• Title/Summary/Keyword: Data flooding

Search Result 476, Processing Time 0.024 seconds

A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment (인프라 클라우딩(Infra Clouding) 환경에서 자가조직 저장매체의 보안을 위한 3자간 협상 프로토콜 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1303-1310
    • /
    • 2011
  • This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner's data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.

Ensuring the Evacuation Path Based on Inundation & Refuge Approach Vulnerability Analysis in Residential Buildings - Focused on Daegu Bukgu Inundation Case District - (침수 시 주거용 건축물에서 대피시설로의 접근 취약성 분석을 통한 피난경로 확보방안 - 대구시 북구 침수 사례지를 중심으로 -)

  • Lee, Ji-Soo;Hong, Won-Hwa;Kim, Gwang-Seob
    • Journal of the Korean housing association
    • /
    • v.23 no.5
    • /
    • pp.1-8
    • /
    • 2012
  • Recently, there have been frequent occurrence of the damage to lives and properties due to the torrential rain caused by climate change. In consideration of the current situations in which the underlying data related to flooding are lacking, this study conducted to build up the basic data on the flooded areas and suggested methods to secure the evacuation routes that can be accessible to evacuation facilities in the residential buildings. Methods of the study are as follows. First, We calculated the flood risk grades of residential buildings based on elevations, considering the flooding characteristics of the flooded areas in Buk-gu, Daegu. Second, We constructed baseline data on the evacuation routes through site investigation and reviewed of drawing using Arc GIS to identify vulnerability to access to the evacuation facilities, targeting the residential buildings. Third, We carried out the proximity analysis through a near analysis of analysis functions in ARC GIS. Forth, We deduced 115 residential buildings in which access to evacuation facilities is considered to be difficult based on the analysis results. Finally, We proposed extension of a blind alley as a means for achieving connectivity to evacuation facilities. And to evaluate the alternatives presented, we reconstructed route data. As a result, about 53% improvement was identified through the proximity analysis.

Flood Damage Assessment According to the Scenarios Coupled with GIS Data (GIS 자료와 연계한 시나리오별 홍수피해액 분석)

  • Lee, Geun-Sang;Park, Jin-Hyeg
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.4
    • /
    • pp.71-80
    • /
    • 2011
  • A simple and an improved methods for the assessment of flood damage were used in previous studies, and the Multi-Dimensional Flood Damage Assessment (MD-FDA) has been applied since 2004 in Korea. This study evaluated flood damage of dam downstream using considering MD-FDA method based on GIS data. Firstly, flood water level with FLDWAV (Flood Wave routing) model was input into cross section layer based on enforcement drainage algorithm, water depth grid data were created through spatial calculation with DEM data. The value of asset of building and agricultural land according to local government was evaluated using building layer from digital map and agricultural land map from landcover map. Also, itemized flood damage was calculated by unit price to building shape, evaluated value of housewares to urban type, unit cost to crop, tangible and inventory asset of company connected with building, agricultural land, flooding depth layer. Flood damage in rainfall frequency of 200 year showed 1.19, 1.30 and 1.96 times to flood damage in rainfall frequency of 100 year, 50 year and 10 year respectively by flood damage analysis.

Analysis of Flood Inundated Area Using Multitemporal Satellite Synthetic Aperture Radar (SAR) Imagery (시계열 위성레이더 영상을 이용한 침수지 조사)

  • Lee, Gyu-Seong;Kim, Yang-Su;Lee, Seon-Il
    • Journal of Korea Water Resources Association
    • /
    • v.33 no.4
    • /
    • pp.427-435
    • /
    • 2000
  • It is often crucial to obtain a map of flood inundated area with more accurate and rapid manner. This study attempts to evaluate the potential of satellite synthetic aperture radar (SAR) data for mapping of flood inundated area in Imjin river basin. Multitemporal RADARSAT SAR data of three different dates were obtained at the time of flooding on August 4 and before and after the flooding. Once the data sets were geometrically corrected and preprocessed, the temporal characteristics of relative radar backscattering were analyzed. By comparing the radar backscattering of several surface features, it was clear that the flooded rice paddy showed the distinctive temporal pattern of radar response. Flooded rice paddy showed significantly lower radar signal while the normally growing rice paddy show high radar returns, which also could be easily interpreted from the color composite imagery. In addition to delineating the flooded rice fields, the multitemporal radar imagery also allow us to distinguish the afterward condition of once-flooded rice field.

  • PDF

A Data Driven Index for Convergence Sensor Networks (융합 센서 네트워크를 위한 데이터 기반 색인)

  • Park, Jeong-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.43-48
    • /
    • 2016
  • Wireless sensor networks (WSN) can be more reliable and easier to program and use with the help of sensor database management systems (SDMS). SDMS establish a user-friendly SQL-based interface to process declarative user-defined queries over sensor readings from WSN. Typical queries in SDMS are ad-hoc snapshot queries and long-running, continuous queries. In SDMSs queries are flooded to all nodes in the sensor net, and query results are sent back from nodes that have qualified results to a base station. For query flooding to all nodes, and result flooding to the base station, a lot of communication energy consuming is required. This paper suggests an efficient in-network index solution, named Distributed Information Gathering (DIG) to process range queries in a sensor net environment that can save energy by reducing query and result flooding.

Comparison of Flooding Area Estimation using GIS and Hydraulic Model (GIS와 수리모형을 이용한 홍수지역예측 비교)

  • Kim, Seok-Gyu;Song, In-Ho;Kim, Chul
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.3
    • /
    • pp.183-192
    • /
    • 2006
  • In recent years, the damage caused by flood has been gradually increased. The cause of the flood is unusual weather condition as well as topographical and geographical condition of our country. Flood area analyzing vulnerable flood areas on large regions without previous flood records were developed using GIS and hydraulic model, flood depth by return periods and topographical data such as DEM. The study area is the Munsan river basin. The results using GIS comparing the results using hydraulic model. The results in this study can be used to delineate the potential flooding areas in large regions and the damage from disasters can be reduced by making provisions with the obtained results.

  • PDF

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

Development and Verification of Inundation Modeling with Urban Flooding Caused by the Surcharge of Storm Sewers (도시배수체계와 연계한 내수침수모형의 개발 및 검증)

  • Kim, Ji-Sung;Han, Kun-Yeun;Lee, Chang-Hee
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.12 s.173
    • /
    • pp.1013-1022
    • /
    • 2006
  • Urban flooding is usually caused by the surcharge of storm sewers. For this reason, previous studies on urban flooding are mainly concentrated on the simulation of urban drainage systems. However these approaches that find the pipes which have insufficient drainage capacity are very approximate and unreasonable ways in establishing both flood prevention and flood-loss reduction planning. In this study, a two-dimensional model linked the existing ILLUDAS model is developed to calculate the accurate and resonable solution about urban flood inundation and it is verified by using the simulation of July 2001 flood in Seoul. In the urban area with a small difference of ground elevations, the two-dimensional flood propagation phases must be considered to make a accurate analysis for inundated area and depth. The result of this study can be used to construct fundamental data for a flood control plan and establish a urban flood forecasting/warning system.

k-hop Flooding-based Multicast Considering the Limited Mobility of Mobile Nodes and Intermittent Disconnection (노드의 제한적 이동성과 간헐적인 연결 단절을 고려한 k-홉 플러딩 기반 멀티캐스트)

  • Im, Kwang-Bin;Kang, Kyung-Ran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.600-610
    • /
    • 2010
  • In this paper, a multicast mechanism is proposed for intermittently disconnected networks where the nodes move forward in formation or within a limited area. The proposed scheme extends the well-known tree-based multicast routing mechanism called MAODV by modifying the tree construction and data delivery scheme. Especially, an algorithm is introduced which determines the flooding hop count k estimating the degree of the movement of children in the tree. The performance evaluation was done by the simulation and the proposed scheme was compared with MAODV and two multicast routing schemes for DTN (Disruption Tolerant Network) including the Epidemic routing and ST-multicast. The evaluation results show that our scheme improves the original MAODV from the aspect of tree reconstruction events and message delivery ratio. Compared with the Epidemic routing scheme, our scheme achieves 85% message delivery ratio with less than 50% message delivery overhead.