• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.025 seconds

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

Design and Implementation of an Instant Messenger between the two different domain mobile terminal systems (이종(異種) 모바일 단말 간 인스턴트 메신저 설계 및 구현)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, we are living in the world of information and ubiquitous technology strayed away from the fixed network systems resulting in an increase of using mobile terminals which is convenient for mobility and functionality. Because the diversification of mobile devices to communicate between disparate mobile terminals is difficult, the two kinds of operating systems and hardware for data communication between the terminals is needed to convert the data. The proposed instant messenger design in MRP-S3C2440A (Windows CE 5.0) and Nexio XP30 (Windows CE .NET 4.1) were tested and applied. Usually the mobile terminal has an information on a central server. Sender terminal receives the message according to the characteristics of the terminal after converting was sent to the receiving terminal. Receiving-side terminal without a separate conversion process, it was the output terminals. This paper deals with the proposal and implementation of designing an instant messenger application program between the two different mobile terminals and network systems.

A Design of HTML5-based Service Migration Technology between Heterogeneous Browsers (이종 브라우저 간 HTML5 기반 서비스 이동기술 설계)

  • Song, Eun-Ji;Kim, Geun-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.342-353
    • /
    • 2013
  • The Internet has become a part of our lives. As the number of devices with Internet accessibility increases, users can use web services with those devices anytime, anywhere. Web contents on the web page can be delivered to user in various forms for various devices and users want to use seamlessly the contents with an appropriate device. Web browser extension is function to add features that are not supported by default browser. All browsers support extensions that provide the same services for cross-browser. In this paper, We proposed object migration architecture between heterogeneous browsers by expanding our proposed mechanism that identifies objects and the information of those objects to be migrated in the web page, extracts the object and creates object after migration. For this purpose, we analyzed the extension architecture of representative browsers and investigated necessary files to develop objects migration extension. In addition, We investigated how to send and receive message among files in each browser extension and the interaction mechanism among those files. Finally, We implemented the object migration mechanisms between heterogeneous browsers.

An Energy-Efficient Self-organizing Hierarchical Sensor Network Model for Vehicle Approach Warning Systems (VAWS) (차량 접근 경고 시스템을 위한 에너지 효율적 자가 구성 센서 네트워크 모델)

  • Shin, Hong-Hyul;Lee, Hyuk-Joon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.118-129
    • /
    • 2008
  • This paper describes an IEEE 802.15.4-based hierarchical sensor network model for a VAWS(Vehicle Approach Warning System) which provides the drivers of vehicles approaching a sharp turn with the information about vehicles approaching the same turn from the opposite end. In the proposed network model, a tree-structured topology, that can prolong the lifetime of network is formed in a self-organizing manner by a topology control protocol. A simple but efficient routing protocol, that creates and maintains routing tables based on the network topology organized by the topology control protocol, transports data packets generated from the sensor nodes to the base station which then forwards it to a display processor. These protocols are designed as a network layer extension to the IEEE 802.15.4 MAC. In the simulation, which models a scenario with a sharp turn, it is shown that the proposed network model achieves a high-level performance in terms of both energy efficiency and throughput simultaneously.

  • PDF

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.

A Study on 5G-based Text Alert Service Requirements and Scenarios for Realizing Active Geo-Targeting (능동적 Geo-Targeting을 위한 5G 기반의 긴급재난문자 서비스 요구사항 및 시나리오 연구)

  • Lee, Tae-Gyeom;Kang, Seung-Woo;Kim, Yewon;Oh, Seung-Hee;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.23-30
    • /
    • 2021
  • Due to the recent advancements of mobile telecommunication technology and high mobile phone penetration rate, researches on emergency text alert service for enhancing the accessibility have been actively conducted. The worldwide spread of COVID-19 further accelerates the efforts for the alert services. Existing emergency text services are simple and efficient. However, unclear reception area may cause unintended alert messages frequently. In this paper, we analyze survey results regarding the 5G-based text-alert services to derive service requirements for technological advancement. Then we propose an emergency disaster text service scenario using Active Geo-Targeting that enables active disaster text reception of terminals. In addition, we newly define an interface protocol that is CIB(Control Information Block) to operate the proposed scenario.

Success Factor and Failure Factor of Social Media in Korean Society: Based on the Word Analysis and the Network Analysis on Interview Data (한국사회에서 소셜 미디어의 성공과 실패 요인 분석: 인터뷰 데이터에 대한 어절분석·네트워크 분석을 중심으로)

  • Hong, Juhyun;Kim, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.74-85
    • /
    • 2019
  • This Study explores the reason why the social media like Cyworld, Iloveschool in Korea in the viewpoint if the layered model by interview. As a result the success factor in the viewpoint of layered model, user used social media for fulfilling the need for linking with other users and the social media offers the customized contents to user. Finally the social media dominated the market in advance. Facebook and Kakao talk are good examples of successful media. The failure factors are to care less about what other users want, to limit the expand of platform and not to copy with the change of the media environment. Iloveschool, Cyworld and Twitter are the examples of failure social media in Korean society. This study highlights the importance of the sensitivity of the change of environment. The expert mentioned the importance of 4th industrial revolution technology like AI, Big data and expected that new technology will emerge and the service will be developed by the change of user's taste.

A Study on the User Acceptance and Change upon Exhibitions of National Archives (국가기록 전시의 의미화에 대한 이용자 수용과 변화에 관한 연구)

  • Jo, Min-ji
    • The Korean Journal of Archival Studies
    • /
    • no.57
    • /
    • pp.5-33
    • /
    • 2018
  • Records, especially the authentic records the nation secured, have an ontological feature of proof that is able to persuade the current present of the past present, and inherent in it is faith that originates from fundamental objectivity. Therefore the image of silence that such strictness of records creates realizes the detonation of specific memories through the act of visual exhibition. This research started from the notion that records achieve social vitality and return through its exhibition, as well as the critical awareness that it 're-mediate' the past and memory through interactions with image. The reason for viewing the archival exhibition as the subject of user analyzation is that in the process where exhibition sorts and arranges records, it is the tool and mediation that most distinctly exposes the identity of the archives. Hence, this research first analyzes national archives, particularly the exhibition of "presidential" records, which is in the center of memory conflict, in the viewpoint of the cultural practice of memory. Afterwards, it discusses empirical research and results on how users accept and resist the meaning of the exhibition through actual surveys of users after their viewing of an exhibition.