• Title/Summary/Keyword: 위치 보호

Search Result 1,150, Processing Time 0.034 seconds

Easy to Search for Tags on Database and Secure Mutual Authentication Protocol for RFID system (데이터베이스에서의 태그 검색이 쉽고 안전한 RFID 상호인증 프로토콜)

  • Kwon, Hye-Jin;Lee, Jae-Wook;Jeon, Dong-Ho;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.125-134
    • /
    • 2008
  • A great number of RFID authentication protocols have been proposed for the secure RFID system. These are typically divided into three types according to primitive that they use : Hash-based, Re-encryption based, and XORing-based protocol. The well-known attacks in RFID system are eavesdropping. impersonating, location tracking, and so on. However, existing protocols could not provide security against above attacks, or it was not efficient to search for tags on database. Therefore, in this paper we present a protocol which is secure against above attacks by using hash function and makes Database search tags easily by attaining the state information of previous session through the shared values with all tags and database.

A Case Study for Mutation-based Fault Localization for FBD Programs (FBD 프로그램 뮤테이션 기반 오류 위치 추정 기법 적용 사례연구)

  • Shin, Donghwan;Kim, Junho;Yun, Wonkyung;Jee, Eunkyoung;Bae, Doo-Hwan
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.145-150
    • /
    • 2016
  • Finding the exact location of faults in a program requires enormous time and effort. Several fault localization methods based on control flows of a program have been studied for decades. Unfortunately, these methods are not applicable to programs based on data-flow languages. A recently proposed mutation-based fault localization method is applicable to data-flow languages, as well as control-flow languages. However, there are no studies on the effectiveness of the mutation-based fault localization method for data-flow based programs. In this paper, we provided an experimental case study to evaluate the effectiveness of mutation-based fault localization on programs implemented in Function Block Diagram (FBD), a widely used data-flow based language in safety-critical systems implementation. We analyzed several real faults in the implementation of FBD programs of a nuclear reactor protection system, and evaluated the mutation-based fault localization effectiveness for each fault.

Video Data Collection Scheme From Vehicle Black Box Using Time and Location Information for Public Safety (사회 안전망 구축을 위한 시간과 위치 정보 기반의 차량 블랙박스 영상물 수집 기법)

  • Choi, Jae-Duck;Chae, Kang-Suk;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.771-783
    • /
    • 2012
  • This paper proposes a scheme to collect video data of the vehicle black box in order to strengthen the public safety. The existing schemes, such as surveillance system with the fixed CCTV and car black box, have privacy issues, network traffic overhead and the storage space problems because all video data are sent to the central server. In this paper, the central server only collects the video data related to the accident or the criminal offense using the GPS information and time in order to investigation of the accident or the criminal offense. The proposed scheme addresses the privacy issues and reduces network traffic overhead and the storage space of the central server since the central server collects the video data only related to the accident and the criminal offense. The implementation and experiment shows that our service is feasible. The proposed service can be used as a component of remote surveillance system to prevent the criminal offense and to investigate the criminal offense.

The Protection of Privacy and the Restriction of Its Commercial Use in Telecommunications (통신산업에서 개인정보의 보호와 영업적 이용의 한계)

  • Hong, Myung-Su
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.303-335
    • /
    • 2011
  • The rapid changes in telecommunications have exercised an important influence on the telecommunications law system, including the protection of the privacy. It was a decisive assignment that telecommunications law protected the confidentiality of privacy. But in new digitalized telecommunications circumstance, every steps of the conveyance of the individual informations should be protected, in particular by telecommunications carriers as a subject of the protection of information. EU Privacy Directive in 2003 and the amendment of Communications Act in U. S. A. in 1996 have reflected the necessity of the privacy from a new point of view. In Korea, "Protection of Privacy Act" has been established as general law as to the protection of privacy and "Electronic Communications Net-work Act" and "Location Data Act" have been functioned as special law in telecommunications, and these laws have developed the legal systems about the protection of privacy in telecommunications. Such a legal system could be affirmatively evaluated. But the regulations should be reformed in a way that corresponds to the detailed types of the privacy and it should be devised a method, that the consent of users could be fulfilled practically.

The Best Spawning Timing in a Day and the First Spawning Position of Korean Endangered Fish, Pseudopuntungia nigra (Teleostei: Cyprinidae) (멸종위기종 감돌고기 Pseudopuntungia nigra의 일중 산란 타이밍 및 초기 산란 위치)

  • Lee, Heung-Heon;Choi, Youn;Choi, Seung-Ho
    • Korean Journal of Ichthyology
    • /
    • v.26 no.1
    • /
    • pp.11-16
    • /
    • 2014
  • The best spawning timing in a day and the first spawning position of Pseudopungtungia nigra was investigated at the Jujacheon stream in Jinan-gun Jeollabuk-do, Koera from May to July 2009. P. nigra spawned only at the nest of Coreoperca herzi from 7 May to 11 July, 2009. P. nigra spawned at 56 nests among 61 nests of C. herzi, and the spawning of P. nigra started on after 1st or 2nd day spawning of C. herzi. The spawning behavior was dominantly observed at around 06:00 to 07:00 AM, when parental C. herzi males are usually inactive in the territorial defence. The hatching rate of P. nigra eggs was closely related with the parental activity of the guarding C. herzi, and P. nigra deposit their eggs as close as possible to the egg clutches of C. herzi (normally at the perimeter of the clutch), likely to take much of the potential effects from fanning and guarding, as the hosts focus their care on the centre of the egg clutch.

Preventing ID Mapping Attacks on DHT Networks through Non-Voluntary Node Locating (비 자율적 노드 위치 결정을 통한 DHT 네트워크 ID 매핑 공격 방지)

  • Lee, Cheolho;Choi, Kyunghee;Chung, Kihyun;Kim, Jongmyung;Yun, Youngtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.695-707
    • /
    • 2013
  • DHT(Distributed Hash Table) networks such as Kademlia are vulnerable to the ID mapping attack caused by the voluntary DHT mapping structure where the location of a node is solely determined by itself on the network topology. This causes security problems such as eclipse, DRDoS and botnet C&C on DHT networks. To prevent ID mapping attacks, we propose a non-voluntary DHT mapping scheme and perform analysis on NAT compatibility, attack resistance, and network dynamicity. Analysis results show that our approach may have an equivalent level of attack resistance comparing with other defense mechanisms and overcome their limitations including NAT compatibility and network dynamicity.

The Coexistence Solution using Transmission Schedule and User's Position Information in Cognitive Radio Networks (전송 스케줄 및 사용자 위치 정보를 이용한 무선 인지 네트워크의 동일 주파수 대역 공존 방안)

  • Lee, Kyu-Ho;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.189-203
    • /
    • 2012
  • In cognitive radio networks, a secondary user opportunistically accesses an empty channel based on periodic sensing results for avoiding possible interference to the primary users. However, local sensing does not guarantee the full protection of the primary users because hidden primary receivers may exist within the interference range of the secondary transmitter. To protect primary systems and simultaneously to maximize utilization of the secondary users, we need to derive carefully designed coexistence solutions for various network scenarios. In this paper, we propose coexistence conditions without any harmful interference in accordance with the uplink/downlink schedule and user position. We have classified the coexistence conditions into four different scenario cases depending on the provided information to the secondary network basestations. Computer simulation results demonstrated that the proposed method can be applied to the real cognitive radio system to improve the communication probability of CR devices.

Current Limiting Characteristics due to Application Location of a Superconducting Fault Current Limiter in a Simulated Power Distribution System (모의배전계통에 초전도한류기의 도입위치에 따른 전류제한 특성)

  • You, Il-Kyoung;Kim, Jin-Seok;Kim, Myoung-Hoo;Kim, Jae-Chul;Lim, Sung-Hun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.12
    • /
    • pp.90-95
    • /
    • 2009
  • The application of a large power transformer into a power distribution system was inevitable due to the increase of power demand and distributed generation. However, the decrease of the power transformer‘s impedance causes the short-circuit current of the power distribution system to increase and thus, the higher short-circuit current exceeds the cut-off ratings of the protective devices such as a circuit breaker. To solve these problems, several countermeasures have been proposed to protect the power system effectively from the higher fault current and the superconducting fault current limiter (SFCL) has been expected to be the promising countermeasure. However, the current limiting effect of SFCL including its bus voltage drop compensation depends on SFCL's application location in a distributed power system. In this paper, the current limiting and the bus-voltage drop compensating characteristics of the SFCL applied into a power distribution system were studied. In addition, the quench and the recovery characteristics of the SFCLs in each location of the power distribution system were compared each other.

Prohibiting internal data leakage to mass storage device in mobile device (모바일 단말에서 외부 저장 매체로의 불법 데이터 유출 방지 기법)

  • Chung, Bo-Heung;Kim, Jung-Nyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.125-133
    • /
    • 2011
  • According to proliferation of mobile devices, security threats have been continuously increased such as illegal or unintentional file transmission of important data to an external mass-storage device. Therefore, we propose a protection method to prohibit an illegal outflow to this device and implement this method. This method extracts signatures from random locations of important file and uses them to detect and block illegal file transmission. To get signatures, a target file is divided by extracting window size and more than one signatures are extracted in this area. To effective signature sampling, various extraction ways such as full, binomial distribution-based and dynamic sampling are implemented and evaluated. The proposed method has some advantages. The one is that an attacker cannot easily predict the signature and its extraction location. The other is that it doesn't need to modify original data to protect it. With the help of these advantages, we can say that this method can increase efficiency of easy-to-use and it is a proper way leakage prevention in a mobile device.

Privacy-Preserving Traffic Volume Estimation by Leveraging Local Differential Privacy

  • Oh, Yang-Taek;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.19-27
    • /
    • 2021
  • In this paper, we present a method for effectively predicting traffic volume based on vehicle location data that are collected by using LDP (Local Differential Privacy). The proposed solution in this paper consists of two phases: the process of collecting vehicle location data in a privacy-presering manner and the process of predicting traffic volume using the collected location data. In the first phase, the vehicle's location data is collected by using LDP to prevent privacy issues that may arise during the data collection process. LDP adds random noise to the original data when collecting data to prevent the data owner's sensitive information from being exposed to the outside. This allows the collection of vehicle location data, while preserving the driver's privacy. In the second phase, the traffic volume is predicted by applying deep learning techniques to the data collected in the first stage. Experimental results with real data sets demonstrate that the method proposed in this paper can effectively predict the traffic volume using the location data that are collected in a privacy-preserving manner.