• Title/Summary/Keyword: 위협요소

Search Result 749, Processing Time 0.022 seconds

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.

A Study on Private Security in the 1970s (1970년대의 민간경비연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.15-24
    • /
    • 2013
  • In the 1960s, economic growth served to step up industrialization and urbanization, which was concurrent with th e urban concentration of population, and this phenomenon led to an increase in crime, and there was a rapid increase in demand for security at the same time. So the law enforcement authorities instituted the security service act in a move to secure quasi-police force. The enactment of the security service act has been put in force up to now, fueling the growth of security business. Mean while, the security industry has attained a splendid growth as one of growth industries, and it's required to look back on the past to determine new directions for the industry to make a new leap forward. Thus, the 1970s was a period to lay the groundwork for Korean private security, and the purpose of this study was to examine the social environments of the 1970s related to private security and what accelerated the development of private security.

Kinematic Envelope Analysis of the Urban Transit EMU based on PSD Installation (PSD 설치에 따른 도시철도차량의 동적 거동 분석)

  • Chung, Jong-Duk;Ohn, Jung-Ghun;Pyun, Jang-Sik;Park, Jang-Gon;Lee, Jong-Woo
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.6
    • /
    • pp.447-453
    • /
    • 2013
  • Since PSDs(Platform Screen Doors) are set up at many subway stations, their design related to safety has become gradually important. In particular, the interference check with a running railway vehicle is the most important of performance indices because the collision between PSDs and vehicles can be dangerous for passengers in the car and on platforms. When the train comes into a station with a curvature, the passenger car has a large translational and rotational motion and the displacement is enough for coming in contact with PSD. The performance is affected by many design parameters such as rail design parameters and vehicle velocity. This study proposes dynamic analysis models for railway vehicles and rails. Some parameters were also considered in the models to determine their influence on the performance.

Analysis of Key Factors in Operational Control Transition Resolution using Analytic Hierarchy Process (AHP) (계층적 분석방법(AHP)을 적용한 전시작전통제권 전환의 주요 결정요인 분석)

  • Park, Sang-Jung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.153-163
    • /
    • 2011
  • This study analyzes the military and political factors that influenced the Participatory Government's resolution in Wartime Operational Control (OPCON) Transition. The research on key factors in OPCON transition firstly implemented literature research and then increased feasibility through additional use of AHP. The analysis results showed that there was a negative effect for Korean Peninsular Defense in the 'ROK-US Alliance Asymmetry' area, a positive effect to increase ROK-led Capability of Theater Operation in the 'ROK and U.S. Alliance Interdependence' area and a positive effect for Invocation of ROK Self-Defense Power in the 'Interests of Participatory Government's Liberal Regime' area respectively. After applying AHP, "ROK exercise of Self-defense" in the 'Interests of Participatory Government's Liberal Regime' area received the highest assessment, while the "Increasement of North Korea's Threat" in the 'ROK-US Alliance Asymmetry' area received the lowest assessment. This study is meaningful in that it analyzed the key military and political factors in the Participatory Government's resolution of Wartime OPCON Transition using AHP.

The Effects of Social Media Utilization on Country Image and Purchase Intention (소셜미디어 활용수준이 국가이미지와 구매의도에 미치는 영향)

  • Park, Seong-Taek;Kim, Ki-Hong;Li, Guozhong
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.127-138
    • /
    • 2013
  • The age of social network has arrived. Social media is the various online media for sharing of opinions and experiences and open for internet users' participation. As the new communication tools, social media has been in the limelight, threatening the traditional media as alternative media. In globalization, country image is seen as the source of competitiveness of a country. The goal of this study is to examine what impact does the utilization of social media has on country image, and we conducted our analysis in two aspects of social media utilization, usage volume and usage diversity. In addition, we examined the impact of factors that form the country image on purchase intention. The analytical results show that media usage volume positively affects country image, people image, political image and media usage diversity has significant effects on economical image, people image and political image.

A Study on the Continuity Essential Function of Critical Infrastructure Protection System for Public Safety (공공안전을 위한 국가기반체계 보호제도의 핵심기능연속성에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.795-802
    • /
    • 2017
  • If the function of the national infrastructure is suspended due to natural disasters and social disasters, the damage of the national infrastructure can be a serious threat to the national security as well as the life, body and property damage of the people. In this paper, we examine the domestic and overseas trends of the national system protection system and examine the domestic and overseas trends of the national system protection system. The detailed function of the essential function continuity, essential function, succession order, authority delegation, continuity facility, continuity communication, We examined the specific issues related to testing, education and training, transferring control and directing authority, analyzing the system related to the national infrastructure protection plan, and examined the specific problems and suggested an effective improvement plan for the critical infrastructure protection system.

Implementing Software Risk Management Process based on CMMI (CMMI기반의 소프트웨어 리스크 관리 프로세스 구축)

  • Do, Sung-Ryong;Han, Hyuk-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.45-53
    • /
    • 2011
  • There are always many kinds of risks in software development such as frequent changes of requirements. Especially those risks related to the software characteristic of non-visibility can be threat to the project success. That lead us to the need of process implementation to reduce and minimize those risks. Although, most of the organization recognizes the importance of risk management, actual implementation requires professional knowledge in this area. CMMI, the de facto standard in process reference model, also emphasizes on risk management process area but only provides goals and practices to be implemented, not detail procedure and methods. In this paper, we developed Risk management implementation model based on IDEAL, the process improvement model based on CMMI. The proposed model will help the organizations to implement risk management process which is proper to their situation in the factor of organization size and project characteristics.

  • PDF

Data Assimilation of Real-time Air Quality Forecast using CUDA (CUDA를 이용한 실시간 대기질 예보 자료동화)

  • Bae, Hyo-Sik;Yu, Suk-Hyun;Kwon, Hee-Yong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.271-277
    • /
    • 2017
  • As a result of rapid industrialization, air pollutants are seriously threatening the health of the people, the forecast is becoming more and more important. In forecasting air quality, it is very important to create a reliable initial field because the initial field input to the air quality forecasting model affects the accuracy of the forecast. There are several methods for enhancing the initial field input. One of the necessary techniques is data assimilation. The number of operations and the time required for such data assimilation is exponentially increased as the forecasting area is widened and the number of observation sites increases. Therefore, as the forecast size increases, it is difficult to apply the existing sequential processing method to a field requiring fast processing speed. In this paper, we propose a method that can process Cresman's method, which is one of the data assimilation techniques, in real time using CUDA. As a result, the proposed parallel processing method using CUDA improved at least 35 times faster than the conventional sequential method and other parallel processing methods.

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

Indoor Air Quality Monitoring Systems in the IoT Environment (IoT 기반 실내 공기질 모니터링 시스템)

  • Oh, Chang-Se;Seo, Min-Seok;Lee, Jung-Hyuck;Kim, Sang-Hyun;Kim, Young-Don;Park, Hyun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.886-891
    • /
    • 2015
  • Recently, The World Health Organization announced that harms human health because of air pollution that are emerging as threats to human health worldwide. according to the, Seoul, 2011 According to a July 2014 - Public Facilities indoor air quality measurements, were examined to be in violation of indoor air pollution standards in most multi-use facility. Indoor air pollution resulting from this is present in the paper, and cause disease, such as pulmonary disease, asthma, bronchitis and to In this connection, the measurement of indoor air quality by using the environment sensor, analyzing the measured data to generate an actuator signal required for ventilation and improve indoor air quality by implementing a monitoring system with real-time measurement, autonomously managing the air quality in our lives so that it can be.