• Title/Summary/Keyword: 도청

Search Result 467, Processing Time 0.034 seconds

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Requirments Analysis and AAS Design for Energy Digital Twin (에너지 디지털 트윈을 위한 요구사항 분석 및 AAS 설계)

  • Park, Kishik;Oh, Seongjin;Kang, Changku;Sung, Inmo;Sakar, Aranya
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.109-117
    • /
    • 2020
  • Recently, with the advent of the 4th industrial revolution, digital twins are emerging as an important technology that connects and integrates physical systems and cyber systems. In this article, we analyzed the major requirements of digital twins required for the construction of digital twins of power equipments in the energy field, focusing on the industry 4.0-based Asset Administration Shell(AAS). However, since not so many studies have been conducted yet on a common platform or demonstration model for implementing digital twins both domestically and internationally, digital twin requirements are analyzed with the consideration of digital twinning of power equipment in the energy field. Also, we suggested necessary procedures and specific functions of AAS to establish a smart energy digital twin in the future by analyzing the core requirements necessary for the construction and designing the AAS design for specific power equipment.

A Study on the Export Strategy of China to the Cosmetic Industry: Focus on Countermeasures against Tariffs and Non-Tariff Measures (화장품 산업의 대중국 수출전략에 관한 연구: 관세 및 비관세조치 대응전략 수립을 중심으로)

  • Jung, Woo-Kyung;Lee, Seo-Young;Kim, Tae-In
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.1
    • /
    • pp.145-165
    • /
    • 2020
  • Purpose - The purpose of this study is to suggest strategies and solutions for entering China in the tariff and non-tariff sectors of the cosmetic industry. Design/methodology/approach - This study analyzed the import tariff rate of cosmetics in China, and analyzed the export cost by actually interviewing the exporting companies to derive the economic effect of non-tariff measures. Findings - First, We proposed the use of the FTA business model (basic cosmetics), the use of Korea-China FTA tariffs (foam cleansing, toothpaste), and the use of APTA tariffs (perfume). Second, We proposed cooperation between the governments to facilitate customs clearance procedures and improvement of FTA awareness among corporate practitioners. Third, We proposed the expansion and support of the AEO MRA system and the expansion of Korea-China MOU conclusions regarding the certification system, and the international standardization of domestic licensing system and technical conditions. Fourth, We proposed the use of government-supported projects related to obtaining overseas certifications and overseas expansion through collaboration with the same industry. Research implications or Originality - HS3304 products excluded from the Korea-China FTA should take full advantage of the FTA business model. In addition, the non-tariff measure costs are fixed costs per year, so the ratio decreases as the number of exports and export volume increases.

Jeju Animal Shelter abandoned animals status and actual condition analysis (제주동물보호소 유기동물 현황 및 실태분석)

  • Oh, Myoungoon;Ko, Kyoung Bo;Cho, Seong Cheol;Ko, Jin-A;Ryu, YounChul
    • Korean Journal of Veterinary Service
    • /
    • v.44 no.4
    • /
    • pp.175-183
    • /
    • 2021
  • This study investigated the status and analyzed of stray dogs, stray cats admitted to the Jeju Animal Shelter during the year of 2015 to 2019, and the infection rates of specific diseases for abandoned dogs. In addition, in 2017 to 2019, the collected intake and outcome data were reviewed to analyze shelter capacity in terms of housing capacity (monthly daily average intake, required holding capacity, and adoption-driven capacity), staff capacity (staff hours required for daily care). Out of 24,557 dogs admitted to the shelter, owners of 1,808 dogs (7.4%) visited the shelter and found their lost dogs, while 3,612 dogs (14.7%) were adopted to new families. However, the number of puppies that were euthanized was the highest at 12,266 (49.9%), and 6,876 (28%) died either death from disease or natural causes because they were detained in shelters. The monthly daily average (MDA), which is one of the indicators for efficient population management of Jeju Animal Shelter, was found to be 17.4 for abandoned dogs and 1.7 for abandoned cats. Seasonal variations were observed for MDA, RHC, MDA adoptions, ADC, and RSDC, indicating that various strategies are needed for shelter management. This study was performed to analyze and interpret meaningful statistics for improving the efficiency of animal shelters in Jeju. However, inconsistent collection of animal statistics limited data compilation. Creation of a basic animal statistics matrix with reference to well-designed matrices from recognized professional animal shelters is essential.

Determination Method of TTL for Improving Energy Efficiency of Wormhole Attack Defense Mechanism in WSN (무선 센서 네트워크에서 웜홀 공격 방어기법의 에너지 효율향상을 위한 TTL 결정 기법)

  • Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.149-155
    • /
    • 2009
  • Attacks in wireless sensor networks (WSN), are similar to the attacks in ad-hoc networks because there are deployed on a wireless environment. However existing security mechanism cannot apply to WSN, because it has limited resource and hostile environment. One of the typical attack in WSN is setting up wrong route that using wormhole. To overcome this threat, Ji-Hoon Yun et al. proposed WODEM (WOrmhole attack DEfense Mechanism) which can detect and counter with wormhole. In this scheme, it can detect and counter with wormhole attacks by comparing hop count and initial TTL (Time To Live) which is pre-defined. The selection of a initial TTL is important since it can provide a tradeoff between detection ability ratio and energy consumption. In this paper, we proposed a fuzzy rule-based system for TTL determination that can conserve energy, while it provides sufficient detection ratio in wormhole attack.

Buckling Loads of Piles with Allowance for Self-Weight (자중효과를 고려한 말뚝의 좌굴하중)

  • Lee, Joon-Kyu;Lee, Kwang-Woo;Jeon, Young-Jin;Kwon, O-Il;Choi, Yong-Hyuk;Choi, Jeong-Sik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.2
    • /
    • pp.187-193
    • /
    • 2023
  • This paper presents the buckling behavior of a pile considering its self-weight. The differential equation and boundary conditions governing the buckling of partially embedded piles in nonhomogeneous soils are derived. The buckling load and mode shape of the pile are numerically computed by the Runge-Kutta method combined with the Regula-Falsi algorithm. The obtained numerical solutions for bucking loads agree well with the results available from the literature. Numerical examples are given to analyze the buckling load and mode shape of the piles as affected by the self-weight, embedment ratio, slenderness ratio and boundary condition of the pile as well as the aspect ratio and rigidity ratio of the subgrade reaction. It is found that the self-weight of the pile leads to the reduction of the buckling load, indicating that neglecting the effect of self-weight may overestimate the buckling load of partially embedded piles.

Design of Reconfigurable Processor for Information Security System (정보보호 시스템을 위한 재구성형 프로세서 설계)

  • Cha, Jeong-Woo;Kim, Il-Hyu;Kim, Chang-Hoon;Kim, Dong-Hwi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.113-116
    • /
    • 2011
  • 최근 IT 기술의 급격한 발전으로 개인정보, 환경 등 다양한 정보를 수시로 수집 및 관리하면서 사용자가 원할시 즉각적인 정보서비스를 제공하고 있다. 그러나 유 무선상의 데이터 전송은 정보의 도청, 메시지의 위 변조 및 재사용, DoS(Denial of Service)등 외부의 공격으로부터 쉽게 노출된다. 이러한 외부 공격은 개인 프라이버시를 포함한 정보서비스 시스템 전반에 치명적인 손실을 야기 시킬 수 있기 때문에 정보보호 시스템의 필요성은 갈수록 그 중요성이 부각되고 있다. 현재까지 정보보호 시스템은 소프트웨어(S/W), 하드웨어(ASIC), FPGA(Field Progr- ammable Array) 디바이스를 이용하여 구현되었으며, 각각의 구현방법은 여러 가지 문제점이 있으며 그에 따른 해결방법이 제시되고 있다. 본 논문에서는 다양한 환경에서의 정보보호 서비스를 제공하기 위한 재구성형 SoC 구조를 제안한다. 제안된 SoC는 비밀키 암호알고리즘(AES), 암호학적 해쉬(SHA-256), 공개키 암호알고리즘(ECC)을 수행 할 수 있으며, 마스터 콘트롤러에 의해 제어된다. 또한 정보보호 시스템이 요구하는 다양한 제약조건(속도, 면적, 안전성, 유연성)을 만족하기 위해 S/W, ASIC, FPGA 디바이스의 모든 장점을 최대한 활용하였으며, MCU와의 효율적인 통신을 위한 I/O 인터페이스를 제안한다. 따라서 제안된 정보보호 시스템은 기존의 시스템보다 다양한 정보보호 알고리즘을 지원할 뿐만 아니라 속도 및 면적에 있어 상충 관계를 개선하였기 때문에 저비용 응용뿐만 아니라 고속 통신 장비 시스템에도 적용이 가능하다.

Image Steganography for Securing Hangul Messages based on RS-box Hiding Model (RS-box 은닉 모델에 기반한 한글 메시지 보안을 위한 이미지 스테가노그래피)

  • Seon-su Ji
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.97-103
    • /
    • 2023
  • Since most of the information is transmitted through the network, eavesdropping and interception by a third party may occur. Appropriate measures are required for effective, secure and confidential communication in the network. Steganography is a technology that prevents third parties from detecting that confidential information is hidden in other media. Due to structural vulnerabilities, information protected by encryption and steganography techniques can be easily exposed to illegitimate groups. In order to improve the limitations of LSB where the simplicity and predictability of the hiding method exist, I propose a technique to improve the security of the message to be hidden based on PRNG and recursive function. To enhance security and confusion, XOR operation was performed on the result of selecting a random bit from the upper bits of the selected channel and the information transformed by the RS-box. PSNR and SSIM were used to confirm the performance of the proposed method. Compared to the reference values, the SSIM and PSNR of the proposed method were 0.9999 and 51.366, respectively, confirming that they were appropriate for hiding information.

Outbreak of Hepatitis A caused by Groundwater Contamination in a Long-term Psychiatric Hospital in Korea (장기 요양 정신병원에서 지하수 오염에 의하여 발생한 A형간염 집단발병)

  • Keun-Sang Kwon;Myung Ok Lee;Hee Ju Bae;Jung Im Park;Cheon-Hyeon Kim;Ju-Hyung Lee
    • Journal of agricultural medicine and community health
    • /
    • v.48 no.2
    • /
    • pp.71-80
    • /
    • 2023
  • 목적: 2017년 지하수를 식수로 사용하고 있는 한 장기요양 정신병원(H병원)에서 A형간염 환자가 집단 발병하여 이에 대한 역학조사를 실시하고 조치 결과를 기술하고자 하였다. 방법: 노출기간 동안 H병원의 근로자 및 재원 환자 234명을 대상으로 사례군 조사 디자인으로 역학조사를 실시하였고, IgM, IgG 혈청검사 및 A형간염 바이러스(HAV)에 대한 PCR검사를 시행하였다. 또한 오염원으로 의심되는 지하수, 병원에서 제공되는 식품 및 인근 저수지의 물에서 HAV 검사를 실시하였고, 검출된 HAV는 유전형 검사를 진행하였다. 결과: H병원 환자 및 직원 234명 중 IgG 양성인 168명을 제외한 66명 중 19명이 최종적으로HAV 감염자로 확인되어 감수성자 중 발병률은 28.8%로 나타났다. 환자, 지하수, 식품(석박지) 및 저수지에서 동일 유전형의 HAV가 검출되어 지하수 오염에 의한 집단발병으로 결론 내렸으나, 최초 오염원은 확인하지 못하였다. 유행 종결 선언 이후 지하수에 대한 관리로 염소소독과 UV 조사를 하였음에도 불구하고 6개월 동안 지속적으로 HAV가 검출되어 새로운 관정을 개발하여 상황을 종결하였다. 결론: 본 연구에서 지하수를 식수로 사용하는 장기요양 정신병원에서 지하수 오염에 의한 19명의 HAV 집단발병을 조사하였다. HAV 항체가 없는 대상자 중에서 HAV의 높은 발병률을 확인하였다. 지하수 수질검사에서 바이러스 검사는 포함되어 있지 않기 때문에 지하수가 HAV에 오염시 HAV 집단발병 가능성이 높고 상당기간 지속적으로 검출되기 때문에 지하수에 대한 관리지침에 바이러스 검출을 위한 방안을 추가하고 관련 법을 정비할 필요가 있다.

Vulnerabilities and Attack Methods in Visible Light Communications Channel (가시광 통신 채널의 취약성 및 공격 방법)

  • Park, So-Hyun;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.469-471
    • /
    • 2021
  • As wireless communication technology advances to ensure high accuracy and safety at high speeds, research and development of Visible Light Communication (VLC) technology has been accelerated as an alternative to traditional radio frequency (RF) technology. As the radio spectrum of RF communication becomes more congested and demand for bandwidth continues to increase, VLCs that can use unlicensed frequency band are proposed as a solution. However, VLC channels have broadcasting characteristics that make them easily exposed to eavesdropping and jamming attacks, and are vulnerable to MITM (Man-In-The-Middle) due to their line of sight (LOS) propagation characteristics. These attacks on VLC channels compromise the confidentiality, integrity, and availability of communications links and data, resulting in higher data retransmission rates, reducing throughput and increasing power consumption, resulting in lower data transmission efficiency. In this work, we model vulnerable VLC channels to analyze the impact of attacks and communications vulnerabilities by malicious jammers.

  • PDF