• Title/Summary/Keyword: 호네트

Search Result 852, Processing Time 0.024 seconds

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

A Study on the Preventive Measures of Criminal Behaviors and Criminal Damages of North Korean Defectors (북한이탈주민의 범죄행위 및 범죄피해에 대한 효과적인 예방대책)

  • Lim, Chang-Ho
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.217-246
    • /
    • 2016
  • Most of the North Korean defectors are the socially disadvantaged, and formed the lowest class in South Korean society. Their main objectives are to achieve economic wealth. In this process, North Korean defectors have often committed the crime or have been criminal victims. The purpose of this study was to propose the effective preventive measures after analyzing the actual situation of North Korean defectors in criminal behaviors and criminal damages. This research has studied of the literature on the criminal behavior and the criminal damage by North Korean defectors, utilized the relevant statistical data, cited the news for the relevant cases, and proposed the effective preventive measures of criminal behaviors and criminal damages of North Korean defectors by doing in-depth interviews with personal protection officer First, in order to prevent criminal activity by North Korean defectors, we should uplift the identity as the members of Korean society, systemize the initial adapt education, enlarge the employment protection and the resettlement helper system, manage North Korean defectors according to adaptive type, develop the network, establish the management department for the defectors, strengthen the training of prison inmates, and strengthen the management of unprotected people. Next, in order to prevent the criminal damages of North Korean refugees, we should manage vulnerable North Korean defectors effectively, maintain the liaison between the personal protection officer and North Korean defector, arrange the personal safety measures in advance when traveling abroad, enhance the legal education for usual living in Korean society, and perform the re-education for the female socialization.

  • PDF

Connection between Fourier of Signal Processing and Shannon of 5G SmartPhone (5G 스마트폰의 샤논과 신호처리의 푸리에의 표본화에서 만남)

  • Kim, Jeong-Su;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.69-78
    • /
    • 2017
  • Shannon of the 5G smartphone and Fourier of the signal processing meet in the sampling theorem (2 times the highest frequency 1). In this paper, the initial Shannon Theorem finds the Shannon capacity at the point-to-point, but the 5G shows on the Relay channel that the technology has evolved into Multi Point MIMO. Fourier transforms are signal processing with fixed parameters. We analyzed the performance by proposing a 2N-1 multivariate Fourier-Jacket transform in the multimedia age. In this study, the authors tackle this signal processing complexity issue by proposing a Jacket-based fast method for reducing the precoding/decoding complexity in terms of time computation. Jacket transforms have shown to find applications in signal processing and coding theory. Jacket transforms are defined to be $n{\times}n$ matrices $A=(a_{jk})$ over a field F with the property $AA^{\dot{+}}=nl_n$, where $A^{\dot{+}}$ is the transpose matrix of the element-wise inverse of A, that is, $A^{\dot{+}}=(a^{-1}_{kj})$, which generalise Hadamard transforms and centre weighted Hadamard transforms. In particular, exploiting the Jacket transform properties, the authors propose a new eigenvalue decomposition (EVD) method with application in precoding and decoding of distributive multi-input multi-output channels in relay-based DF cooperative wireless networks in which the transmission is based on using single-symbol decodable space-time block codes. The authors show that the proposed Jacket-based method of EVD has significant reduction in its computational time as compared to the conventional-based EVD method. Performance in terms of computational time reduction is evaluated quantitatively through mathematical analysis and numerical results.

A Study on the Modeling Mechanism for Security Risk Analysis in Information Systems (정보시스템에 대한 보안위험분석을 위한 모델링 기법 연구)

  • Kim Injung;Lee Younggyo;Chung Yoonjung;Won Dongho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.989-998
    • /
    • 2005
  • Information systems are today becoming larger and mostly broadband-networked. This exposes them at a higher risk of intrusions and hacking than ever before. Of the technologies developed to meet information system security needs, risk analysis is currently one of the most actively researched areas. Meanwhile, due to the extreme diversity of assets and complexity of network structure, there is a limit to the level of accuracy which can be achieved by an analysis tool in the assessment of risk run by an information system. Also, the results of a risk assessment are most oftennot up-to-date due to the changing nature of security threats. By the time an evaluation and associated set of solutions are ready, the nature and level of vulnerabilities and threats have evolved and increased, making them obsolete. Accordingly, what is needed is a risk analysis tool capable of assessing threats and propagation of damage, at the same time as security solutions are being identified. To do that, the information system must be simplified, and intrusion data must be diagrammed using a modeling technique this paper, we propose a modeling technique information systems to enable security risk analysis, using SPICE and Petri-net, and conduct simulations of risk analysis on a number of case studies.

An Inquiry into the Triple Helix as a New Regional Innovation Model (새로운 지역혁신 모형으로서 트리플 힐릭스에 대한 이론적 고찰)

  • Lee, Chul-Woo;Lee, Jong-Ho;Park, Kyung-Sook
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.335-353
    • /
    • 2010
  • Following the emergence of a knowledge-based economy, the triple helix model has been recognized as a new - regional and national - innovation model. This model seeks to understand the innovation process that is centered upon the university-industry-government interactions. The governance of the triple helix innovation system can be divided into three models according to the structure and depth of university-industry-government interactions. In the context of evolution, the triple helix can be established through the following three processes of development; i) internal transformation of each helix, ii) impacts of one helix on another helix, and iii) horizontal interactions among three helices. In theory, the triple helix model can be covered as part of the innovation system perspective. Compared to the innovation system perspective, the triple helix model tends to pay, however, more attention to the incompleteness of innovation system and the role of university in the process of knowledge creation. In view of regional innovation, the triple helix can be sustained when the triple helix spaces, including knowledge space, consensus space and innovation space, are created and the three triple helix spaces interact with one another. The existing literature on the triple helix model tends to make selectively use of only a single method between the qualitative method and the quantitative method, although both have shortcomings to reveal the dynamic characteristics of university-industry-government relations. Therefore, research on the triple helix is required to reconcile with two research methods, which are distinct but complementary in nature.

  • PDF

A Component-Based Framework for Structural Embedding of Mobile Agent System (모바일 에이전트 시스템의 구성적 임베딩을 위한 컴포넌트 기반의 프레임워크)

  • Chung, Wonho;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.33-42
    • /
    • 2012
  • Rapid evolution of wired and wireless technologies results in various types of embedded systems, and the software to be embedded into those devices now needs the flexibility rather than the fixedness which was well-known property for the embedded software in the past. Mobile agent is one of the useful distributed technologies of reducing network load and latency because of its disconnected operations and high asynchrony. In this paper, a component-based mobile agent framework, called EmHUMAN, is designed and implemented for structural embedding into the devices showing different functions and resource constraints. It consists of 3 layers of components. Based on those components, a structural embedding, considering resource constraints of required functions, amount of storage space, computing power, network bandwidth, ${\ldots} $ etc can be performed. The components in each layer can be extended with addition of new components, removing some components and modifying components. EmHUMAN plays the role of a framework for developing mobile agent based distributed systems. It is also a mobile agent system by itself. EmHUMAN provides several utilities as built-in API's, and thus high effectiveness in programming mobile agents can be achieved.

The Proposal and Implementation of Wireless Smart Sensor Node and NCAP System based on the IEEE 1451 (IEEE 1451 기반의 Wireless Smart Sensor Node와 NCAP 시스템의 제안과 구현)

  • Heo, Jung-Il;Lim, Su-Young;Seo, Jung-Ho;Kim, Woo-Shik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.5
    • /
    • pp.28-37
    • /
    • 2007
  • IEEE 1451 standard defines an interface for network and transducer. In this paper, We propose an architectural model to configure data acquisition system and wireless smart sensor node based on IEEE 1451 standard. Proposed Network Capable Application Processor(NCAP) supports the task of data acquisition and communication for smart sensor node and network. The NCAP is able to reconfigure without interrupting the functionality of the wireless sensor node and receives the critical information of transducer using the DB. Smart sensor node is able to provide the basic information of sensor in digital format. This digital format is called Transducer Electronic Data Sheet(TEDS), is capable of plug-and-play capability of wireless sensor node and the NCAP. We simplify the format of TEDS and template to apply to wireless network environment. information of TEDS and template is transmitted using ad-hoc routing. This study system uses body temperature sensor and ECG(Electrocardiogram) sensor to provide the medical information service. The format of template is selected by data sheet of the sensor and reconfigured to accurately describe the property of the sensor. DB of NCAP is possible to register new template and information of the property as developing new sensor.

Impact of Macroeconomic Factors on Terminal Operators' Profit: Focusing on Global Terminal Operators (거시경제지표가 터미널운영사 재무성과에 미치는 영향 분석: 글로벌터미널운영사 중심으로)

  • Lee, Joo-Ho;Yun, Won Young;Park, Ju Dong
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.1
    • /
    • pp.129-140
    • /
    • 2020
  • In the future, the global container handling market will be reorganized into larger ships and shipping alliances, and the bargaining power of shipping companies will be further strengthened. Therefore, the global terminal operator (GTO), which has a global network, vast experience, and operational know-how, is expected to strengthen its competitiveness. In Korea, the central government promoted the development of GTOs in the mid-2000s, but it failed, mainly due to disagreements between port stakeholders. In this study, the macroeconomic indicators that have the same effect in all regions were used to analyze GTO management performance. In the short term, it could be used to establish the business strategy of domestic terminal operators based on changes in macroeconomic indicators. In the long term, it would be used to establish a promotion strategy for GTOs in Korea. The results of analyzing the impact of macroeconomic indicators on the GTO's profit show that the GTO's profit is significantly affected by cargo handling capacity, the consumer price index of the United States, the Shanghai Composite Index, the Crude Oil Price, and the London Inter-bank Offered Rate (LIBOR). However, the scale of impact was not significantly different between public and private GTOs.

A Study on Pedestrian Accessibility Considering Social Path (Social path를 반영한 보행 접근성 평가에 관한 연구)

  • Choi, Sung Taek;Lee, Hyang Sook;Choo, Sang Ho;Kim, Su Jae
    • Journal of Korean Society of Transportation
    • /
    • v.33 no.1
    • /
    • pp.50-60
    • /
    • 2015
  • Pedestrians not only walk along roads, but also pass through buildings or across open spaces. This study defines these unusual walk routes as social path. Social path is an informal pedestrian route that is not considered in a pedestrian network, even though it should be regarded as pedestrian route considering the fact that many people actually use this path. In response, current study related to travel behavior cannot evaluate properly due to lack of consideration for realistic travel behavior such as social path. In order to deal with this situation, this study analyzes the effect of social path at two complex centers in Seoul. Evaluation indices are service area analysis and urban network analysis which is one of the spatial network analysis. In particular, we subdivide the network into three steps by the level of network building and analyze each step. As a result, it is revealed that step three which includes social path shows the greatest improvement in pedestrian accessibility. In this regard, we confirm that social path should be considered when evaluating pedestrian accessibility in further studies. Furthermore, a lot of undervalued facilities will be re-appraised in the field of travel behavior.

Data Statical Analysis based Data Filtering Scheme for Monitoring System on Wireless Sensor Network (무선 센서 네트워크 모니터링 시스템을 위한 데이터 통계 분석 기반 데이터 필터링 기법)

  • Lee, Hyun-Jo;Choi, Young-Ho;Chang, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.53-63
    • /
    • 2010
  • Recently, various monitoring systems are implemented actively by using wireless sensor networks(WSN). When implementing WSN-based monitoring system, there are three important issues to consider. At First, we need to consider a sensor node failure detection method to support the ongoing monitoring. Secondly, because sensor nodes use limited battery power, we need an efficient data filtering method to reduce energy consumption. At Last, a reducing processing overhead method is necessary. The existing Kalman filtering scheme has good performance on data filtering, but it causes too much processing overhead to estimate sensed data. To solve these problems, we, in this paper, propose a new data filtering scheme based on data statical analysis. First, the proposed scheme periodically aggregates node survival massages to support a node failure detection. Secondly, to reduce energy consumption, it sends the sample data with a node survival massage and do data filtering based on those messages. Finally, it analyzes the sample data to estimate filtering range in a server. As a result, each sensor node can use only simple compare operation for filtering data. In addition, we show from our performance analysis that the proposed scheme outperforms the Kalman filtering scheme in terms of the number of sending messages.