• Title/Summary/Keyword: Access Security System

Search Result 1,037, Processing Time 0.025 seconds

Digital Divide in Riyadh Neighborhoods: A Spatial Analysis

  • Rawan, Almutlaq;Shuruq, Alshamrani;Ohoud, Alhaqbani;Fatimah, Altamimi;Ghadah, Alammaj;Omer, Alrwais
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • The objective of this paper is to use Geographical Information Systems for identifying Digital Divide in Riyadh Neighborhoods, Saudi Arabia. Geo-database was created that includes Streets, Neighborhoods, ICT Access Data and Coverage Map for Riyadh. We used QGIS and overlay for analysis, intersection selected as tool for this paper. The results indicate that after analyzing the use of information communication technology in all regions of the Kingdom it turns that Riyadh, Ash Sharqiyyah and Makkah in average with percentage 50%, While Al Jawf, Al Madinah, and Najran are the least with percentage 42%. Then we focused on Riyadh to analyze the digital divide because it is the capital of Saudi Arabia and occupations the highest percent of communications towers in the KSA due to population density. Regarding coverage of the 4G, the neighborhoods at the center have recorded very high coverage score. While neighborhoods at the edges of the city have low values of coverage score. Same for 3G, it is more intense in the center and the coverage percentage is higher than 4G. For 2G we found it had the highest coverage compared to 3G or 4G

Block-chain based Secure Data Access over Internet of Health Application Things (IHoT)

  • A. Ezil Sam, Leni;R. Shankar;R. Thiagarajan;Vishal Ratansing Patil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1484-1502
    • /
    • 2023
  • The medical sector actively changes and implements innovative features in response to technical development and revolutions. Many of the most crucial elements in IoT-connected health services are safeguarding critical patient records from prospective attackers. As a result, BlockChain (BC) is gaining traction in the business sector owing to its large implementations. As a result, BC can efficiently handle everyday life activities as a distributed and decentralized technology. Compared to other industries, the medical sector is one of the most prominent areas where the BC network might be valuable. It generates a wide range of possibilities and probabilities in existing medical institutions. So, throughout this study, we address BC technology's widespread application and influence in modern medical systems, focusing on the critical requirements for such systems, such as trustworthiness, security, and safety. Furthermore, we built the shared ledger for blockchain-based healthcare providers for patient information, contractual between several other parties. The study's findings demonstrate the usefulness of BC technology in IoHT for keeping patient health data. The BDSA-IoHT eliminates 2.01 seconds of service delay and 1.9 seconds of processing time, enhancing efficiency by nearly 30%.

Development of 1Gbps SNMP Optical Transmitter/Receiver System based on 1 Core Ring-type WDM PON (1 core 링형 WDM PON 기반 1Gbps SNMP 지원 광송수신 장치 개발)

  • Park Young-Ho;Lee So-Young
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.3
    • /
    • pp.82-89
    • /
    • 2006
  • Optical transmission system related to network infra of ubiquitous is a essential bridge technique between metro network and access point. So, it is need to develop this technique. In this paper, we develop 1Gbps SNMP optical transmitter/receiver system based on 1 core ring-type WDM PON. The developed system can reduce number of optic fiber and doesn't need extra transmitter/receiver. Also, this system can extend nodes owing to many node per wavelength, acts rapidly against security cutting, and acts independent of protocols.

  • PDF

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI

  • XU, Yunjia;HUANG, Kaizhi;HU, Xin;ZOU, Yi;CHEN, Yajun;JIANG, Wenyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.110-132
    • /
    • 2019
  • To ensure reliable and secure communication in heterogeneous cellular network (HCN) with imperfect channel state information (CSI), we proposed a coordinated multipoint (CoMP) transmission scheme based on dual-threshold optimization, in which only base stations (BSs) with good channel conditions are selected for transmission. First, we present a candidate BSs formation policy to increase access efficiency, which provides a candidate region of serving BSs. Then, we design a CoMP networking strategy to select serving BSs from the set of candidate BSs, which degrades the influence of channel estimation errors and guarantees qualities of communication links. Finally, we analyze the performance of the proposed scheme, and present a dual-threshold optimization model to further support the performance. Numerical results are presented to verify our theoretical analysis, which draw a conclusion that the CoMP transmission scheme can ensure reliable and secure communication in dense HCNs with imperfect CSI.

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

A Study on the Improvement of Public Cloud Technology and Policy (공공 클라우드 기술과 정책의 개선방안에 대한 연구)

  • Kim, So Hui;Lee, Yu Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.11-20
    • /
    • 2021
  • Due to the Covid-19 Pandemic, the world is facing the most serious crisis since the Great Depression, and is facing a new paradigm of the Untact era. Korea has also announced various policies and legal systems, including the 'Korean version of the New Deal', but it is conflicting between the use of information and the protection of information. In this paper, we derive thresholds by analyzing policies, statutes and technologies in the public cloud. Based on this, we propose to introduce the "Building a Nationwide Public Virtual Machine" as a key task to secure the next-generation national growth engine so that all citizens can use digital services in a secure and reliable environment with equal access to information. Through this, all citizens can use various digital new technology services only with low-priced and low-specification terminals, and by establishing a dedicated center for information protection, we want to respond to rapidly increasing security threats. It also points out that the domestic cloud-related legal system only emphasizes the use of information while overlooking the importance of security, and suggests the right direction for the legal system to move forward.

Distribution Business Model and Protecting Management System of Contents for IPTV (IPTV를 위한 콘텐츠의 유통 비즈니스 모델 및 보호관리)

  • Ryu, Jee-Woong;Bang, Jin-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.845-850
    • /
    • 2011
  • In this paper, we proposed the digital contents distribution business model for the operation of integration between heterogeneous systems in order to use IPTV. Also, we designed and implemented the protection management system through this distribution business model. This proposed model maintains interoperability between the heterogeneous systems, creates rights protection document based on REL, and provides the new version of packaged digital contents to itself by packaging the digital contents. Overall, it ultimately offers an interoperable environment. Moreover, since we pre-defines the relations among REL data based on MPEG-21 standard, which creates the newly packaged digital contents, it is easy to edit data. We can expect to save expenses of digital contents distribution and rights protection technology. Additionally, we can further improve security by encapsulating the security technology of CAS and DRM system.

Efficient Techniques to Secure User Data in the Secure OS for a Multi-user Environment (다중 사용자 환경을 위한 보안운영체제의 효율적인 사용자 자원 보호 방법)

  • Ahn, Sun-Il;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.999-1006
    • /
    • 2005
  • The Secure OS is an operating system which adds security functions to the existing operating system, in order to secure a system from sorority problems originated from inherent frailty of applications or operating systems. With the existing Secure Oses for it is difficult to set an effective security policy securing personal resources in a multi-user environment system. To solve this problem in this paper we present two Techniques to secure user data efficiently in the RBAC-based Secure OS for a multi-user environment. Firstly we utilizes object's owner information in addition to object's filename. Secondly we make use of meta symbol('$\ast$'), which is able to describe multiple access targets. In addition this paper gives some examples to show advantages from these techniques. And these features are implemented in an solaris-based Secure OS called Secusys.

Door-Lock System to Detect and Transmit in Real Time according to External Shock Sensitivity (외부 충격 감도에 따른 실시간으로 탐지하고 전송하는 Door-Lock 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.9-16
    • /
    • 2018
  • The purpose of this study is to prevent the malicious user from breaking the door-lock due to physical impact. If it matches the analog displacement value set in the door-lock system, it protects the body and property by transmitting damage information in real time to the manager smart phone. The research suggests a system that transmits damage information in real time to registered users when door-lock is damaged by physical impact. Then compare the impact information sensed by the door lock with the data of the sensitivity control unit. In the web server of the proposed system, after impact information transmitted from Door-Lock is stored in the DB, if the impact information is larger than the shock detection transmission reference value stored in the DB, it is transmitted to the administrator in real time by SMS module so that illegal access information.