• Title/Summary/Keyword: 보호 동기

Search Result 310, Processing Time 0.026 seconds

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.

Implementation of authentication mechanism for 3GPP, 3GPP2 on java card (자바 카드상에서의 3GPP, 3GPP2 인증 메커니즘 구현)

  • 조승환;전성익;이정우;이옥연;한진희;이세광
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.67-75
    • /
    • 2003
  • The development of mobile phone is growing fast in the all over the world. Besides the basic voice communication, many multimedia services and global roaming service are capable in the 3rd generation mobile telecommunication. Because mobile phone has been the essential tool to communicate, the protection of privacy and the safe transmission are critical ones. In synchronous, asynchronous mode IMT2000 service, the mechanism of mutual authentication and generation of cipher key and integrity key are implemented in smart card chip called UIM, USIM. In this paper, we describe the authentication mechanism of 3GPP and 3CPP2 and its implementation results. Then, we specify a few problems which are not defined in standard.

A Study on Factors Affecting the Investment Intention of Information Security (정보보호 투자의도에 영향을 미치는 요인에 대한 연구)

  • Lee, Hong-Je;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1515-1525
    • /
    • 2018
  • Security threats in the 4th Industrial Revolution have expanded to the issue of safety, but the environment for information security of domestic companies is still at a low level. This study aims to propose policy implications by empirically analyzing factors affecting investment intention. We investigated the state of information security and protection behavior and expanded UTAUT to investigate correlations. The results showed that information assets affect facilitating conditions, and perceived and new concerns have impacts on social influence. Social influence affect experience and habits, but the impact on security investment intentions was rejected. Facilitation conditions, previous experiences and habits have great influences on investment intention, new service security investment intention. The influence of perceived and new concern are low or rejected. There are moderating effects between types of business, size, security organization, experience of infringement, security personnel ratio, and personal information collection. This study will help to establish policies for enhancing the level of information security.

Implementations of Record_Level Synchronized Safe Personal Cloud (레코드 단위의 동기화를 지원하는 개별 클라우드 구현 기법)

  • Hong, Dong-Kweon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.239-244
    • /
    • 2014
  • As the usefulness of mobile device is kept growing the privacy of the cloud computing is receiving more attentions. Even though many researches and solutions for privacy matters are suggested we are still worrying about the security problems. In addition most of cloud computing systems uses file-level synchronization which make it difficult to modify a part of a file. If we use data-centric app that stores data on embedded DBMS such as SQLite, a simple synchronization may incur some loss of information. In this paper we propose a solution to build a personal cloud that supports record-level synchronization. And we show a prototype system which uses RESTful web services and the same schema on mobie devices and the cloud storage. Synchronization is achieved by using a kind of optimistic concurrency control.

Design and implementation of the synchronization circuit for OFDM system without synchronization preambles (동기 프리엠블이 없는 OFDM 시스템의 동기회로 설계 및 구현)

  • 남우춘;한영열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.5
    • /
    • pp.1045-1057
    • /
    • 1997
  • In this paper, we propose an algorithm of block synchronization that uses data withoug synchronization preambles. Block synchronization systems is implemented using the DSP chip employing the proposed algorithm. The data spread of the DFT blocks is proportional to the offset of DFT block and this information is used to achieve the block synchronization in the receiver. The initial bleock synchronization and the clock synchronization between transmitter and receiver are achieved using the early-late removal of the guard interval. The hardware implmentation is carried out using the DSP chip TM320C30 to verify the proposed block synchronization algorithm with the data rate 1200bps. The DSP chip calculates the spread of the 128 complex FFT in the receiver with the system clock 30MHz. It is believed that the proposed synchronization algorithm can be used in the design of OFDM block synchronization with the high processing DSP chip.

  • PDF

A Cell Search with Reduced Complexity in a Mobile Station of OFCDM Systems (OFCDM 시스템의 이동국에서의 복잡도 감소 셀 탐색)

  • Kim, Dae-Yong;Park, Yong-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.139-149
    • /
    • 2007
  • Asynchronous OFCDM(Orthogonal Frequency and Code Division Multiplexing) systems must have a cell search process necessarily unlike synch개nous systems. this process is hewn initial synchronization and a three-step cell search algorithm is performed for the initial synchronization in the following three steps: OFCDM symbol timing, i.e., Fast Fourier Transform(FFT) window timing is estimated employing guard interval (GI) correlation in the first step, then the frame timing and CSSC(Cell Specific Scrambling Code) group is detected by taking the correlation of the CPICH(Common Pilot Channel) based on the property yielded by shifting the CSSC phase in the frequency domain. Finally, the CSSC phase within the group is identified in the third step. This paper proposes a modification group code with two or three block of the conventional CPICH based cell search algorithm in the second step which offers MS(Mobile Station) complexity reductions. however, the effect of the reduction complexity leads to degradation of the performance therefore, look for combination to have the most minimum degradation. the proposed block type group code with suitable combinations is the nearly sane performance as conventional group code and has a complexity reduction that is to be compared and verified through the computer simulation.

The intrinsic motivation of child welfare workers: Modeling its causal relationships with career commitment and turnover intentions (아동복지기관 종사자의 내재적 동기가 경력몰입을 통해 이직의도에 미치는 영향)

  • Kang, Hyun Ah
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.4
    • /
    • pp.445-468
    • /
    • 2011
  • Based on the framework of self-determination theory and past relevant literature, the study develops and estimates a causal relationship between intrinsic motivation, career commitment, and turnover intention. The study utilizes data from a cross-sectional survey conducted on 353 child welfare workers of the fields of foster care, child protective services, and child residential care all over the country. The study relies on Structural Equation Modeling(SEM) method. The results of Confirmatory Factor Analysis indicate the validity of measurement model. The results of SEM tests show a good fit of the proposed model. Controlling the level of salary and the working hours of the workers, the model reveals that intrinsic motivation is positively related to career commitment, and that career commitment is negatively related to turnover intention. In other words, the effect of intrinsic motivation on turnover intention is mediated by career commitment. Implications of the findings for practice and study limitations are discussed.

Biosensor for Agriculture and Bio-industry (농업 및 생물산업에서의 바이오 센서 기술)

  • ;;M.J. Delwichi
    • Journal of Biosystems Engineering
    • /
    • v.26 no.2
    • /
    • pp.189-196
    • /
    • 2001
  • 바이오 센서 개발에 대한 주 동기는 건강보호 산업이었지만, 최근의 연구 동향은 농업 및 생물 생산 시스템 분야로 확산되고 있다. 바이오 센서의 본질과 기능에 관한 일반적인 논의가 간단히 제시되었고, 제자들에 의해 연구된 및 종류의 바이오 센서 예와 그들의 적용에 대해 소개하였다.

  • PDF

SDH기본 시스팀의 구현 및 망구성 전략

  • Lee, Ho-Jae;Kim, Hong-Ju;Kim, Jae-Geun
    • ETRI Journal
    • /
    • v.14 no.2
    • /
    • pp.16-28
    • /
    • 1992
  • 본고에서는 CCITT 표준에 기본을 둔 다양한 전송서비스 능력을 갖는 SDH 망요소들의 모듈화 구현기법을 제시하고, 나아가 이들 망요소들을 응용한 동기식 전송망의 구조를 전송서비스의 보호특성을 강조하여 제시한다.

  • PDF

Security of OFB mode and 3GPP f8 encryption mode (OFB 모드와 3GPP f8 암호화 모드의 안전성)

  • 신상욱;홍도원;강주성;이옥연
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.55-66
    • /
    • 2001
  • In this paper, we analyze the security of OFB encryption mode which is one of the basic modes of operation for the block cipher and the security of 3GPP f8 encryption mode used to provide the data confidentiality over a radio access link of W-CDMA IMT-2000. We provide the lower bound and the upper bound on security of both modes in random function model and random permutation model, respectively, by means of the left-or-right security notion, and prove the security of both modes using a pseudorandom function and a pseudorandom permutation, respectively.