• Title/Summary/Keyword: 매체 신뢰도

Search Result 257, Processing Time 0.02 seconds

Power, mobility and wireless channel condition aware connected dominating set construction algorithm in the wireless ad-hoc networks (무선 에드 혹 네트워크에서 전력, 이동성 및 주변 무선 채널 상태를 고려한 연결형 Dominating Set 구성 방법)

  • Cho Hyoung-Sang;Yoo Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.274-286
    • /
    • 2005
  • In this paper, we propose a new power-efficient and reliable connected dominating set based routing protocol in the mobile ad hoc networks. Gateway nodes must be elected in consideration of residual energy and mobility because frequent reconstruction of connected dominating set result in transmission error for route losses. If node density is high, it results in a lot of contentions and more delays for network congestion. Therefore, in this paper, we propose a new construction method of connected dominating set that supports reliable and efficient data transmission through minimizing reconstruction of connected dominating set by delaying neighbor set advertisement message broadcast in proportion to weighted sum of residual energy, mobility, and the number of neighbor nodes. The performance of the proposed protocol is proved by simulation of various conditions.

A study on the digital textbook acceptance by application of Chasm Theory and Technology Acceptance Model (캐즘이론과 정보기술수용모형을 적용한 디지털 교과서 수용 연구)

  • Suh, Soon-Shik;Yun, Han-Gi
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.4
    • /
    • pp.33-41
    • /
    • 2011
  • This study was conducted to identify factors that influenced teachers' adoption of digital textbooks and causal relationships among the factors identified. Chasm theory was used in developing strategies for adoption of digital textbooks that consider teachers' innovativeness. This study also employed the information technology adoption model of Davis (1989) that illustrates decision making processes for the adoption of instructional media such as digital textbooks. Based on these two theories, a measurement instrument measuring teachers' innovativeness, perceived usefulness, perceived ease of use, and intention of use was developed and validated through a series of reliability and validity tests. Causal relationships among the factors were examined using structural equation modeling. The result indicated that: a) perceived ease of use had a directional effect on perceived usefulness and an indirect effect on intention of use; and b) perceived usefulness had a direct effect on intention of use. Implications of this finding are discussed especially for the efforts in developing strategies for teachers' adoption of digital textbook. For example, when digital textbooks are introduced into public schools, teachers' perception of the usefulness of digital textbooks, beyond just ease of use, should be considered.

  • PDF

Construct of Cooperative Security System for Secure MANET (안전한 MANET을 위한 협력적인 보안체계 구축)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.33-38
    • /
    • 2013
  • Security between mobile nodes and efficient communication is one of the most important parts of the MANET. In particular, the wireless network is significantly higher for the attack threats because of collaborative structure for open communication media and communication. However, application of existing security mechanisms and intrusion detection system is not easy due to the characteristics of MANET. It is because collection and integration of adult data by the dynamic topology due to the mobility of nodes and many network sensors is difficult. In this study, we propose cooperative security system technique that can improve the reliability based on authentication assessing confidence about the whole nodes which joins to network and detect effectively this when intrusion occurs. Cluster head which manages the cluster performs CA role for the certificate issue and the gateway node performs role of intrusion detection system. Intrusion detection is performed by cooperating with neighboring nodes when attack is not detected in one intrusion detection node. The performance of the proposed method was confirmed through experiments comparing with the SRP technique.

A Design on Error Tracking System for Enhanced-Reliable IoT Service (사물인터넷 서비스의 신뢰성 강화를 위한 오류 추적 시스템 설계)

  • Lim, Ho-Seung;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.15-20
    • /
    • 2020
  • In this paper, an error tracking platform is designed for enhanced-reliable IOT system. The platform is designed to enhance reliability of IOT system by analysing additional informations(OS, Browser, Device) and by notifying error detection to developers. Especially, in the case of an error in the service which it is difficult for developers to recognize it, The platform also supports notification services through various communication media(Email, Slack, SMS). The common interface is designed to accommodate many languages(typescript, Swift, and Android) in the development process, and the interface allows users to analyze errors that occur on various platforms, including mobile/web/desktop applications. By presenting each error in groups through issues, developers can easily identify issues in the service. The visualizing function is included to recognize various error type by dashboard.

Identification Technition of Malicious Behavior node Based on Collaboration in MANET (MANET에서 협업기반의 악의적인 노드 행위 식별기법)

  • Jeon, Seo-In;Ryu, Keun-Ho
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.83-90
    • /
    • 2012
  • MANET(Mobile Ad-Hoc Network) has a weakness from a security aspect because it operates where no wired network is built, which causes the exposed media, dynamic topology, and the lack of both central monitoring and management. It is especially difficult to detect and mitigate a malicious node because there is not a mediator which controls the network. This kind of malicious node is closely connected to the routing in the field of study of Ad-Hoc security. Accordingly this paper proposes the method on how to enhance the security for the safe and effective routing by detecting the malicious node. We propose MBC(Identification technition of Malicious Behavior node based on Collaboration in MANET) that can effectively cope with malicious behavior though double detecting the node executing the malicious behavior by the collaboration between individual node and the neighbor, and also managing the individual nodes in accordance with the trust level obtained. The simulation test results show that MBC can find the malicious nodes more accurately and promptly that leads to the more effectively secure routing than the existing method.

User′s Characteristics Which have Influence on the Avatar Acceptance (사용자 특성이 아바타 수용에 미치는 영향)

  • Lee, Seung Hyun;Choi, Hoon
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.11a
    • /
    • pp.93-108
    • /
    • 2003
  • 최근 들어 신세대들은 온라인을 통해서 아바타를 활용하여 가상공간 속에서 자신을 표현하고 있는 추세이다. 아바타는 ‘분신’, ‘화신’을 의미하는 산스크리트어로 가상공간에서 사용자의 역할을 대신하는 애니메이션 캐릭터이다. 가상공간 속에서 오프라인 상에서 표현하지 못한 자신만의 캐릭터를 통해서 자신의 정체성을 시각적으로 표현하여 개인의 개성을 표출하고 있다. 이러한 아바타의 출현으로 인터넷에서의 자기표현 방식이 외향적인 형태로 변화하는데 이는 새로운 표현에 대한 사용자의 수용도에 따라서 여러 가지 형태로 나타나고 있다. 특히, 사용자가 새로운 개념을 수용하는데 있어서 그들이 잠재적으로 보유하고 있는 특성에 따라서 아바타의 표현이 다각적으로 연출되고 활용되어지고 있다. 이는 신세대들의 자기표현 방식이 다양하기 때문이다고 할 수 있겠다. 신세대들은 또한 새로운 정보통신 기술이 매체를 통해 보급될 경우 수용도가 다른 세대에 비해 빠르다. 이렇듯 아바타의 도입과 활용은 신세대의 자기표현의 상징적인 역할을 하고 있다. 현재, 웹과 핸드폰을 통해서 2D 기반의 아바타가 활용되고 있으며, 신기술이 지속적으로 개발되고 있다. 현재 개발되어지고 있는 3D 핸드폰 아바타의 수용도에 대한 관심도도 높아질 것으로 예상된다. 현재 아바타 개발과 활용에 대한 연구는 활발히 진행되고 있지만, 이러한 신세대들의 특성에 따른 아바타의 수용에 대한 연구는 아직 정립되지 못하고 있다. 아바타의 수용에 관한 이론은 심리적 특성 이론으로 자아 존중감, 유행 선도력, 소비가치 등이 있으며, 사용자 수용 이론으로 혁신 성향, 유흥 성향 등이 있다. 이를 기반으로, 본 연구에서는 신세대 대학생들의 특성에 따라서 아바타의 수용도에 미치는 영향을 모색하고자 한다. 이를 위해서 대학생들의 특성을 심리적 특성이론과 사용자 수용이론으로 구분하여 이 특성에 따라서 향후 개발될 3D 핸드폰 아바타의 수용도의 관계를 파악하고자 한다. 본 연구에 대한 자료 수집방법은 D대학교의 교양과목인 “사이버문화의 이해와 활용”을 수강하는 학생들을 대상으로 총 170부를 설문 조사하였으며, 수집된 설문지 중에서 불성실하게 응답한 설문지 6부를 제외한 총 164부를 유효한 설문으로 확보하였다. SPSSWIN 10.0 패키지를 이용하였으며, Cronbach's Alpha값을 통한 신뢰도 분석과 요인분석을 통한 타당성 분석을 하고, 연구변수로 선정한 각 요소들의 아바타 수용도에 미치는 영향력 정도를 파악하기 위해 회귀분석을 실시하였다. 그 결과 심리적 특성과 사용자 수용 특성은 아바타 수용도에 부분적으로 영향을 미친다는 것 결과가 나타났다.

  • PDF

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

The Impact of the Information's Satisfaction in the e-Marketplace on the Buyer's Transactions Intention (오픈 마켓상의 제공 정보에 대한 만족도가 구매자의 거래 의향에 미치는 영향에 관한 연구)

  • Kim, Myoung-Soo
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.145-152
    • /
    • 2009
  • The e-marketplace has emerged as a new place for transactions in the online industry. In the e-marketplace, buyers make transactions with whom they have little prior interaction. Thus it makes trust as one of the most important issues in the e-business. There are various kinds of information to foster customer's trust in the e-marketplace. In this study, we analyzed the impact of the information's satisfaction on the customer's transaction intention. The results showed that the satisfaction on the information related to transaction system, individual seller's information, and buyer's feedback are all positively related with the customer's transaction intention.

A Study on Intrusion Detection Method using Collaborative Technique (협업 기법을 이용한 침입탐지 탐지 방법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.121-127
    • /
    • 2021
  • MANET, which does not have any infrastructure other than wireless nodes, has the advantage of being able to construct a fast network. However, the movement of nodes and wireless media are also the causes of security vulnerabilities of MANET. In particular, the damage caused by the attacking nodes existing on the network is considerably greater than that of other networks. Therefore, it is necessary to detection technique for attacking nodes and techniques to reduce damage caused by attacks. In this paper, we proposed a hierarchical structure technique to increase the efficiency of intrusion detection and collaboration-based intrusion detection technique applying a P2P mesh network configuration technique to reduce damage caused by attacks. There was excluded the network participation of the attacking node in advance through the reliability evaluation of the nodes in the cluster. In addition, when an attack by an attacking node is detected, this paper was applied a method of minimizing the damage of the attacking node by transmitting quickly the attack node information to the global network through the P2P mesh network between cluster heads. The ns-2 simulator was used to evaluate the performance of the proposed technique, and the excellent performance of the proposed technique was confirmed through comparative experiments.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.