• Title/Summary/Keyword: 데이터패스

Search Result 298, Processing Time 0.023 seconds

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

A Seamless N-Screen Service Technology for Disseminating Disaster Informations (재해정보 확산을 위한 끊김없는 N-스크린 서비스 기술)

  • Kim, Kyungjun;Park, Jonghoon;Kim, Chulwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.587-595
    • /
    • 2015
  • A by-pass path in wireless sensor networks is the alternative path which be able to forward data when a routing path is being broken. One reason of depleting energy is occurred by the path. The method for solving prior to addressed the problem is proposed. However, this method may deplete radio resource. The best path has advantage that network lifetime of sensor nodes is prolonged; on the contrary, in order to maintain the best path it have to share their information between the entire nodes. In this paper, we propose the best path searching algorithm in the distributed three dimensional sensor networks. Through the neighboring informations sharing in the proposed method, the proposed algorithm can decide the best k-path as well as the extension of network lifetime.

An Otimal Path Determination in 3D Sensor Networks (3차원 무선 센서네트워크에서 최적경로 선정)

  • Kim, Kyung-Jun;Park, Sun;Kim, Chul-Won;Park, Jong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1931-1938
    • /
    • 2012
  • A by-pass path in wireless sensor networks is the alternative path which be able to forward data when a routing path is being broken. One reason of depleting energy is occurred by the path. The method for solving prior to addressed the problem is proposed. However, this method may deplete radio resource. The best path has advantage that network lifetime of sensor nodes is prolonged; on the contrary, in order to maintain the best path it have to share their information between the entire nodes. In this paper, we propose the best path searching algorithm in the distributed three dimensional sensor networks. Through the neighboring informations sharing in the proposed method, the proposed algorithm can decide the best k-path as well as the extension of network lifetime.

The Performance Modeling of a Low Bypass Turbofan Engine with Afterburner for Supersonic Aircraft (후기연소기가 장착된 초음속 항공기용 저바이패스 터보팬 엔진 성능 모델링)

  • Choi, Won;Lee, Il-Woo;Yang, Jun-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.3
    • /
    • pp.269-278
    • /
    • 2011
  • The details of engine manufacturer's engine simulations are generally kept secret and only those parameters that are used for control purposes are accessible to users. Hence, there is often only a limited amount of data accessible for creating a performance model of the engine. The performance modeling of a low bypass turbofan engine for supersonic aircraft is described herein. The Pratt and Whitney F100-PW-229 engine has been employed for low bypass turbofan engine performance modeling. Published data from the open literature are used as initial data for building the F100-PW-229 engine performance model. The unknown components' characteristics were estimated by optimization of parameters using by adaptive random search method and sensitivity analysis with respect to design variables. The engine performance model was evaluated to be properly constructed through the comparison of result of engine performance analysis and engine deck data.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

a improved neighborhood selection of simulated annealing technique for test data generation (테스트 데이터 생성을 위한 개선된 이웃 선택 방법을 이용한 담금질 기법 기술)

  • Choi, Hyun Jae;Lee, Seon Yeol;Chae, Heung Seok
    • Journal of Software Engineering Society
    • /
    • v.24 no.2
    • /
    • pp.35-45
    • /
    • 2011
  • Simulated annealing has been studied a long times. And it is one of the effective techniques for test data generation. But basic SA methods showed bad performance because of neighborhood selection strategies in the case of large input domain. To overcome this limitation, we propose new neighborhood selection approach, Branch Distance. We performs case studies based on the proposed approach to evaluate it's performance and to compare it whit basic SA and Random test generation. The results of the case studies appear that proposed approach show better performance than the other approach.

  • PDF

An Informetric Analysis on Intellectual Structures with Multiple Features of Academic Library Research Papers (복수 자질에 의한 지적 구조의 계량정보학적 분석연구: 국내 대학도서관 분야 연구논문을 대상으로)

  • Choi, Sang-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.2
    • /
    • pp.65-78
    • /
    • 2011
  • The purpose of this study is to identify topic areas of academic library research using two informetric methods; word clustering and Pathfinder network. For the data analysis, 139 articles published in major library and information science journals from 2005 to 2009 were collected from the Korean Science Citation Index database. The keywords that represent research topics were gathered from two sections: an and titles in references. Results showed that reference titles usefully represent topics in detail, and combinings and reference titles can produce an expanded topic map.

Symmetric key based user authentication between Grid Service and Portal (그리드서비스와 포털간의 대칭키 기반 사용자 단일인증에 관한 연구)

  • Hwang, Dae-Bok;Heo, Dae-Young;Hwang, Sun-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.19-26
    • /
    • 2007
  • In recent rears. web portal system has received much attention as a user interface for the grid environment. Grid system uses symmetric key for authenticating user identity while the traditional portal system does a password-based authentication. Regarding this, many researches are progressing to integrate portal accounts with symmetric key. Specially. researches such as GAMA and PURSE are active and those focus on easy usability for users who familiar with password-based authentication. However the protection of data and resources is a critical issue in Grid environment, because those are shared through a wide-area network. In this paper, we suggest a new authentication mechanism which unify authentication mechanisms between portal system and grid service by using symmetric key. It will improve a security level in UI layer as much as in grid service.

  • PDF

A Novel Authentication Protocol based on the Password scheme for Wireless Mesh Network (무선 메쉬 네트워크의 패스워드 기반 인증 프로토콜)

  • Lee, Kyu-Hwan;Lee, Ju-A;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.5
    • /
    • pp.54-62
    • /
    • 2007
  • We propose a novel authentication protocol for wireless mesh network. The proposed authentication protocol is based on the password scheme for convenience of users. The proposed protocol is evaluated through three analyses. The correctness of the proposed protocol is proved using the GNY analysis. By the security analysis, we show that the proposed protocol is resistant to various attacks. For the performance analysis, we implemented the protocol in Linux operating system based laptop and measured the transmission time. The analytic results show that the proposed protocol provides the secure wireless mesh network without considerable performance degradation.

Respiration and Heartbeat detection algorithm using UWB radar (UWB 레이더를 사용한 호흡 및 심박 감지 알고리즘)

  • Le, Minhhuy;Hwang, Lan-mi;Fedotov, Dmitry
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.1
    • /
    • pp.70-76
    • /
    • 2019
  • Ultra Wideband (UWB) Radar is a high-resolution radar for short distance detection which uses signals transmitted and received by each antennas in order to detect a target. It is possible to detect the respiration and heartbeat of a person without contact It is getting more and more often utilized since it is not affected by physical environment. In this paper, we implement an algorithm to detect human respiration and heartbeat rate using UWB radar signal. We process radar signals reflected from human body using Median filter, Kalman filter, Band Pass filter and so on. We also use CZT to extract breathing and heart rate. ECG (Electrocardiogram) was used for comparison of heartbeat data and we confirm that each data of ECG and UWB Radar were more than 98% identical each other.