• Title/Summary/Keyword: 데이터 무결성

Search Result 543, Processing Time 0.035 seconds

Mutual Authentication Mechanism for Secure Group Communications in Sensor Network (센서 네트워크에서의 안전한 그룹통신을 위한 상호 인증 기법)

  • Ko, Hye-Young;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.6
    • /
    • pp.441-450
    • /
    • 2010
  • Recently, a lot of interest is increased in sensor network which gathers various data through many sensor nodes deployed in wired and wireless network environment. However, because of the limitation in memory, computation, and energy of the sensor nodes, security problem is very important issue. In sensor network, not only the security problem, but also computing power should be seriously considered. In this paper, considering these characteristics, we make the sensor network consist of normal sensor nodes and clusterheaders with enough space and computing power, and propose a group key rekeying scheme adopting PCGR(Predistribution and local Collaborationbased Group Rekeying) for secure group communication. In our proposal, we enhance the security by minimizing the risk to safety of the entire network through verifying the new key value from clusterheader by sensor nodes. That is, to update the group keys, clusterheaders confirm sensor nodes through verifying the information from sensor nodes and send the new group keys back to authentic member nodes. The group keys sent back by the clusterheaders are verified again by sensor nodes. Through this mutual authentication, we can check if clusterheaders are compromised or not. Qualnet simulation result shows that our scheme not only guarantees secure group key rekeying but also decreasesstorage and communication overhead.

Design and Performance Evaluation of the Secure Transmission Module for Three-dimensional Medical Image System based on Web PACS (3차원 의료영상시스템을 위한 웹 PACS 기반 보안전송모듈의 설계 및 성능평가)

  • Kim, Jungchae;Yoo, Sun Kook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.179-186
    • /
    • 2013
  • PACS is a medical system for digital medical images, and PACS expand to web-based service using public network, DICOM files should be protected from the man-in-the-middle attack because they have personal medical record. To solve the problem, we designed flexible secure transmission system using IPSec and adopted to a web-based three-dimensional medical image system. And next, we performed the performance evaluation changing integrity and encryption algorithm using DICOM volume dataset. At that time, combinations of the algorithm was 'DES-MD5', 'DES-SHA1', '3DES-MD5', and '3DES-SHA1, and the experiment was performed on our test-bed. In experimental result, the overall performance was affected by encryption algorithms than integrity algorithms, DES was approximately 50% of throughput degradation and 3DES was about to 65% of throughput degradation. Also when DICOM volume dataset was transmitted using secure transmission system, the network performance degradation had shown because of increased packet overhead. As a result, server and network performance degradation occurs for secure transmission system by ensuring the secure exchange of messages. Thus, if the secure transmission system adopted to the medical images that should be protected, it could solve server performance gradation and compose secure web PACS.

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.

Evaluation Method of Portable Handheld U-healthcare Medical Devices (휴대형 유헬스케어 의료기기 평가방법)

  • Nam, Myung-Hyun;Kim, Soo-Chan;Kim, Jang-Su;Lee, Kap-No;Kim, San;Cha, Ji-Hun;Hur, Chan-Hoi;Park, Ki-Jung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.2
    • /
    • pp.55-62
    • /
    • 2012
  • Convergence of information technology (IT) and medical devices enables people to measure health-related information ubiquitously, such as measuring blood glucose at home and checking cardiac signals during exercise and it allows us to access to medical care anywhere and anytime. Nowadays, the market for U-healthcare medical devices is growing rapidly, but guidelines for the evaluation of safety and effectiveness of such devices remain to be formulated. We performed a study on the development of safety and performance evaluation method for portable, hand-held, U-healthcare medical devices. We reviewed current guidelines and standards for home-health devices from the Korea Food and Drug Administration (KFDA) and related international committees such as the ISO/IEEE and CE. We summarized the test methods and items for the evaluation of safety and performance related to U-healthcare medical devices from the above guidelines and standards. We defined requirements for a U-healthcare medical device to demonstrate good performance. In conclusion, we propose an evaluation method for U-healthcare medical devices, which will help improve the safety and reliability of these devices.

Wide Area Augmentation System Estimating C1P1 DCB (C1P1 DCB를 추정하는 광역보강항법 시스템)

  • Bu, Sung-Chun;So, Hyoung-Min;Kim, Kap-Jin;Lee, Chul-Soo;Kim, Do-Kyoung;Ko, Yo-Han
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.400-408
    • /
    • 2018
  • Wide area augmentation system is a system that generates and transmits correction and Integrity information for use in wide area. Typical system is SBAS. In the United States, it operates under the name WAAS, EGNOS in Europe, MSAS in Japan, SDCM in Russia, GAGAN in India. it is developing Korean SBAS which named KASS by 2022 in Korea. SBAS is a standard System that is operated as civil aviation service base and set as international standards by ICAO. So the correction data can only is used for civil SPS receiver. In this paper, we discuss C1P1 DCB estimation which need to use SPS correction service for PPS receiver. Then we analyze C1P1 DCB correction effect under standalone Satellite Navigation and method to use PPS receiver under SPS DGPS. Finally we organize wide area augmentation system for PPS receiver and analysis performance.

Fuzzy Expert System for Detecting Anti-Forensic Activities (안티 포렌식 행위 탐지를 위한 퍼지 전문가 시스템)

  • Kim, Se-Ryoung;Kim, Huy-Kang
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.47-61
    • /
    • 2011
  • Recently, the importance of digital forensic has been magnified because of the dramatic increase of cyber crimes and the increasing complexity of the investigation of target systems such as PCs, servers, and database systems. Moreover, some systems have to be investigated with live forensic techniques. However, even though live forensic techniques have been improved, they are still vulnerable to anti-forensic activities when the target systems are remotely accessible by criminals or their accomplices. To solve this problem, we first suggest a layer-based model and the anti-forensic scenarios which can actually be applicable to each layer. Our suggested model, the Anti-Forensic Activites layer-based model, has 5 layers - the physical layer, network layer, OS layer, database application layer and data layer. Each layer has possible anti-forensic scenarios with detailed commands. Second, we propose a fuzzy expert system for effectively detecting anti-forensic activities. Some anti-forensic activities are hardly distinguished from normal activities. So, we use fuzzy logic for handling ambiguous data. We make rule sets with extracted commands and their arguments from pre-defined scenarios and the fuzzy expert system learns the rule sets. With this system, we can detect anti-forensic activities in real time when performing live forensic.

Transformation from Data Flow Diagram to SysML Diagram (데이터흐름도(DFD)의 SysML 다이어그램으로의 변환에 관한 연구)

  • Yoon, Seok-In;Wang, Ji-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5827-5833
    • /
    • 2013
  • Due to science and technology evolutions, modern systems are becoming larger and more complex. In developing complex systems, Model-Based Systems Engineering (MBSE), which is approach to reduce complexity, is being introduced and applied to various system domains. However, because of the modeling being made through a variety of languages, there is a problem with communication within the stakeholders and a lack of consistency in the models. In this paper, by investigating the rule explaining the transformation of one of the only traditional diagrams, DFD, to SysML and reusing the formerly built models, we attempt to implement by SysML. Analyzing each diagram's Metamodel and validating the connection of each component through bipartite graph especially suggest an effective transformation rule. Also, by applying to naval-combat system, we confirm efficiency of this study. Establishing the results of this study as basis for conducting further study, we will be able to transform other previous models gained from formerly built system to SysML. In this way, the stakeholder's communication can be improved and we anticipate that the application of SysML will be beneficial to the much efficient MBSE.

A Literature Review on Application of Signature Materials in Nuclear Forensics according to Domestic Nuclear Facilities and Fuel Cycle (국내 원자력시설 및 핵연료 주기에 따른 핵감식 표지물질 활용에 대한 고찰)

  • Jeon, Yeoryeong;Gwon, Da Yeong;Han, Jiyoung;Choi, Woo Cheol;Kim, Yongmin
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2021
  • Republic of Korea has many nuclear facilities in the country, and Democratic People's Republic of Korea(North Korea) locates in the surrounding country. Therefore, it is necessary to construct the target facility's nuclear forensic data in a preemptive response to the changing international situation. For this reason, this study suggests "signature" materials used to understand the origins and sources of nuclear and other radioactive materials, taking into account domestic nuclear facilities and the nuclear fuel cycle. In domestic, pressurized light water reactors and pressurized heavy water reactors are in operation, and enriched and natural uranium are used as fuels. In the front-end fuel cycle, the signature materials can be nature uranium and UF6 in the uranium enrichment process. The domestic back-end fuel cycle adopts a non-circulating cycle excluding the reprocessing process, and the primary signature material is spent nuclear fuel. According to IAEA recommendation, the importance of these materials as the signature and characteristic contents are suggested in this study. To prove the integrity of nuclear material and build a national nuclear forensics library, it is necessary to grasp the signature material and acquire the characteristic data considering the domestic nuclear facilities and the nuclear fuel cycle.

A DID-Based Transaction Model that Guarantees the Reliability of Used Car Data (중고자동차 데이터의 신뢰성을 보장하는 DID기반 거래 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.103-110
    • /
    • 2022
  • Online transactions are more familiar in various fields due to the development of the ICT and the increase in trading platforms. In particular, the amount of transactions is increasing due to the increase in used transaction platforms and users, and reliability is very important due to the nature of used transactions. Among them, the used car market is very active because automobiles are operated over a long period of time. However, used car transactions are a representative market to which information asymmetry is applied. In this paper presents a DID-based transaction model that guarantees reliability to solve problems with false advertisements and false sales in used car transactions. In the used car transaction model, sellers only register data issued by the issuing agency to prevent false sales at the time of initial sales registration. It is authenticated with DID Auth in the issuance process, it is safe from attacks such as sniping and middleman attacks. In the presented transaction model, integrity is verified with VP's Proof item to increase reliability and solve information asymmetry. Also, through direct transactions between buyers and sellers, there is no third-party intervention, which has the effect of reducing fees.

A Hybrid Blockchain-Based E-Voting System with BaaS (BaaS를 이용한 하이브리드 블록체인 기반 전자투표 시스템)

  • Kang Myung Joe;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.8
    • /
    • pp.253-262
    • /
    • 2023
  • E-voting is a concept that includes actions such as kiosk voting at a designated place and internet voting at an unspecified place, and has emerged to alleviate the problem of consuming a lot of resources and costs when conducting offline voting. Using E-voting has many advantages over existing voting systems, such as increased efficiency in voting and ballot counting, reduced costs, increased voting rate, and reduced errors. However, centralized E-voting has not received attention in public elections and voting on corporate agendas because the results of voting cannot be trusted due to concerns about data forgery and modulation and hacking by others. In order to solve this problem, recently, by designing an E-voting system using blockchain, research has been actively conducted to supplement concepts lacking in existing E-voting, such as increasing the reliability of voting information and securing transparency. In this paper, we proposed an electronic voting system that introduced hybrid blockchain that uses public and private blockchains in convergence. A hybrid blockchain can solve the problem of slow transaction processing speed, expensive fee by using a private blockchain, and can supplement for the lack of transparency and data integrity of transactions through a public blockchain. In addition, the proposed system is implemented as BaaS to ensure the ease of type conversion and scalability of blockchain and to provide powerful computing power. BaaS is an abbreviation of Blockchain as a Service, which is one of the cloud computing technologies and means a service that provides a blockchain platform ans software through the internet. In this paper, in order to evaluate the feasibility, the proposed system and domestic and foreign electronic voting-related studies are compared and analyzed in terms of blockchain type, anonymity, verification process, smart contract, performance, and scalability.