A Scheme of Improving Propagation Attack Protection and Generating Convergence Security Token using Moire

무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법

Lee, Su-Yeon;Lee, Keun-Ho

  • Received : 2018.11.29
  • Accepted : 2019.02.20
  • Published : 2019.02.28


Due to diversification and popularization of devices that use rapid transmission, there are many security issues related to radio waves. As the disturbance and interference of the radio wave can cause a direct inconvenience to a life, it is a very important issue. In this paper, as a means to prevent radio disturbance and interference, the projected image of the reference grid and the deformed grid is obtained by measuring the projected $moir{\acute{e}}$ using the white light source, projecting grid and the light source, and a $moir{\acute{e}}$ pattern is generated with an image processing algorithm by applying a phase diagram algorithm, and generated $moir{\acute{e}}$ pattern phase diagram creates a three-dimensional shape. By making an encrypted token using this measured face shape, the transmission of the information through token ring is determined in order to transmit the horizontal transmission having the dynamic security characteristics which includes authentication strength and caller information, etc. And by confirming the uniqueness of the token and by sending and receiving the horizontal transmission using java serialization and deserialization function, a problem solving method is suggested.


Moire;jamming;security token;security radio wave;horizontal radio wave


  1. G. G. Kim & D. S. Kim, (2001). An Analysis of Anti-jamming Capability of Frequency Hopping Satellite Communication Systems, The Journal of Korean Institute of Communications and Information Sciences, 26(1), 34-41.
  2. K. S. Kang & C. S. Kim. (2017). Mutual Coupling Compensation and Direction Finding for Anti-Jamming 3D GPS Antenna Array, The Korean Institute of Communications and Information Sciences, 723-730. DOI : 10.7840/kics.2017.42.4.723
  3. D. W. Lim. (2013). Case Study of Incidents by GPS Interferences and Trend for Monitoring Techniques, Current Industrial and Technological Trends in Aerospace, 11(1), 169-176.
  4. E. J. Kang & B. J. Park. (2009). A Study on Enhancing the Performance of Detecting Lip Feature Points for Facial Expression Recognition Based on AAM, PKorea Information Processing Society), 299-308. DOI : 10.3745/KIPSTB.2009.16-B.4.299
  5. W. J. Ryu, Y. J. Kang, H. M. Rho & D, H. Lee. (2005). A Study on 3-D Shape Measurement and Application by using Digital Projection Moire (I), Journal of the Korean Society for Precision Engineering, 22(7), 88-93. DOI : 10.1016/j.ijleo.2006.12.016
  6. W. J. Ryu, Y. J. Kang, H. M. Rho & D. H. Lee. (2007). A Study on 3-D Shape Measurement and Application by Using Digital Projection Moire (II), Journal of the Korean Society for Precision Engineering, 24(5), 62-67.
  7. W. J. Ryu & Y. J. Kang. (2005). Shape Measurement Method by using Moire Phenomenon, Journal of the Korean Society for Precision Engineering, 22(4), 7-12.
  8. C. R. Seo, J. P. Lee, K. H. Lee, Y. B. Jeon & J. S. Park, (2017), A Proposal for Improvement of Detection of User Based on Facial Authentication Using Digital Projection Moire, KIPS_C2017B0117, 366-367.
  9. P. S. Jeong & Y. H. Cho, (2018). User Authentication System based on Auto Identification and Data Collection, Journal of the Korea Institute of Information and Communication Engineering, 22(1), 75-82. DOI : 10.6109/jkiice.2018.22.1.75
  10. Y. W. Moon, D. S. Pan & S. B. Seo. (2011). A Practical Implementation of Fuzzy Fingerprint Vault, KSII Transactions on Internet and Information Systems, 5(10), 1783-1798 DOI : 10.3837/tiis.2011.10.006
  11. S. H. Han. (2008). A Study on certification plan on Radio Frequency Identification for Airplane Use, Aerospace Engineering and Technology, 7(1), 236-244.
  12. S. P. H & S. J. Han, (2012). Wireless LAN System based on IEEE 802.1x EAP-TLS Authentication Mechanism, The Korea Institute of Information and Commucation Engineering, 16(9), 1983-1989. DOI : 10.6109/jkiice.2012.16.9.1983
  13. Y. J. Kim, D. S. Moon, S. B. Pan, Y. W. Chung & K. I. Chung. (2003). Implementation of Embedded Biometrics Technologies: A Case of a Security Token for Fingerprints, The Institute of Electronics Engineers of Korea - Computer and Information, 40(6), 39-46.
  14. B. K. Lee, M. S. Kim & J. H. Seo. (2015). Design and Implementation of The Capability Token based Access Control System in the Internet of Things, Journal of the Korea Institute of Information Security & Cryptology, 25(2), 439-448. DOI : 10.13089/JKIISC.2015.25.2.439
  15. S. A. Park, C. J. Chae, H. J. Cho & J. K. Lee. (2012). Public Key Infrastructure of Electronic Bidding System using the Fingerprint Information, Journal Of The Korea Contents Association, 12(2), 69-77. DOI : 10.5392/JKCA.2012.12.02.069


Supported by : National research Foundation of Korea(NRF), Korea Sanhak Foundation