulation study of the process flow using the CoventorWare simulator and the Silvaco Athena process simulator has been done. The results showed good current-voltage characteristics of a multi-finger structure transistor suitable to be used for biosensor transducer.

Mohd Rofei Mat Hussin, Razali Ismail, Ismahadi Syono
A Multicarrier CDMA Communication System with Adaptive Transmission Power Allocation

We propose a multicarrier code-division multiple-access (MC-CDMA) system with adaptive transmission power allocation. The transmission power is allocated over

M

strongest subcarriers among

M

available ones. Using only

M

′ subcarriers of which channel gains are relatively large indicates that the transmission power to maintain the desired received signal strength can be reduced, but decreasing

M

′ also lead to a reduction of effective spreading gain to mitigate the multiple access interference. We analyze the trade-off between

M

′ and effective spreading gain, and find the optimal

M

′ that minimizes the average bit error rate (BER). Our results show that the BER can be significantly reduced if

M

is properly chosen, and transmit signals over only the strongest subcarrier (

M

=1) is the best especially for low SNR regions.

Ye Hoon Lee
Joint Rate and Power Adaptation Strategies in DS/CDMA Communications over Fading Channels

We consider combined rate and power adaptation schemes in direct-sequence code division multiple access (DS/CDMA) communications, where the transmission power and the data rate are jointly adapted relative to channel variations. We propose to allocate the transmission power proportional to

$G_i^p$

, where

G

i

is the channel power gain and

p

is a real number, and to adapt the data rate simultaneously so that a desired transmission quality is maintained. We analyze the average data rate of the proposed adaptation scheme, and show that the proposed joint adaptation scheme provides up to 3.7–5.4 and 1.5–3.2 dB of power gains over power only adaptation and rate only adaptation, respectively, when peak-to-average power ratio is 2 to 10, in a Rayleigh fading channel with

δ

= 0.5, where

δ

is the decaying exponent of multipath intensity profile (MIP).

Ye Hoon Lee
Efficient Feedback Signaling Methods for Double STTD in Rayleigh Fading Channels

We examine efficient feedback signaling schemes in adaptive double space-time transmit diversity (STTD) systems over Rayleigh fading channels. In adaptive double STTD systems, transmit power weights are adaptively adjusted relative to channel fading based on the feedback information. In our paper, the optimum power weights are determined, which are functions of the number of feedback bits and the modulation size employed. We apply symmetric and asymmetric modulation methods in each space-time block encoder in cooperation with adaptive antenna weights. It is shown that the performance of adaptive double STTD with asymmetric modulations depends on the number of available feedback bits, while the same system with symmetric modulations has a relatively robust performance to variable feedback bits.

Ye Hoon Lee
Fast Correction of Multiple Soft Errors in Highly Associative Cache with CAM-Based Tag

Content addressable memory (CAM) is a key component to build the tag memory of a highly associative cache. As CMOS process technology scales,soft error rates (SER) in CAM cells increase significantly. Bit flipping in CAM cell leads to a false miss upon a cache access, which could be fatal from a system point of view. Previous schemes either focused on reducing the probability of soft errors or had an unbounded single soft error correction time. Compared with previous schemes, our approach completely detects and corrects multiple soft errors. The detection and correction in our scheme happens as a background process, does not interfere with concurrent cache accesses, and does not affect the performance of time-critical cache operations. In addition, we enhance the cache miss holding register structure of a non-blocking cache to avoid data corruption due to any false cache miss happening between occurrence and correction of errors.

Hyuk-Jun Lee, Seung-Cheol Kim, Eui-Young Chung
Propagation Effects of Power Supply Fluctuation in Wireless Power Amplifiers

In this paper, the effect of power supply fluctuations on the output of wireless power amplifier has been estimated. Because of the high trans-conductance of power amplifiers, deviations in power supplies may cause serious performance degradation on the output power of the amplifier. Therefore, by approximating the propagation theory of uncertainties and by simulating the effect of the fluctuation in the drain and gate voltages, the sensitivities on the output power was calculated. Then, the combined fluctuation in the output power as well as the contribution from each fluctuation sources are estimated with respect to the deviation of DC gate and drain biases. Therefore, the analysis on an amplifier of 31 dBm output power was performed with 10 % fluctuations in DC biases, and the combined overall fluctuation in the output power was estimated to have about 3.39 % deviation from the nominal value.

Youngcheol Park, Hoijin Yoon
Analysis and Control of Uncertainty in Wireless Transmitting Devices

This paper presents a mathematical approach to estimate the measurement uncertainty in wireless transmitting devices. Although there have been efforts to estimate the uncertainty in measurements of analog circuits, very few about the analytical estimation on wireless transmitter has been published. Therefore, the overall uncertainty in the output power of a transmitting device is presented in this paper from the circuit configuration. Based on the mathematical analysis on the sensitivity and the propagation of uncertainties, the total uncertainty in the output power with respect to the variation of input parameters such as the load impedance, and the DC supplies for the gate the drain bias are addressed. As a result, 5.63 % of uncertainty in the output power of a RF transmitter is estimated, to which the uncertainty at the gate DC bias contributes the most.

Youngcheol Park
A Study on the Development of Policy and Strategy on the Public Health Center in Korea: Based on the Opinion of the Policy Administrators and Public Health Workers

This survey was conducted with 106 workers in health centers and 150 policy administrators to activate the regional health programs of health centers. In this study, for the assumed residents’ uncomfortable feelings, the location of center and outdated facilities and equipments were highly responded by both of the policy administrators and health centers’ employees. For the future improvements, the support of the professional manpower and the improvement of facilities and equipments were highly responded in policy administrators while in centers’ employees, local residents’ educational campaign and the improvement of facilities and equipments were responded highly. Regarding the current function of centers, administrators responded that the vaccination and the education and campaign about health promotion works are important while centers’ employees answered that visiting cares, elderly-health care works and health promotion practice are significant.

Kyung-hee Kang, Moo-Sik Lee
What is the Relationship between Physical Health Status and Depression among the Elderly in Korea?

This study attempts to provide future directions for a strategy to manage the health of the elderly, including the treatment of depression. The subject in this study were 139 elderly people older than 65 years age. Through our analysis, it was found that the health of females, older subjects, subjects living in rural communities, and subjects who were illiterate was worse than the health of other subjects. Subjects living in rural communities showed higher levels of depression than subjects in urban areas. Health status and depression were negatively correlated. Based on these results, it is believed that managing depression is a critical aspect of managing physical health. In addition it is thought that a strategy for health improvement and depression reduction is needed for women, elderly seniors, the elderly with low education, and especially, for the elderly who live in rural communities.

Hyoshin Kim, Chin Young Ran
Research on the Correlation of One’s Character Type on Emotional Character and Anti-stress of Students

This study is focused on the effects of one’s character type on emotional character and anti-stress by comparing each individual’s brain wave. Observed records are from those elementary, middle, high school students who volunteered for KRIJUS(Korea Research Institute of Jungshin Science)’s brain wave measurement from September 2006 to December 2010. The whole 6218 students (8-19 age) group consists of elementary 3948 and middle 1630, high school 840 students The result shown relations between the character types of students and their anti-stress, arousal, emotional. This study revealed meaningful relation between character types and anti-stress, emotional character among several categories, while suggesting follow-up researches figuring out more detailed explanations for its effect and genetic role.

Ki-Ja Bak, Sang-Kyun Ahn
Anonymous Authentication Protocol for Mobile Pay-TV System

With the integration of wireless communication and pay-TV, mobile broadcast TV technologies have advanced noticeably in recent years. In 2011, Chen et al. proposed an efficient anonymous authentication protocol for mobile pay-TV and claimed that their protocol is secure and efficient. However, Kim showed that their protocol has weaknesses in password guessing attack and impersonation attack with the assumption that attacker could get user’s smart card. Thereby, this paper proposes an anonymous authentication protocol to solve the flaws in Chen et al.’s protocol.

Hyunsung Kim, Sung Woon Lee
Secure Transport Container Monitoring Protocol with Container Anonymity

Since 9.11 terror attack in the United States, the smart container has attracted the attention because of the efficiency and safety of container freight shipping. In 2007, Lauf and Sauff proposed MASC-ST protocol for securely transmitting sensitive information gathered from sensors equipped in the transport container to a trusted third party that controls access to this information. Recently, Lee showed that the protocol has some weaknesses and also presented an improvement to overcome the weaknesses while preserving the merits of their scheme. However, these protocols did not consider the anonymity of container. So, the transport route of containers can simply be tracked by malicious attackers. In this paper, we propose a secure transport container monitoring protocol that is resistant against various attacks and is able to guarantee the anonymity of the container.

Sung-Woon Lee, Hyunsung Kim
Retraction Note to: Structure Vibration Analysis by Active Noise Control of Power Transformer

Retraction Note to: Chapter “Structure Vibration Analysis by Active Noise Control of Power Transformer” in: T.-h. Kim et al. (Eds.): Computer Applications for Security, Control and System Engineering, CCIS, DOI: 10.1007/978-3-642-35264-5_32The paper starting on page 234 of this volume has been retracted due to multiple publication.

Young-Dal Kim, Jae-Myung Shim, Keun-Seok Park, Yun-Mi Jeong, Dae-Dong Lee
Backmatter
Metadaten
Titel
Computer Applications for Security, Control and System Engineering
herausgegeben von
Tai-hoon Kim
Adrian Stoica
Wai-chi Fang
Thanos Vasilakos
Javier García Villalba
Kirk P. Arnett
Muhammad Khurram Khan
Byeong-Ho Kang
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-35264-5
Print ISBN
978-3-642-35263-8
DOI
https://doi.org/10.1007/978-3-642-35264-5

Premium Partner