• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.025 seconds

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

Propaganda, Conservatives, and the Media: Analyzing the "Lost 10 Years" as Propaganda Strategies (선전, 보수세력 그리고 언론: 선전전략으로서 '잃어버린 10년' 분석)

  • Kim, Yung-Wook
    • Korean journal of communication and information
    • /
    • v.53
    • /
    • pp.100-120
    • /
    • 2011
  • The inauguration of President Lee Myung-bak symbolizes the success of the "Lost 10 Years" election strategy. This study investigated the meaning of the "Lost 10 Years" strategy and compared this strategy to other traditional propaganda strategies. Although the "Lost 10 Years" is a Grand National Party (GNP) election strategy, it also functions as a conservative propaganda strategy by conservative political groups and media. Thus, this study intends to compare the rhetoric of the GNP with conservative media and find any similarities between the two entities in the context of the "Lost 10 Years" propaganda strategies. This study gathered data from various conservative sources such as the GNP homepage and conservative newspapers to uncover common conservative propaganda messages. The results showed that the first-level propaganda strategies are very similar to the second-level traditional Lasswell strategies. This implies that the "Lost 10 Years" strategy benchmarked traditional propaganda strategies and the GNP won the presidential election because the effectiveness of traditional propaganda strategies was culminated with the support of the conservative media. With these research findings, the study discussed the implications of the propaganda strategies used by conservatives and future research prospects about the subject.

  • PDF

A study on Cancel key function and spatialization metaphor in mobile (모바일 폰에서 [이전]기능과 사용자 공간 은유에 관한 연구)

  • Seo, Kyung-Ja;Song, Hyun-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1059-1063
    • /
    • 2009
  • 모바일 폰의 메뉴 구조는 하이퍼텍스트 형태로 정보를 제공하며 링크의 연결로 페이지 정보를 전달하거나 하부 카테고리로 연결하는 역할을 한다. 모바일 폰 사용자는 메뉴 조작을 통해 기능을 실행하며, 이 과정에서 선형구조, 계층형 구조, 대화형 구조, 데이터베이스 구조, 혼합구조와 같은 다양한 형태를 경험하게 된다. 사용자는 모바일 폰의 다양한 기능을 사용하면서 추상적 개념의 공간 인지를 구체적인 공간으로 이해하려 한다. 즉 UI, GUI에서 제시하고 있는 Label이나 방향표시를 따라 상하좌우라는 공간적 개념으로 은유하여 이해하는 것이다. 하드키 단말의 경우는 상하좌우키를 이용하여 공간을 이해했다면 최근에는 터치 및 제스처 동작 인식이 가능한 폰이 등장하면서 좌우 flick, 상하 flick 등과 같은 구체적인 행동으로 디바이스 화면에서 공간이 이동하는 것으로 이해하고 있다. 본 논문에서 사용자의 공간 은유를 이해하기 위해 상위 depth로 이동하는 [이전] 키의 기능을 중심으로 살펴보고자 한다. 첫째, 기능을 수행하기 위해 순차적으로 진행하는 방법보다는 [취소]를 이용하여 depth를 이동하는 것이 사용자의 모바일 폰의 공간 은유 파악에 더욱 도움을 줄 수 있을 것이라고 예상되기 때문이다. 둘째, [이전], [취소]라는 Label이 가지고 있는 모호성 때문이다. 모바일 폰의 다양한 기능 중에서 [이전]는 전체 사용에 있어 아주 작은 요소에 불과하지만 사용자는 정해진 순서의 process에 따라 기능을 수행할 때와는 다르게 역 방향 Process를 사용하면서 모바일 폰의 구조를 이해하고 모바일 공간을 인지하는 중요한 요소로 사용될 수 있을 것이라고 예상된다. 본 논문에서는 이전으로 돌아가는 [이전]의 기능을 통해 사용자가 메뉴의 층위 구조 및 공간 인지에 영향을 미칠 수 있을 것이다라는 가설을 설정하여 이를 실험을 통해 증명하고자 한다. 실험을 위해 모바일 폰을 자주 사용하고 있는 20~30대 남녀 10명의 피험자에게 전화번호부, 앨범, 문자메시지의 목록화면과 상세보기 화면을 제시한 후 마지막 상세보기 화면에서 실험에서 제시하는 제시어를 보고 어느 화면으로 이동하게 될 것인지를 예상하는 질문을 하였으며, 그러한 이유에 대해서는 인터뷰를 통해 확인하였다. 이 실험을 통해 사용자의 모바일 폰 공간인지는 동일한 레벨의 단계 즉 상세보기의 경우는 수평의 관계라고 보고 있으며, 목록화면과 상세화면의 관계는 상하의 관계라고 이해하고 있다. 이러한 이유를 인터뷰를 통해 질문하였을 때, 상세화면에서 좌우 방향표시가 존재하기 때문이라는 응답이 높았으며, 상세보기 화면이 좌우라고 인식하면 목록화면은 상하의 관계로 이해하고 있다고 응답하였다. 즉 하나의 정해진 공간인지를 통해 다른 공간을 유추하여 생각하고 있다고 볼 수 있다. 또한 결과적으로 실제 단말에서 [이전] 기능을 상위 depth로 이동하도록 설계하였다면 [한단계위]라는 Label 또는 e번과 같은 상위의 개념을 포함한 아이콘을 사용한다면 혼란을 줄일 수 있는 방법으로 활용될 수 있을 것으로 예상된다. 현재 논문에서는 [이전]라는 기능으로만 사용자의 공간 개념을 예측할 수 있었지만, 터치스크린의 등장과 함께 플릭과 같은 다양한 제스처에 의한 인터렉션이 가능한 현 시점에서 추상적인 공간은 방향성을 가진 제스처에 의해 구체적인 물리적 공간으로 인식하는 경향이 더욱 뚜렷이 나타나고 있다. 이러한 시점에서 사용자의 공간인지에 도움을 줄 수 있는 Label과 방향성 표시는 더욱 절실히 요구되고 있는 시점이며, 이후 모바일 환경에서 사용자의 공간인지에 대한 구체적인 연구가 필요하리라고 예상된다.

  • PDF

Mediated ID based signature scheme and key updating signature scheme (중재자를 이용한 ID기반 전자서명과 키 업데이팅 전자서명 기법)

  • Ju, Hak-Soo;Kim, Dae-Youb
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.463-470
    • /
    • 2007
  • Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.

Group Key Management Scheme for Access Control with Reactive Approach (접근 제어를 위한 반응적 방식의 그룹키 관리 기법)

  • Kim, Hee-Youl;Lee, Youn-Ho;Park, Yong-Su;Yoon, Hyun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.589-598
    • /
    • 2007
  • In the group communication which has multiple data streams and various access privileges, it is necessary to provide group access control. The group members having the same access privilege are classified into one class, and the classes form a hierarchy based on the access relations. Then each class is assigned to a secret key. In the previous schemes, a single logical key graph is constructed from the hierarchy and each member always holds all secret keys of the classes he can access in the proactive manner. Thus, higher-privileged members hold more keys then lower-privileged members. However, if the hierarchy is large, each member manages too many keys and the size of multicast message in rekeying increases in proportion to the size of the hierarchy. Moreover, most of the members access a small portion of multiple data streams simultaneously. Therefore, it is redundant to receive rekeying message and update the keys in which he is not currently interested. In this paper, we present a new key management scheme that takes a reactive approach in which each member obtains the key of a data stream only when he wants to access the stream. Each member holds and updates only the key of the class he belongs. If he wants to get the key of other class, he derives it from his key and the public parameter. Proposed scheme considerable reduces the costs for rekeying, especially in the group where access relations are very complex and the hierarchy is large. Moreover, the scheme has another advantage that it easily reflects the change of access relations.

A Phoneme-based Approximate String Searching System for Restricted Korean Character Input Environments (제한된 한글 입력환경을 위한 음소기반 근사 문자열 검색 시스템)

  • Yoon, Tai-Jin;Cho, Hwan-Gue;Chung, Woo-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.788-801
    • /
    • 2010
  • Advancing of mobile device is remarkable, so the research on mobile input device is getting more important issue. There are lots of input devices such as keypad, QWERTY keypad, touch and speech recognizer, but they are not as convenient as typical keyboard-based desktop input devices so input strings usually contain many typing errors. These input errors are not trouble with communication among person, but it has very critical problem with searching in database, such as dictionary and address book, we can not obtain correct results. Especially, Hangeul has more than 10,000 different characters because one Hangeul character is made by combination of consonants and vowels, frequency of error is higher than English. Generally, suffix tree is the most widely used data structure to deal with errors of query, but it is not enough for variety errors. In this paper, we propose fast approximate Korean word searching system, which allows variety typing errors. This system includes several algorithms for applying general approximate string searching to Hangeul. And we present profanity filters by using proposed system. This system filters over than 90% of coined profanities.

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.

Design to Realtime Test Data Topic Utilize of Data Distribution Service (데이터 분산 서비스를 활용한 실시간 시험자료 토픽 설계)

  • Choi, Won-gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1447-1454
    • /
    • 2017
  • The realtime test data topic means that process for the data efficiently from many kinds of measurement device at the test range. There are many measurement devices in test range. The test range require accurate observation and determine on test object. In this realtime test data slaving framework system, the system can produce variety of test informations and all these data also must be transmitted to test information management or display system in realtime. Using RTI DDS(Data Distribution Service) middle ware Ver 5.2, we can product the efficiency of system usability and QoS(Quality of Service) requirements. So the application user enables to concentrate on applications, not middle ware. As the reason, Complex function is provided by the DDS, not the application such as Visualization Software. In this paper, I suggest the realtime test data topic on slaving framework of realtime test data based on DDS at the test range system.

Performance of an Efficient Association Control Scheme for Public Wireless LAN Systems (고속 공중 무선랜 시스템을 위한 효율적인 연결 요청 제어방법의 성능분석)

  • Lee Hyun woo;Kim Se han;Ryu Won;Yoon Chong ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3A
    • /
    • pp.209-216
    • /
    • 2005
  • This paper generally relates to the field of wireless local area networks(WLANs), and more particularly, to AP selection and association methods for the performance of a station. In these days, IEEE 802.11 Wireless LAN network is widely deployed and used as an emerging service to connect high-speed Internet in the public wireless environment. But, if there are many users in hot spot area, they suffer a severe decrease of performance. Thus it needs an association and access control mechanism especially when it is used in the public environment. In this paper, we suggest a selection and association method using Beacon or Probe Response frames based IEEE 802.11. Station selects AP using the information of the capacity area in a Beacon or a Probe Response frame. According to the present paper, an association method for a public WLAN service, which includes a WLAN user terminal and an AP for relaying WLAN communications to and from the user terminal, includes the steps of the user terminal asking the AP's states for access to a radio channel; and the station selects and associates with the AP According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.

Efficient Parallel Spatial Join Processing Method in a Shared-Nothing Database Cluster System (비공유 공간 클러스터 환경에서 효율적인 병렬 공간 조인 처리 기법)

  • Chung, Warn-Ill;Lee, Chung-Ho;Bae, Hae-Young
    • The KIPS Transactions:PartD
    • /
    • v.10D no.4
    • /
    • pp.591-602
    • /
    • 2003
  • Delay and discontinuance phenomenon of service are cause by sudden increase of the network communication amount and the quantity consumed of resources when Internet users are driven excessively to a conventional single large database sewer. To solve these problems, spatial database cluster consisted of several single nodes on high-speed network to offer high-performance is risen. But, research about spatial join operation that can reduce the performance of whole system in case process at single node is not achieved. So, in this paper, we propose efficient parallel spatial join processing method in a spatial database cluster system that uses data partitions and replications method that considers the characteristics of space data. Since proposed method does not need the creation step and the assignment step of tasks, and does not occur additional message transmission between cluster nodes that appear in existent parallel spatial join method, it shows performance improvement of 23% than the conventional parallel R-tree spatial join for a shared-nothing architecture about expensive spatial join queries. Also, It can minimize the response time to user because it removes redundant refinement operation at each cluster node.