• Title/Summary/Keyword: 학과인증

Search Result 417, Processing Time 0.03 seconds

Vulnerability Analysis and Demonstration of WiFi Password Cracking in Drone Environment: Based on Products A and B (드론 환경에서의 WiFi 패스워드 크래킹 취약점 분석 및 실증 : A와 B 드론을 대상으로)

  • Wonbin Jeong;Jinwook Kim;Heewon Song;Sejun Hong;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.113-115
    • /
    • 2024
  • 최근 개발되는 드론은 사용자의 편의를 위하여, 사진이나 동영상과 같은 파일을 휴대 기기로 전송하거나 휴대 기기로 드론을 조종하는 것과 같은 휴대 기기를 통한 다양한 기능들을 제공하며, 이러한 기능들은 와이파이를 기반으로 이루어진다. 그러나, 와이파이는 인증 해제 공격이나 Evil Twin 공격과 같은 취약점이 존재하며, 이러한 취약점으로 인하여 드론에서 제공하는 다양한 기능들과 관련된 보안 위협이 발생할 가능성이 존재한다. 따라서, 본 논문에서는 와이파이를 사용하는 드론에서 발생 가능한 취약점을 미리 분석하고 방어하기 위한 목적으로, 와이파이에서 발생 가능한 취약점 중 하나인 패스워드 크래킹 취약점을 분석하였다. 실험 결과, 드론에서 제공하는 와이파이의 패스워드를 크래킹함으로써 공격자가 드론 네트워크 내부로 진입이 가능한 것을 실증하였다. 향후, 드론 환경에서 패스워드 크래킹 뿐만 아니라, 와이파이에서 발생 가능한 다양한 취약점을 분석하고 실증할 예정이다.

  • PDF

Development of a Basic Contrail Prediction Model for the Contrail Reduction Certification of Commercial Aircraft (민항기 비행운 저감 인증을 위한 비행운 예측 기초 모델 개발)

  • Choi, Jun-Young;Choi, Jae-Won;Kim, Hye-Min
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.11-19
    • /
    • 2021
  • Contrails are line-shaped clouds formed by the condensation of water vapor from the interaction of exhaust gas from aircraft engines and the high-altitude atmosphere. Contrails are known to aggravate global warming by creating a greenhouse effect by absorbing or reflecting radiation emitted from the Earth. In this study, development of a model that can quantitatively predict the contrail occurrence was conducted for the reduction of contrail, which is likely to form an aircraft certification category in the future. Based on prior research results, a model that can predict the occurrence of contrail between Tokyo and Qingdao was developed, in addition to proposing improved flight altitude that can minimize the occurrence of contrail.

Securing communication between EMS and remote devices in a Microgrid (마이크로그리드 환경에서 EMS와 원격 장치간 통신 보안)

  • Kim, Mi-sun;Park, Kyung-Woo;Kim, Jong-Man;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.52-60
    • /
    • 2018
  • Energy Management System(EMS) of Microgrid(MG) collects and analyzes data from devices in the microgrid to provide information to operators, users and other systems. In the middle of the process, it is required to securely provide information through both wired and wireless communication networks. In this paper, we design and implement a module that provides encryption and decryption, key management, key distribution, and message authentication functions, thus enabling the development of a system which is safe from the exposure and modulation of data potentially occurrable during data transmission between RTU(Remote Terminal Unit) and EMS. Our method can increase the efficiency of connection and key management for RTU by connecting a virtual device(VD) to RTU.

Design and Implementation of the Cdma2000 EV-DO security layer supporting Hardware using FPGA (FPGA를 이용한 Cdma2000 EV-DO 시큐리티 지원 하드웨어 설계 및 구현)

  • Kwon, Hwan-Woo;Lee, Ki-Man;Yang, Jong-Won;Seo, Chang-Ho;Ha, Kyung-Ju
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.65-73
    • /
    • 2008
  • Security layer of the Cdma2000 1x EV-DO is currently completing standard (C.S0024-A v2.0). Accordingly, a hardware security devices, that allows to implementation requirement of the security layer described in standard document, is required to apply security function about data transferred between AT and AN of then Cdma2000 1x EV-DO environment. This paper represents design of hardware device providing EV-DO security with simulation of the security layer protocol via the FPGA platform. The SHA-1 hash algorithm for certification and service of packet data, and the AES, SEED, ARIA algorithms for data encryption are equip in this device. And paper represents implementation of hardware that applies optionally certification and encryption function after executing key-switch using key-switching algorithm.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

A Study on Authentication Model using Blockchain (블록체인 기술을 활용한 진본인증 모형 연구)

  • Lee, Kyung-nam
    • The Korean Journal of Archival Studies
    • /
    • no.59
    • /
    • pp.47-78
    • /
    • 2019
  • With the rapid changes in the digital technology, it is necessary to shift to a new paradigm corresponding to the changing environment was recognized. This study actively explores the possibility of applying new technologies for recordkeeping. This study aimed to investigate the applicability of blockchain to recordkeeping and to develop a new model for recordkeeping based on it. Through a conceptual analysis of blockchain and consideration of the recordkeeping process, a blockchain model that is suitable for the authentication of records was proposed. For this the network structure, the structure of blockchain blocks, a consensus algorithm, and recordkeeping blockchain model were designed. It also predicted potential changes in digital records management when applying blockchain. It predicted change in governance aspects to implement a horizontal cooperation system among the archives.

A Study on Security Enhancement for the Use and Improvement of Blockchain Technology (보안성 강화를 위한 블록체인기술의 활용과 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • In this study, in relation to blockchain protocol and network security, we study the configuration of blockchain and encryption key management methods on smart contracts so that we can have a strong level of response to MITM attacks and DoS/DDoS attacks. It is expected that the use of blockchain technology with enhanced security can be activated through respond to data security threats such as MITM through encryption communication protocols and enhanced authentication, node load balancing and distributed DDoS attack response, secure coding and vulnerability scanning, strengthen smart contract security with secure consensus algorithms, access control and authentication through enhanced user authentication and authorization, strengthen the security of cores and nodes, and monitoring system to update other blockchain protocols and enhance security.

수요지향적 경영정보 교과과정;C대학 사례

  • Kim, Tae-Seong;Gwon, Sun-Dong;Gyeong, Won-Hyeon
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.991-993
    • /
    • 2007
  • 충북지역의 C대학은 국립대 최초로 경영정보학과를 개설하여 20년 동안 관련 분야의 인재를 양성해 왔다. 하지만, 최근 학부제로 통합되어 운영되고, 기술기피 현상에 따른 전공 지원인력이 감소하고, 정보기술의 보편화로 경영정보의 정체성이 모호해지며, 국내외 경영교육 인증 실시로 인해 교과과정 재검토의 필요성이 제기되고, 지역 관련 업체에 진출하는 졸업생 수가 감소하게 되어 중장기적인 관점에서 학부과정 교과과정의 재검토를 실시하게 되었다. 관련 분야 실무종사자들을 대상으로 경영정보 분야의 지식수요를 파악하고, 재학생/졸업생 대상으로 교육서비스의 만족도를 분석하고, 국내외 전문가를 대상으로 자문을 받고, 경영교육 인증 관련 규정을 검토하는 등의 업무를 수행하여 교과과정 개편 기본방향을 설정하고, 교과과정과 교과운영방향을 제작하는 것을 목표로 작업을 수행하고 있다.

  • PDF

A Study on the Reading Education Method of University Student (대학생의 독서교육 방안에 관한 연구 - D대학교 신입생 독서실태를 중심으로 -)

  • 이만수
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.1
    • /
    • pp.155-185
    • /
    • 2004
  • The purpose of this study is to grope for reading education methods and searchable reading of new student of D University. This study bring forth variety event of central library, adoption of reading education subject, induction of reading certification, draw up of must book catalogue, accrediting system of reading cultural studies, reading education via media, adoption of a required subject of reading, and so on for reading education methods.

  • PDF

Design of U-Health Service Authentication System Based-on NFC (NFC 기반 U-Health 서비스 인증시스템 설계)

  • Yun, Ji-Sang;Park, Seok-Cheon;Park, Jun-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.920-922
    • /
    • 2012
  • 현재 많은 사람들이 스마트폰을 이용하고 있으며 스마트폰을 활용한 IT 기술들이 나날이 발전하고 있다. 또한 스마트폰을 이용 하여 사람들이 생활하는데 있어서 더욱 더 편리한 생활을 할 수 있도록 서비스 환경을 제공해준다. 그 중 대표적인 기술이 U-Health(Ubiquitous-Health) 기술 이며 U-Health 기술은 건강증진과 고령화 사회를 대비하기 위한 효과적인 문제해결 방안으로 주목받고 있다. U-Health 서비스는 스마트폰의 각종 센서를 활용하여 환자의 건강 상태를 체크하고 실시간으로 업데이트 하여 환자의 상태를 더욱 효율적으로 관리할 수 있다. 그러나 환자와 병원 서버 간에 데이터 단일화, 통신문제 등으로 인해서 아직까지는 많이 활용되고 있지 않는 현실이다. 또한 스마트폰으로 인한 환자의 개인신상 정보가 쉽게 노출될 수 있다는 단점이 있다. 따라서 본 논문에서는 NFC(Near Field Communication) 기반에서 환자와 병원간에 신뢰성 있는 데이터 전송을 위한 인증 시스템을 설계 하였다.