• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.03 seconds

A Study on the Modus Operandi of Smishing Crime for Public Safety (국민안전을 위한 스미싱 범죄수법분석)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.3-12
    • /
    • 2016
  • The purpose of this study is to analyse Modus Operandi of smishing. For the study, 87 cases of smishing crime reports and smishing experiences of victims were analysed and 10 police officers who investigates smishing crime were interviewed. The results indicated that smishing crime can be divided into the preparation stage and the implementation stage. In the preparation stage, two modus operandi patterns, collection of personal information and text message script composition, were identified. In the implementation stage, seven modus operandi patterns were identified: sending smishing text messages and installation of malicious mobile applications, leak personal information, sending personal information to smishing crime organization through online server, payment attempt using collected personal information, intercept authorization code, completion of payment using intercepted authorization code, and payment amount was delivered to victims. Further implications were discussed.

Design and Implementation of Security Technique in Electronic Signature System (전자결재 시스템에서 보안기법 설계 및 구현)

  • 유영모;강성수;김완규;송진국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.491-498
    • /
    • 2001
  • IN this Paper we propose an encryption algorithm for security in data communication. this algorithm acts encryption operation after the compression of data in order to reduce the transmission time and storage an encryption key is generated by using a parameter. as soon as key value is generated the parameter is transmitted and key is recreated every 26 times of parameter changing. the random number which is a constituent unit of encryption key is stored in a table the table is reorganized when the key is generated 40 times in order to intensity the security of encryption key. the encryption of data is made through the operation process of the generated key and sour data and the decryption performs the revers operation of encryption after getting decryption key by searching the transmitted parameter. as this algorithm is performed lastly it is possible to be used in practice.

  • PDF

A Design and Implementation of Framework for Interworking between Heterogeneous Vehicle Networks for Intelligent Transportation System (지능형 교통시스템을 위한 이기종 차량 네트워크의 연동 프레임워크 설계 및 구현)

  • Yun, Sang-Du;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.901-908
    • /
    • 2010
  • There are many kinds of networks in vehicle for their purposes. In-vehicle networks, however, are not unified to single network. The networks are composed of several local networks because of communication speed, cost and efficiency. Because the complexity of network design for communication increases, local networks need a framework for interworking between heterogeneous networks. In this paper, a framework interworking between in-vehicle networks for ITS(Intelligent Transportation System) is proposed and implemented. The proposed framework consists of a compatible protocol, message conversion module, message transceiver module and message analysis module. The results obtained by implementation show that the framework efficiently supports the communication of information between heterogeneous in-vehicle networks.

Effects on Preventive Behavior Intention to Particulate Matter by Risk Perception Attitude and Anxiety : Focus on Adoption of RPA Model (위험인식태도와 불안이 미세먼지 예방행동의도에 미치는 영향: RPA모델 적용을 중심으로)

  • Ko, Du Hee;Song, Hae Ryong
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.517-526
    • /
    • 2020
  • This study aimed to understand the effects on preventive behavior intention to particulate matter by risk perception attitude and anxiety. Also, to expand applicable target and range of RPA model, add anxiety. To measure main variables of RPA model, did a survey with 570 college students. With a data, analyzed by correlation, one-way ANOVA and three-way ANOVA. As a result, perceived risk and efficacy effect on intention to preventive action and information seeking. And an anxiety factor effects on intention to preventive action and information seeking also. And distinguished 4 groups of RPA model, there were meaningful differences between intention to preventive action and information seeking by groups, and a factor of anxiety effects certain groups. As a result, it can suggest how to plan and enforce message on preventive campaign of particulate matter. In follow research, with social psychological factors, it will helpful to identify health activities about particulate matters.

A Distributed Deadlock Detection and Resolution Algorithm for the OR Model (OR 모델 기반의 분산 교착상태 발견 및 복구 기법)

  • Lee, Soo-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.10
    • /
    • pp.561-572
    • /
    • 2002
  • Deadlock detection in distributed systems is considered difficult since no single site knows the exact information on the whole system state. This paper proposes a time-efficient algorithm for distributed deadlock detection and resolution. The initiator of the algorithm propagates a deadlock detection message and builds a reduced wait-for graph from the information carried by the replies. The time required for deadlock detection is reduced to half of that of the other algorithms. Moreover, any deadlock reachable from the initiator is detected whereas most previous algorithms only find out whether the initiator is involved in deadlock. This feature accelerates the detection of deadlock. Resolution of the detected deadlock is also simplified and precisely specified, while the current algorithms either present no resolution scheme or simply abort the initiator of the algorithm upon detecting deadlock.

A Design and Implementation of Framework for In-Vehicle Networks Using XML (XML을 이용한 차량 네트워크의 통합 프레임워크 설계 및 구현)

  • Yun, Sang-Du;Kim, Jin-Deog;Yu, Yun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.430-433
    • /
    • 2010
  • In-vehicle networks have been developed to increase capacity and reduce wiring in the car. These would make communication possible with each heterogeneous networks by the advent of networks attached to the vehicle. However, these come with a variety of unique features in each network-specific communication which creates difficulty using and supporting the service. To solve this problem, local networks need a standard integration framework. In this paper, a framework, consists of a standard protocol using XML to improve compatibility and portability, is proposed and implemented. Each network is compatible with the framework by applying unique information and messages of the network in the XML standard ducument. The results obtained by implementation show that the framework supports the communication of information between heterogeneous in-vehicle networks.

  • PDF

A Scalable and Effective DDS Participant Discovery Mechanism (확장성과 효율성 고려한 DDS 참여자 디스커버리 기법)

  • Kwon, Ki-Jung;You, Yong-Duck;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1344-1356
    • /
    • 2009
  • The DDS (Data Distribution Service) is a data-centric communication technology that provides an efficient communication service that supports a dynamic plug & play through an automatic setting of participants' location information for each data (Topic) by using DDS discovery technique. This paper proposes the hierarchical-structured DDS discovery technique (SPDP-TBF) suitable for the large-scale distributed systems by comparing and analyzing the existing DDS discovery techniques in terms of performance and problem areas. The proposed SPDP-TBF performs the periodic discovery of the involved participants only by having separate hierarchical managers which take charge of the registration and search (of participants) so that a participant sends its information to the related participants only, and it enhances the effectiveness of the message transfer. Moreover, the proposed SPDP-TBF provides the improved scalability by performing the hierarchical discovery through hierarchical manager nodes so that it can be applied to the large-scale distributed system.

Implementation of Aeronautical Surveillance Transceiver using AIS based on ADS-B Concepts (선박자동식별장치를 이용한 ADS-B 개념 기반의 항공감시용 송수신기의 구현)

  • Song, Jae-Hoon;Oh, Kyung-Ryoon;Kim, Jong-Chul;Lee, Jang-Yeon
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.19-20
    • /
    • 2009
  • International Maritime Organization(IMO) recommends the installation of an Automatic Identification System(AIS) according to requirements by SOLAS Chapter 5 to avoid maritime collision. AIS provides traffic information of other ships that may be used for maritime traffic control, SAR(Search and Rescue) and collision avoidance to apply safety management. In this paper, preliminary results to implement an aeronautical surveillance transceiver using AIS transceiver based on ADS-B concepts are described. Although altitude information is not required for AIS since the AIS is operated at MSL(Mean Sea Level), altitude information can be extracted by a GPS chip-set in the ALS transceiver. ADS-B transceiver is implemented by defining a surveillance message format including the altitude information and modifying SOTDMA protocol. Ground tests and flight tests are performed to validate the implementation results.

  • PDF

An Adaptive Routing Protocol with a Balanced Energy Consumption For Wireless Ad-hoc Networks (애드혹 네트워크에서 에너지 소비 균형을 고려한 적응형 라우팅 프로토콜)

  • Kim, Yong-Hyun;Hong, Youn-Sik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.303-310
    • /
    • 2008
  • To increase the lifetime of ad-hoc networks, a ratio of energy consumption for each node should be kept constant by equally distributing network traffic loads into all of the nodes. In this paper, we propose a modified AODV routing protocol to determine a possible route by considering a remaining battery capacity of a node and the degree of its usage. In addition, to reduce the amount of energy consumption during the path rediscovery process due to the huge amount of the AODV control messages the limited number of possible routes are stored into a routing table of a source node. When some links of a route fail, another possible path can be looked up in the table before the route discovery process should be initiated. We have tested our proposed method with a conventional AODV and a MMBCR method which is one of the power-efficient energy routing protocols based on the three performance metrics, i.e., the total remaining battery capacity, network lifetime and the ratio of data packets received by the destination node to compare their performance.

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF