• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.028 seconds

Security and Privacy Protection of Vehicle-To-Grid Technology for Electric Vehicle in Smart Grid Environment (스마트 그리드환경에서 전기자동차 양방향 충전기술의 보안과 개인정보 보호에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.441-448
    • /
    • 2020
  • With help of Vehicle-to-Grid(V2G) technology battery in electric vehicle can be used as distributed energy resource and energy storage in a smart grid environment. Several problems of security vulnerability and privacy preservation can be occurred because V2G network supports 2 way communication among all components. This paper explains and makes analysis of architecture, privacy sensitive data, security vulnerability and security requirement of V2G system. Furthermore efficient architecture and operating scheme for V2G system are proposed. This scheme uses symmetric cryptosystem and hash algorithm to support privacy preservation and mutual authentication.

Role based access control of healthcare information system for Mobile environments (모바일 환경에 적합한 헬스 케어 정보 시스템에서의 역할기반 접근제어)

  • Lee You-Ri;Park Dong-Gue
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.119-132
    • /
    • 2005
  • The health care system revolutionized by the use of information and communication technologies. Computer information processing and electronic communication technologies play an increasingly important role in the area of health care. We propose a new role based access control model for pervasive health care systems, which changed location, time, environment information. Also our model can be solved the occurrence of an reduction authority problem to pervasive health care system at emergency environment. We propose a new role based access control model for pervasive health care systems, which combines role-to-role delegations, negative permission, context concept and dynamic context aware access control. With out approach we aim to preserver the advantages of RBAC and offer groat flexibility and fine-grained access control in pervasive healthcare information systems.

  • PDF

Design and Implement of a Certification System for Digital Contents Circulation and Secure (디지털 콘텐츠 유통 및 보호를 위한 인증 시스템 설계 및 구현)

  • 고병수;장재혁;최용락
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.3
    • /
    • pp.1-8
    • /
    • 2003
  • The growth of Internet is the main factor that activates the Digital Contents Market. However the Digital Contents Market could be shrunk by an illegal reprinting and imprudent using. Therefore we urgently need a new technology which can prevent the contents from illegal using, illegal reprinting and imprudent using. We developed the system prohibits a imprudent using in order to activate the Digital Contents Market. We developed the system protects the contents safely by removing the dangerous for the illegal reprinting with providing the encoded contents and the system removes the contents according to the number of usage and the user authentication through Network.

  • PDF

USN, M2M 서비스 융합과 발전 전망

  • Lee, Seong-Hyeon;Nam, Dong-Gyu
    • Information and Communications Magazine
    • /
    • v.28 no.9
    • /
    • pp.3-9
    • /
    • 2011
  • 본고에서는 급속히 성장하고 있는 M2M 서비스의 융합과 발전을 위해 어떤 걸림돌이 있으며, 무엇을 준비해야 하는지에 대해 알아보고자 한다. 지난 1T839 정책에서 3대 인프라의 하나로 정의된 USN이 본격 확산에 미흡했던 사항에는 어떤 것들이 있었으며 당시 기술적인 환경과 서비스 사례를 통해 2% 부족했던 것들은 되짚어 보고, USN이 현재 시점에 가지는 의미를 찾아보고자한다. USN 서비스가 활성화 되던 시점에 M2M의 기반기술이라고 할 수 있는 (W)CDMA 등 광역 무선망 기술과의 접목이 어려웠던 부분과 USN의 다양한 근거리 무선 네트워크 기술들이 USN 서비스를 완벽히 구현하고 확산까지 갈 수 없었던 미흡했던 이유를 알아보고자 한다. 또한 M2M의 시작배경에는 어떠한 의미가 있으며, 현재에서 바라본 M2M은 시작과 비교해서 달라진 점이 무엇이며 현재에 요구되는 M2M은 무엇인지에 대해 논의해보고자 한다. 이와 함께 M2M의 다양한 정의와 현재의 M2M을 비교해보고 M2M이 급속히 증가하고 있는 이유들을 찾아본다. M2M 서비스를 크게 나누면 텔레매틱스와 텔레매트리로 나눌 수 있으며 최근에는 차량 관련된 분야에 M2M 서비스가 급속히 증가되고 있는데 해외의 eCall 서비스와 국내의 DTG 연계 M2M 서비스, 국가위험물관리 등 국내외 차량관련 M2M 서비스 사례를 분석해 보고, RFID/USN+LBS+M2M의 융복합 서비스 진화에 대해 알아보고자 한다. 끝으로 M2M 시대의 시대적 요구사항을 반영하여 M2M의 활성화를 위해서 필요한 공공과 민간의 역할을 짚어보고, 우리가 준비해야할 것에 대해 제언하고자 한다.

A History-Based Mobility Prediction Algorithm for Vertical Handover (Vertical 핸드오버를 위한 과거 이동 경로 기반의 이동성 예측 알고리즘)

  • Joe, In-Whee;Hong, Sung-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5A
    • /
    • pp.536-541
    • /
    • 2008
  • This paper proposes a mobility prediction algorithm for the effective handover among hybrid networks. The proposed algorithm is consisted of two mechanisms to predict a mobile terminal's path. First, the mobile terminal will be checking its received signal power level. Then the mobile terminal will judge its path in some network. Second, if the mobile terminal change its path suddenly, it will be dealing with this situation appropriately using the mobile terminal's speed. This paper introduces existing researches and the proposed algorithm. Finally, our algorithm is compared with existing approaches in terms of the handover delay by using the network simulator OPNet version 10.0.

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

Attack Categorization based on Web Application Analysis (웹 어플리케이션 특성 분석을 통한 공격 분류)

  • 서정석;김한성;조상현;차성덕
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.97-116
    • /
    • 2003
  • Frequency of attacks on web services and the resulting damage continue to grow as web services become popular. Techniques used in web service attacks are usually different from traditional network intrusion techniques, and techniques to protect web services are badly needed. Unfortunately, conventional intrusion detection systems (IDS), especially those based on known attack signatures, are inadequate in providing reasonable degree of security to web services. An application-level IDS, tailored to web services, is needed to overcome such limitations. The first step in developing web application IDS is to analyze known attacks on web services and characterize them so that anomaly-based intrusion defection becomes possible. In this paper, we classified known attack techniques to web services by analyzing causes, locations where such attack can be easily detected, and the potential risks.

Assessment of Risk in Wireless-Wired Network Based Control of Indoor Air Quality (IAQ) in Subway Stations (유무선 네트워크기반 지하철역사 공기질 제어의 위험성 평가)

  • Choi, Gi Heung
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.1
    • /
    • pp.1-6
    • /
    • 2014
  • With increasing number of citizen using subway stations everyday, safety, health and comfort of passengers and occupants became an important social issue. Considering the fact that various physical variables and pollutants are related to indoor air quality (IAQ) which may cause health problem, IAQ need to be closely monitored and controlled in multiple locations in subway stations. This study is a continuation of the previous studies and delay induced in wireless-wired network is experimentally evaluated and the risk involved is assessed. In doing that, a key parameter is identified to be the network delay in different network media. Application of information-theoretic measure to assess the risk in network delay is then discussed. The idea is based on the general principles of engineering design and their applications to quantification of uncertainty in network delay. Experimental results show that more risk is involved in wireless data communication. Efficient and fast conversion of transmission data in both LonWorks/IP server and ZL converter is also noted.

A Study on the Worm.Virus Attack Technique of Cyber Warfare (사이버 정보전 웜.바이러스 공격 기술 연구)

  • 김환국;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.776-779
    • /
    • 2004
  • With the rapid progress of information technique, it is getting more difficult to protect information systems from cyber terrorism, because of bugs and vulnerabilities of software and the properties of cyberspace such as anonymity. furthermore cyber terror techniques are highly developed and complicated and their use for a malicious intent and a military purpose are increasing recently. Therefore a study of warfare attack technology on the cyber space is necessary for establishing trusted society and further national security. Specially, worms/viruses are becoming a more common occurrence on the cyber space. Also, The worm caused a great deal of damage to the large number of networks around the world in a very short period of time. Therefore, we will describe worms/viruses in the warfare attack technique in this paper.

  • PDF

A study and design of monitoring module for schoolzone safety (스쿨존 안전관리를 위한 감시모듈 연구 및 설계)

  • Park, Sang-Joon;Lee, Jong-Chan;Jang, Dea-Sic;Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1940-1946
    • /
    • 2011
  • In this paper, we propose a method of schoolzone safety to the protection and management of accident and crime of school circumstance that it is increased recently. Hence, sensor network based intelligent monitoring module must be considered for schoolzone safety. It is not simple CCTV monitoring, but it means that the ability extension is proposed to monitor the dangerous situation for the risk management. Hence, this paper proposes the design of monitoring module considering various danger situations that can be occurred around the school.