• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.024 seconds

Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Jong-Geun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • In this paper, the possibility of a UE (User Equipment) incarceration attack using RRCRejecet and RRCRelease in 5G SNPN (Standalone Non-Public Network) is analyzed based on the 3GPP standard document. First, the cell selection and reselection procedures of the UE are analyzed, and then the processing process of the false base station and the UE before and after transmission of RRCReject and RRCRelease is analyzed. As a result of the analysis, it is possible that the false base station that transmits a strong signal causes the victim UE to establish an RRC connection to the false base station itself. In addition, if the false base station transmits an RRCReject message without integrity protection in response to the victim UE's attempt to establish an RRC connection, it is determined that the victim UE can continue to stay in the RRC connection attempt process. On the other hand, it is determined that it is impossible to incarcerate the victim UE by inducing an attempt to establish an RRC connection to another false base station using RRCRelease.

A Deep Learning Model for Disaster Alerts Classification

  • Park, Soonwook;Jun, Hyeyoon;Kim, Yoonsoo;Lee, Soowon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.1-9
    • /
    • 2021
  • Disaster alerts are text messages sent by government to people in the area in the event of a disaster. Since the number of disaster alerts has increased, the number of people who block disaster alerts is increasing as many unnecessary disaster alerts are being received. To solve this problem, this study proposes a deep learning model that automatically classifies disaster alerts by disaster type, and allows only necessary disaster alerts to be received according to the recipient. The proposed model embeds disaster alerts via KoBERT and classifies them by disaster type with LSTM. As a result of classifying disaster alerts using 3 combinations of parts of speech: [Noun], [Noun + Adjective + Verb] and [All parts], and 4 classification models: Proposed model, Keyword classification, Word2Vec + 1D-CNN and KoBERT + FFNN, the proposed model achieved the highest performance with 0.988954 accuracy.

Extended UDDI System for Registering and Discovering the Reusable Services (재사용 서비스의 등록/검색을 위한 확장된 UDDI 시스템)

  • Shin, Soohye;Baek, Sunjae;Park, Joonseok;Moon, Mikyeong;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.24 no.3
    • /
    • pp.101-110
    • /
    • 2011
  • Web Service which consists of SOAP, WSDL and UDDI is a software system that enables interactions of heterogeneous systems on networks with standardized XML message. Especially, UDDI is a registry for supporting the registration of a service by service publisher and discovery of a service by service requester. The preliminary studies are just about publishing and searching services. It presents the researches about UDDI study for improvement of searching a service and extended UDDI design for improvement of reusability with service components aspects. In this paper, we suggest not only features about publishing and searching services of existing UDDI system but also novel UDDI data structures and API for a reusable service model. In addition, we design and implement an extended UDDI system for publishing and finding the reusable services. Therefore, by using proposed UDDI systems, service developers reduce development costs and time through developing a service application reusing the already implemented services. In addition, it can expect to ensure the quality of services by reusing the proven services.

  • PDF

An Integrated Interface based on CIM between Energy Management System and Heterogeneous Systems (에너지 관리 시스템(EMS)과 이기종 시스템간 CIM 기반의 통합 인터페이스)

  • Kang, Dong Hyun;Lee, Yong Ik;Park, Jong Ho;Shin, Yong-Hack
    • Journal of Software Engineering Society
    • /
    • v.24 no.3
    • /
    • pp.111-115
    • /
    • 2011
  • With the emergence of the smart grid era, the interest in green energy which reduce carbon emissions and environment-friendly smart grid which combines the advantages of power and IT technology is increasing around the world. To use the smart grid effectively heterogeneous systems such as EMS, MOS and WIS must be linked together. However, additional interface should be developed to link EMS and heterogeneous systems since IEC has only defines the interface for EMS. Especially, to link legacy system and new system, some software might need to be designed and developed because separate interfaces for connection can be developed depending on each system and environment. In this paper, we propose an integrated interface based on CIM for interconnection between systems. A proposed interface can integrate messages of heterogeneous system and will be able to reduce costs that could be incurred by the removal of the existing system and the addition of the new system.

  • PDF

The Efficient Method for Video Data Streaming via NMEA-0183 (NMEA-0183 기반 영상데이터의 효율적인 스트리밍 기법)

  • Kim, Byoung-Kug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1300-1305
    • /
    • 2020
  • Due to the simplicity of communication structure using RS-232 and RS-422, the majority ships have still adapted on these communication interfaces and have constructed their own communication network in the ship. NMEA-0183 is the one of standards for BNWAS(Bridge Navigational Watch Alarm System) and currently being used in many countries. BNWAS utilises diverse sensor devices, GPS, AIS and so on for monitoring the status of ships and their deployments and environmental information(temperature, humidity, wind speed/direction, water temperature/current etc…). This paper proposes the use of any image sensors in NMEA-0183 environment and verifies possibility with certain video qualities through the experiment results. Furthermore the paper gathers videos and monitors the change of their qualities depending on the number of NMEA messages on RS-232 communication link. Finally we make conclusion that our proposal is sufficiently appropriate for ship monitoring system in the NMEA-0183.

The DIO Interval Adjustment to Enhance Mobility in RPL (RPL에서 이동성 향상을 위한 DIO 전송 간격 조절)

  • Shin, Yejin;Seol, Soonuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1679-1686
    • /
    • 2019
  • The main purpose of this research is to propose an approach for solving the packet loss problem by quickly adapting to topology change when nodes move in RPL-based IoT environment. In order to enhance mobility, every node is aware of the mobility of its neighbor nodes and quantifies the mobility level based on the number of control messages and all received packets. According to the mobility level, the DIO timer is changed. The proposed approach allows nodes to change their DIO timers according to their mobility levels to adapt topology changes and update paths to the sink. The performance of the proposed approach is evaluated using a Contiki-based Cooja simulator in various moving speeds. The simulation results show that the proposed approach copes with mobility scenarios better than the standard RPL by ascertaining that the packet delivery ratio is improved by 31.03%.

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

Security Verification of Wireless Remote Control System Using CPN (CPN을 이용한 무선원격제어시스템의 안전성 검증)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.81-90
    • /
    • 2003
  • Existing web-based system management software solutions show some limitations in time and space. Moreover, they possess such as shortcomings unreliable error message announcements and difficulties with real-time assistance suppers and emergency measures. In order to solve these deficiencies, Wireless Remote Control System was designed and implemented. Wireless Remote Control System is able to manage and monitor remote systems by using mobile communication devices for instantaneous control. The implementation of Wireless Remote Control System leads to these security Problems as well as solutions to aforementioned issues with existing web-based system management software solutions. Therefore, this paper has focused on the security matters related to Wireless Remote Control System. The designed security functions include mobile device user authentication and target system access control. For security verification of these security functions introduced CPN(Coloured Petri Nets) which is capable of expressing every possible state for each stage. And then in this paper was verified its security through PI(Place Invariant) based on CPN(Coloured Petri Nets). The CPN expression and analysis method of the proposed security function can also be a useful method for analyzing other services in the future.

A study on the Filtering of Spam E-mail using n-Gram indexing and Support Vector Machine (n-Gram 색인화와 Support Vector Machine을 사용한 스팸메일 필터링에 대한 연구)

  • 서정우;손태식;서정택;문종섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.23-33
    • /
    • 2004
  • Because of a rapid growth of internet environment, it is also fast increasing to exchange message using e-mail. But, despite the convenience of e-mail, it is rising a currently bi9 issue to waste their time and cost due to the spam mail in an individual or enterprise. Many kinds of solutions have been studied to solve harmful effects of spam mail. Such typical methods are as follows; pattern matching using the keyword with representative method and method using the probability like Naive Bayesian. In this paper, we propose a classification method of spam mails from normal mails using Support Vector Machine, which has excellent performance in pattern classification problems, to compensate for the problems of existing research. Especially, the proposed method practices efficiently a teaming procedure with a word dictionary including a generated index by the n-Gram. In the conclusion, we verified the proposed method through the accuracy comparison of spm mail separation between an existing research and proposed scheme.