• Title/Summary/Keyword: 취약성 요소

Search Result 649, Processing Time 0.031 seconds

A Secure Bluetooth Piconet using Non-Anonymous Group Keys (비익명성 그룹키를 이용한 안전한 블루투스 피코넷)

  • 서대희;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.222-232
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth has weaknesses in its suuity features when its in security services are applied to Home networks. The purpose of this study is to propose a safe Bluetooth scenario with an upgraded suity feature. This paper first reviews the general characteristics and security features of Bluetooth together with an analysis of its weaknesses, and presents the formation and maintenance process of Bluetooth piconet what is created by using ECDSA and group key in the ACL(Asynchronous Connection-less Link) connection through a safe Bluetooth inquiry process.

Modified HAZUS Method for Seismic Fragility Assessment of Domestic PSC-I Girder Bridges (PSC-I 거더교의 지진취약도 평가를 위한 HAZUS 방법의 국내 적용성 연구)

  • Seo, Hyeong-Yeol;Yi, Jin-Hak;Kim, Doo-Kie;Song, Jong-Keol
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.14 no.2
    • /
    • pp.161-170
    • /
    • 2010
  • To reduce the amount of seismic damage, several design codes are being improved considering the earthquake resistant systems, and many researches are being conducted to develop the earthquake damage evaluation techniques. This study develops the Korean seismic fragility function using the modified HAZUS method applicable to PSC-I girder bridges in Korea. The major coefficients are modified considering the difference between the seismic design levels of America and Korea. Seismic fragility function of the PSC-I girder bridge (one of the standard bridge types in Korea) is evaluated using two methods: numerical analysis and modified HAZUS method. The main coefficients are obtained about 70% of the proposed values in HAZUS. It is found that the seismic fragility function obtained using the modified HAZUS method closes to the fragility function obtained by conventional numerical analysis method.

Service-oriented protocol security framework in ICT converged industrial environment (ICT 융합 산업 환경에서 서비스 지향 프로토콜 보안 프레임워크)

  • Lee, Seoung-Woo;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.15-22
    • /
    • 2017
  • This paper analyzes vulnerability of each service protocol used in ICT convergence industry, smart factory, smart grid, smart home, smart traffic, smart health care, and suggests technologies that can overcome security vulnerabilities. In addition, we design a service-oriented protocol security framework that allows us to quickly and easily develop security functions in an open environment by defining a security element common to protocols and designing a security module for each protocol layer including the corresponding elements. Service protocol independent security module and specialized security module, it will be possible to develop flexible and fast security system in ICT convergence industry where various protocols are used. The overall security level of the ICT service network can be improved by installing the necessary security modules in the operating system, and the productivity can be improved in the industrial security field by reusing each security module.

Development of Fragility Curves for Slope Stability of Levee under Rapid Drawdown (수위급강하에 대한 제방 사면의 취약도 곡선 작성)

  • Cho, Sung-Eun
    • Journal of the Korean Geotechnical Society
    • /
    • v.39 no.10
    • /
    • pp.27-39
    • /
    • 2023
  • To effectively manage flood risk, it is crucial to assess the stability of flood defense structures like levees under extreme flood conditions. This study focuses on the time-dependent probabilistic assessment of embankment slope stability when subjected to rapid water level drops. We integrate seepage analysis results from finite element analysis with slope stability analysis and employ Monte Carlo simulations to investigate the time-dependent behavior of the slope during rapid drawdown. The resulting probability of failure is used to develop fragility curves for the levee slope. Notably, the probability of slope failure remains low up to a specific water level, sharply increasing beyond that threshold. Furthermore, the fragility curves are strongly influenced by the rate of drawdown, which is determined through hydraulic analysis based on flood scenarios. Climate change has a significant impact on the stability of the water-side slope of the embankment due to water level fluctuations.

Development of the Safety Management Risk Assessment Factors and Indicators for Coastal/Offshore Fishing Vessels (연근해어선의 안전관리 위험성평가 인자 및 지표개발)

  • Song, Byung-Hwa;Kim, Cheol-Seong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.6
    • /
    • pp.783-788
    • /
    • 2021
  • Although the Korean government (Ministry of Ocean and Fisheries) and related organizations are enforcing many policies to improve the marine safety of vessels with weak safety management, the effectiveness of each policy is deficient due to the lack of a risk assessment method for ship safety management. Most previous studies in Korea of the risk assessment of ships only dealt with fragmentary risks of individual marine accident risks, so a new assessment method for comprehensive marine accident risk is needed. Examples of comprehensive risk assessments for ship safety management are the selection method for inspection targets by the Port State Control and the Norwegian Maritime Authority. In this study, indicators for the comprehensive risk assessment of ship safety management were developed for and applied to coastal/offshore fishing vessels that occupy a high proportion of the registrations and marine accidents in Korea. As a result, the risk of each ship was confirmed quantitatively, and a ranking of the weakness factors for ship safety management was identified.

A Effective Group Key Management for Ad Hoc Network Nodes (Ad-Hoc 네트워크의 노드 인증을 위한 효과적인 그룹 키 관리기법)

  • Lee Pung-Ho;Han In-Sung;Joo Hyeon-Kyu;Kim Jin-Mook;Ryou Hwang-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1023-1026
    • /
    • 2006
  • 에드 혹 네트워크는 불규칙한 이동성을 지닌 다수의 노드들에 의해 자율적으로 구성되는 네트워크이다. 그러나 에드 혹 네트워크는 저 전력, 낮은 프로세싱 능력, 무선채널이라는 에드 혹 네트워크만의 특징으로 인해 패킷 드롭, 재전송 공격, 서비스 거부 공격, 비잔틴 공격, 신원사칭과 같은 보안상 여러 가지 공격에 취약하다는 문제점을 안고 있다. 때문에 이러한 취약점을 개선하려는 방안으로 노드 간에 인증, 기밀성, 무결성을 비롯한 여러 가지 요소를 충족시키기 위한 보안기법이 연구되어 왔다, 그러나 Ad Hoc 네트워크는 기존의 회선을 사용하는 정적인 형태의 네트워크가 아닌 시간에 동적으로 네트워크 구조가 변화하며, 네트워크에서 불규칙한 이동성을 지닌 노드들은 적은양의 자원을 소유하는 원인으로 인해 기존의 보안기법은 효과적이지 못하다. 본 논문에서는 신뢰성이 확보된 이웃 노드 간에 그룹을 형성하고, 그룹멤버의 안전성을 입증하는 그룹 인증서를 생성하여 그룹에 접근하는 단일노드 혹은 또 다른 그룹간의 인증을 수행하는 기법을 제안한다. 또한 그룹 멤버 간에 그룹 키를 생성하여 데이터 유출에 대한 위험성 문제를 해결하고, 인증과 기밀성 유지로 인한 자원소비를 감소시킬 수 있도록 하였다.

  • PDF

The Effects of Adult Attachment and Covert Narcissism on Smartphone Addiction in College Students (대학생의 성인 애착과 내현적 자기애가 스마트폰 중독에 미치는 영향)

  • Lee, Young-Chang;Kim, Namhee;Kwon, Sung-Jin;Kim, Boseong
    • Science of Emotion and Sensibility
    • /
    • v.23 no.1
    • /
    • pp.103-112
    • /
    • 2020
  • Smartphones, now a necessity for modern people, have become more than just an appliance, but an object of obsession for many. This has resulted in smartphone addiction in many modern people. However, the phenomenon of object addiction can lie beyond the problem of the object itself, varying according to the psychological characteristics of the subjects who use it. For this reason, this study aimed to examine adult attachment and covert narcissism as factors influencing smartphone addiction in college students. In order to do this subjects' level of smartphone addiction, adult attachment and covert narcissism needed to be measured on a scale of smartphone addiction, adult attachment and covert narcissism. Regression analysis was conducted with smartphone addiction set as the dependent variable and adult attachment and covert narcissism as independent variables. As a result, we observed anxiety attachment related to adult attachment and hypersensitivity/weakness of covert narcissism played roles in smartphone addiction. These findings suggest that in order to understand smartphone addiction in college students, it is important to know the psychological characteristics of our subjects.

A Risk Analysis Methodology for Information Systems Security Management (정보시스템 보안관리를 위한 위험분석 방법론)

  • 이문구
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.6
    • /
    • pp.13-22
    • /
    • 2004
  • This study proposes a risk analysis methodology for information system security management in which the complexity on the procedure that the existing risk analysis methodology is reduced to the least. The proposed risk analysis methodology is composed of 3 phases as follows: beforehand processing phase, counter measure setting phase, post processing phase. The basic risk analysis phase is a basic security management phase in which fixed items are checked when the information security system is not yet established or a means for the minimum security control is necessary for a short period of time. In the detailed risk analysis phase, elements of asset a vulnerability, and threat are analysed, and using a risk degree production table produced from these elements, the risk degree is classified into 13 cases. In regard to the risk, the 13 types of risk degree will execute physical, administrative, and technical measures through ways such as accepting, rejecting, reducing, and transferring. Also, an evaluation on a remaining risk of information system is performed through a penetration test, and security policy set up and post management phase is to be carried out.

A Study on Enforcing Principle of Least Privilege on Shared Memory (공유 메모리에의 최소 특권의 원칙 적용 기법에 대한 연구)

  • Jun-Seung You;Bang-In Young;Yun-Heung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.26-28
    • /
    • 2023
  • 현대 시스템의 크기와 복잡도 증가로 인하여 시스템의 여러 구성 요소들이 공유하는 메모리에 대한 최소 특권의 원칙 적용의 필요성이 대두되었다. 제 3 자 라이브러리, 다중 쓰레드 등의 각 구성 요소들이 접근할 수 있는 메모리 권한을 다르게 적용함으로써 구성 요소들 중 하나에서의 취약점이 전체 시스템을 위협하는 것을 방지함과 동시에 각 요소들 간 효율적인 메모리 공유를 가능케 하기 때문이다. 본 논문에서는 공유 메모리에 대한 최소 특권의 원칙 적용 기법들의 분석과 더불어 각 기법들이 가지는 한계점을 제시한다.

A Study on New Secure Routing and Authentication Strategy for 2-tier Ad Hoc Networks (2-Tier Ad Hoc 망에서 신뢰할 수 있는 Routing과 인증 메커니즘 연구)

  • 최문석;이현주;이충세;신병철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.919-921
    • /
    • 2002
  • 본 논문에서는 기존의 Table-driven 방식과 On-demand 라우팅 의 장점을 접목시킨 2-tier 계층구조를 사용한 dynamic한 routing기법을 제안하며 , 구조적으로 취약한 보안 위협 요소들에 대한 안정성을 제공하는 인증 알고리즘을 제안하고 네트워크와 클러스터 헤드의 관리를 위한 신뢰할 수 있는 키 분배 메커니즘을 고찰한다. 또한 기존의 3GPP서비스와의 상호 연동 가능성을 고려하여 클러스터 헤더의 재생성과 강력한 신뢰성을 제공할 수 있는 알고리즘을 제안한다.

  • PDF