• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.025초

Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures

  • Jo, Jeong Hoon;Sharma, Pradip Kumar;Sicato, Jose Costa Sapalo;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.765-784
    • /
    • 2019
  • The smart city is one of the most promising, prominent, and challenging applications of the Internet of Things (IoT). Smart cities rely on everything connected to each other. This in turn depends heavily on technology. Technology literacy is essential to transform a city into a smart, connected, sustainable, and resilient city where information is not only available but can also be found. The smart city vision combines emerging technologies such as edge computing, blockchain, artificial intelligence, etc. to create a sustainable ecosystem by dramatically reducing latency, bandwidth usage, and power consumption of smart devices running various applications. In this research, we present a comprehensive survey of emerging technologies for a sustainable smart city network. We discuss the requirements and challenges for a sustainable network and the role of heterogeneous integrated technologies in providing smart city solutions. We also discuss different network architectures from a security perspective to create an ecosystem. Finally, we discuss the open issues and challenges of the smart city network and provide suitable recommendations to resolve them.

Research on the construction concept and general framework of Smart Water Resource

  • Tian, Yu;Li, JianGuo;Jiang, Yun-zhong
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2015년도 학술발표회
    • /
    • pp.216-216
    • /
    • 2015
  • Frequent hydro-meteorological events caused by global climate change and human exacerbate activities, make the water resource problem more complicated. The increasing speed urbanization brings a significant impact on the city flood control and security, water supply safety, water ecological security, water environment safety and the water engineering security in China, and puts forward higher requirements to urban water integrated management, undoubtedly which become the biggest obstacle for water ecological civilization construction, thus urgent requiring an advanced methods to enhance the effectiveness of the water integrated management. The other fields of smart ideas point out a development path for water resource development. The construction demand of smart water resource is expounded in the paper, combining the philosophy of modern Internet of things with the application of cloud computing technology. The concept of smart water resource is analyzed, the connotation characteristics of smart water resource is extracted, and the general model of smart water resource is refined. Then, the frame structure of smart water resource is put forward. The connotation and the overall framework of the smart water resource represent a higher level of water resource informationization development and provide a comprehensive scientific and technological support to transform water resource management from an extensive, passive, static, branch and traditional management to a fine, active, dynamic, collaborative and modern management.

  • PDF

Legal Regulation Of Digital Rights In Ukraine

  • Bilenko, Marianna;Ilchenko, Hanna;Herych, Anatolii;Solodka, Olena;Podolyak, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.59-62
    • /
    • 2022
  • In the scientific research, the object of research is a complex of legal relations, which are formed by the use of modern digital technologies. The subject of this work is the novelties of Ukrainian and foreign legislation, norms of international law aimed at regulating social relations in the field of digital rights, as well as doctrinal provisions and materials of law enforcement practice. Within the framework of this work, two types of digital rights are distinguished, those that exist in the law of Ukraine, and the issues of law that apply to legal relations, regarding the turnover of each of them, are considered. Examples of law applied in foreign countries are given for comparison. On the basis of a comprehensive study of the legal framework and positions of scientists, the prospects for the development of legal regulation of digital rights were noted.

Adversarial Machine Learning: A Survey on the Influence Axis

  • Alzahrani, Shahad;Almalki, Taghreed;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.193-203
    • /
    • 2022
  • After the everyday use of systems and applications of artificial intelligence in our world. Consequently, machine learning technologies have become characterized by exceptional capabilities and unique and distinguished performance in many areas. However, these applications and systems are vulnerable to adversaries who can be a reason to confer the wrong classification by introducing distorted samples. Precisely, it has been perceived that adversarial examples designed throughout the training and test phases can include industrious Ruin the performance of the machine learning. This paper provides a comprehensive review of the recent research on adversarial machine learning. It's also worth noting that the paper only examines recent techniques that were released between 2018 and 2021. The diverse systems models have been investigated and discussed regarding the type of attacks, and some possible security suggestions for these attacks to highlight the risks of adversarial machine learning.

A Survey on UAV Network for Secure Communication and Attack Detection: A focus on Q-learning, Blockchain, IRS and mmWave Technologies

  • Madhuvanthi T;Revathi A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.779-800
    • /
    • 2024
  • Unmanned Aerial Vehicle (UAV) networks, also known as drone networks, have gained significant attention for their potential in various applications, including communication. UAV networks for communication involve using a fleet of drones to establish wireless connectivity and provide communication services in areas where traditional infrastructure is lacking or disrupted. UAV communication networks need to be highly secured to ensure the technology's security and the users' safety. The proposed survey provides a comprehensive overview of the current state-of-the-art UAV network security solutions. In this paper, we analyze the existing literature on UAV security and identify the various types of attacks and the underlying vulnerabilities they exploit. Detailed mitigation techniques and countermeasures for the protection of UAVs are described in this paper. The survey focuses on the implementation of novel technologies like Q-learning, blockchain, IRS, and mmWave. This paper discusses network simulation tools that range in complexity, features, and programming capabilities. Finally, future research directions and challenges are highlighted.

Adversarial Attacks and Defense Strategy in Deep Learning

  • Sarala D.V;Thippeswamy Gangappa
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.127-132
    • /
    • 2024
  • With the rapid evolution of the Internet, the application of artificial intelligence fields is more and more extensive, and the era of AI has come. At the same time, adversarial attacks in the AI field are also frequent. Therefore, the research into adversarial attack security is extremely urgent. An increasing number of researchers are working in this field. We provide a comprehensive review of the theories and methods that enable researchers to enter the field of adversarial attack. This article is according to the "Why? → What? → How?" research line for elaboration. Firstly, we explain the significance of adversarial attack. Then, we introduce the concepts, types, and hazards of adversarial attack. Finally, we review the typical attack algorithms and defense techniques in each application area. Facing the increasingly complex neural network model, this paper focuses on the fields of image, text, and malicious code and focuses on the adversarial attack classifications and methods of these three data types, so that researchers can quickly find their own type of study. At the end of this review, we also raised some discussions and open issues and compared them with other similar reviews.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

MOS(Mean Opinion Score)를 이용한 네트워크 보안 QoS(Quality of Service) 평가체계 (A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency)

  • 김점구;노시춘
    • 융합보안논문지
    • /
    • 제12권6호
    • /
    • pp.11-17
    • /
    • 2012
  • 네트워크보안 성능평가는 복잡하고 다양한 시스템 환경에서 특정한 단일성능 측정 만으로는 성능평가 측정자체의 의미와 평가결과의 신뢰성이 한계일 수 밖에 없다. 본 논문에서는 보안 QoS의 MOS 측정기법을 사용한 보안기능 만족도 측정방법을 제시한다. 그 내용은 네트워크보안 QoS 만족도에 대한 MOS(Mean Opinion Score) 평가사양 및 운용방법을 개발하여 향후 정보시스템에 대한 고객의 만족도 평가에 활용될 수 있는 QoS 측정/분석 모델을 운용현장에서 활용토록한다. 시스템공급자(개발업체)와 시스템소비자(사용자) 모두가 성능측정 결과를 이용할 수 있도록 가능한 수준의 객관화된 형태의 기준과 방법체계를 개발한다. 개발내용은 보안기능, 네트워킹 기능과 이 두 기능을 종합적으로 평가하는 3개영역의 성능이 상호 연계되는 성능측정 방법론이다. 본연구의 제안 방법론을 사용하여 체계적인 측정환경을 설계 할 경우 운용시스템상에서 보안 QoS의 만족도 산출이 가능하다. 앞으로 다양한 성능측정 기준과 성능측정 방법을 추가적으로 확장하여 네트워크 보안시스템 만족도 평가방법을 업그레이드 시켜나가야 할 것 이다.

CBRNE 상황 대처를 위한 한국군 CM 조직 발전방안 제시 (Proposed Plan for the Development of Consequence Management within the ROK Armed Forces in Response to CBRNE Situations)

  • 김지인;김성일;김세협;김영호
    • 대한토목학회논문집
    • /
    • 제40권3호
    • /
    • pp.331-336
    • /
    • 2020
  • 국내에서는 아직 생소한 CM (Consequence Management; 사후대응관리)에 대한 개념이 현대의 재난 발생 유형과 포괄적 안보 개념 하에서 볼 때, 중요한 것임을 인지하고, 문헌연구를 진행하였다. 재난관리 선진국에서 활용하고 있는 CM 개념을 통합재난관리 측면과 포괄적 안보 개념 측면에서 한국에도 도입할 필요가 있으며, 특히 CBRNE (Chemical, Biological, Radiation, Nuclear and high yield Explosives) 상황 발생 시군이 주도적으로 대응해야 할 필요성을 확인하고, 미군의 CBRNE-CM 대응기관을 모델로 하여 한국군 CM 조직 발전방안을 제시하였다.

사회적 재난에 투입된 군 병력들의 고충 개선방안에 관한 연구 -철도파견 사례를 중심으로 - (A Study on the measures to improve the difficulties of military personnel in social disasters - Focusing on the case of a railway dispatch -)

  • 윤보연;남궁승필;박상혁
    • 문화기술의 융합
    • /
    • 제5권4호
    • /
    • pp.37-41
    • /
    • 2019
  • 본 연구는 국가재난 사태에서의 군의 역할이 포괄적 안보의 일환으로 그 중요성이 새삼 떠오르고 있고, 특히 포괄적 안보 측면에서 군의 역할 증대 방안으로 국가재난 유형별 지원 중 사회적 재난에 따른 여러 지원 요소가 있었으나, 이에 대한 본격적인 연구가 미흡한 부분이 사실이다. 또한, 국가재난 사태 관련 군 지원 사례 중 가장 오랜기간 임무 수행 했던 2016년 한국철도공사 철도노조 파업 기간(72일)을 사례로 수도권 전동철(1 3 4호선) 대체기관사로 투입되었던 군 병력(상 원사급 부사관)에 대한 관찰과 면담 등을 통하여 임무 수행 간 애로사항 등 여러 제반 사항을 분석하고 문제점을 도출하여 차후 지원 임무 시 효과적인 임무 수행을 통한 국가위기 해소 및 대군 신뢰도 향상에 대한 기대가 그 목적이다.