• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.026 seconds

To study the preservation technology and a secret-sign technology (전자상거래를 위한 보안기술 및 암호기술에 대한 연구)

  • 김영호;조정길
    • Proceedings of the KAIS Fall Conference
    • /
    • 2001.11a
    • /
    • pp.220-223
    • /
    • 2001
  • 본 논문은 인터넷과 통신매체의 확산과 더불어 최근에는 기업간, 기업과 정부간에 주로 정형적인 문서교환에 활용되던 초기의 EDI(Electronic Data Interchange)가 멀티미디어 정보교환이 가능한 인터넷의 보급, 확산과 함께 소비자를 대상으로 하는 전자상거래(EC : Electronic Commerce)로 급속히 확산되고 있으며, 이를 지원하기 위해 기업의 정보화 기반을 구현하는 ERP(Enterprise Resource Planning)도 요구되고 있다. 그러나, 전자상거래는 네트워크를 통하여 형성되므로 사용자들은 서로 만나지 않고 거래하게 된다. 이는 전자상거래의 장점이기도 하지만, 반대로 상호간의 신분에 대한 인증이 쉽지 않다는 단점이 된다. 본 논문에서는 이러한 위험을 방지하기 위한 보안기술 및 암호기술에 대해 연구하고자 한다.

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network (온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향)

  • Moon, Yun Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.294-301
    • /
    • 2017
  • Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

A Neural Network-Based Tracking Method for the Estimation of Hazardous Gas Release Rate Using Sensor Network Data (센서네트워크 데이터를 이용하여 독성물질 누출속도를 예측하기 위한 신경망 기반의 역추적방법 연구)

  • So, Won;Shin, Dong-Il;Lee, Chang-Jun;Han, Chong-Hun;Yoon, En-Sup
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.38-41
    • /
    • 2008
  • In this research, we propose a new method for tracking the release rate using the concentration data obtained from the sensor. We used a sensor network that has already been set surrounding the area where hazardous gas releases can occur. From the real-time sensor data, we detected and analyzed releases of harmful materials and their concentrations. Based on the results, the release rate is estimated using the neural network. This model consists of 14 input variables (sensor data, material properties, process information, meteorological conditions) and one output (release rate). The dispersion model then performs the simulation of the expected dispersion consequence by combining the sensor data, GIS data and the diagnostic result of the source term. The result of this study will improve the safety-concerns of residents living next to storage facilities containing hazardous materials by providing the enhanced emergency response plan and monitoring system for toxic gas releases.

  • PDF

Designation of Logical Bicycle Accident Dangerous Zone by Digital Map-Based Accident Characteristics Analysis (디지털 맵 기반 사고특성 분석을 통한 자전거 사고 논리 위험존 설정 연구)

  • Sung, Kwang-mo;Kim, Ki-cheol;Lee, Choul-ki;Kim, Sung-jin;Lee, Jung-uck
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.1
    • /
    • pp.117-130
    • /
    • 2017
  • Bicycles are leading to serious accidents in the event of a side collision, and it is very important to prevent accidents in advance because it is difficult to actively deal with them in a dangerous situation. As a part of the bicycle safety driving support technology, this study establishes bicycle accidents dangerous zone based on bicycle accident data and road property information of digital map nationwide and provides timely safety information to cyclists. The point selected by using actual accident data was called 'dangerous zone', and the potential accident occurrence point generated by modeling based on this 'dangerous zone' was called 'logical dangerous zone'. As a result of the research on the Designation of Logical Bicycle Accident Dangerous Zone, the regional specificity of the bicycle accident points across the nation was generalized to the form of the logical dangerous zone through the network data.

A Study on Security System of 4G Network System (4세대 네트워크 시스템의 보안시스템에 관한 연구)

  • Kim, Hee-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.15-23
    • /
    • 2016
  • In this paper we presented 4G security models in an open environment. 4G networks have still more security holes and open issues for expert to notice. In here. we show that a number of new security threats to cause unexpected service interruption and disclosure of information will be possible in 4G due mainly to the fact that 4G is an IP-based, heterogeneous network. it tells about the security issues and vulnerabilities present in the above 4G standards.. we try to present several architectures behind 4G infrastructure for example WiMAX and 3GPP LTE architecture. Finally, we point to potential areas for future vulnerabilities and evaluate areas in 4G security which warrant attention. When you make a big dada program, If you use this network architecture then you can improve your learning speed.

A Study of Fire Shunt Guidance Based on Wireless Sensor Networks (무선 센서 네트워크 기반의 화재 대피 유도 연구)

  • Kim, Yong-Woo;Kim, Do-Hyeon;Kwak, Ho-Young;Park, Hee-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1547-1554
    • /
    • 2008
  • This paper proposes a fire shunt guidance system model based on rule, it presents suitable shunt route in real-time according to collected fire information of the building inside using wireless sensor networks. So, this system model is composed of the sensor alert module, the behavior suggestion module, and the emergency device control module. The sensor alert module uses rule-base algorithm that monitored the information to collect periodically in wireless sensor networks. And, the behavior suggestion module proposed a suitable behavior, this module supports to judge the fire area with danger sensor list. Additional, the emergency device control module controls a related emergency device according to the suggested behavior and to present on a control screen. We experiment the fire shunt guidance system based on Internet Web for operation verification of the proposed system. Consequently, this study supports people safety with the behavior suggestion according to the context information when an emergency situation happens.

  • PDF

A Solution for Reducing Transmission Latency through Distributed Duty Cycling in Wireless Sensor Networks (무선 센서 네트워크에서 수신구간 분산 배치를 통한 전송지연 감소 방안)

  • Kim, Jun-Seok;Kwon, Young-Goo
    • 한국ITS학회:학술대회논문집
    • /
    • v.2007 no.10
    • /
    • pp.225-229
    • /
    • 2007
  • Recently, wireless sensor networks are deployed in various applications range from simple environment monitoring systems to complex systems, which generate large amount of information, like motion monitoring, military, and telematics systems. Although wireless sensor network nodes are operated with low-power 8bit processor to execute simple tasks like environment monitoring, the nodes in these complex systems have to execute more difficult tasks. Generally, MAC protocols for wireless sensor networks attempt to reduce the energy consumption using duty cycling mechanism which means the nodes periodically sleep and wake. However, in the duty cycling mechanism. a node should wait until the target node wakes and the sleep latency increases as the number of hops increases. This sleep latency can be serious problem in complex and sensitive systems which require high speed data transfer like military, wing of airplane, and telematics. In this paper, we propose a solution for reducing transmission latency through distributed duty cycling (DDC) in wireless sensor networks. The proposed algorithm is evaluated with real-deployment experiments using CC2420DBK and the experiment results show that the DDC algorithm reduces the transmission latency significantly and reduces also the energy consumption.

  • PDF

Advanced Protocols and Methods of Robot Collision Avoidance for Social Network Service (로봇의 소셜 네트워크 서비스를 위한 프로토콜 및 충돌회피 방법)

  • Shin, Seok-Hoon;Hwang, Tae-Hyun;Shin, Seung-A;No, In-Ho;Shim, Joo-Bo;Oh, Mi-Sun;Ko, Joo-Young;Shim, Jae-Chang
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.931-940
    • /
    • 2012
  • Social networking services which spreading rapidly is a system using interrelationship of people by internet or mobile. SNS is a network system of the human-centered. In this paper, in order to make robot become a member of social networks we studied the necessary elements and formation. For robot with communication function and sensing, autonomous, collision avoidance method and communication protocol is needed to let Robot share the present conditions dangerous or special situation. We realized this after investigating necessary sensor for SNS, studying robot's collision-avoidance method, and defining protocol of robot for SNS. Also, we suggested and implemented the wired and wireless integrated communications method.

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

Incentive Mechanism based on Game Theory in Kad Network (Kad 네트워크에서 게임 이론을 바탕으로 한 인센티브 메커니즘)

  • Wang, Xu;Ni, Yongqing;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.43-52
    • /
    • 2010
  • The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. Nowadays, the Kad network has attracted wide concern as a popular architecture for file sharing systems. Meanwhile, many problems have been coming out in these file sharing systems such as freeriding of users, uploading fake files, spreading viruses, and so on. In order to overcome these problems, we propose an incentive mechanism based on game theory, it establishes a more stable and efficient network environment for Kad users. Users who share valuable resources receive rewards by increasing their credits, while others who supply useless or harmful files are punished. This incentive mechanism in Kad network can be used to detect and prevent malicious behaviors of users and encourage honest interaction among users.