• 제목/요약/키워드: Deployment Information

검색결과 1,007건 처리시간 0.027초

Android Network Packet Monitoring & Analysis Using Wireshark and Debookee

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.26-38
    • /
    • 2016
  • Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world's most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

A Novel Certificate Revocation List Distribution for Vehicle Communications in Mobile Communication Networks

  • Dan, Du Anh;Kim, Hyun-Gon
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.109-116
    • /
    • 2017
  • Short-lived pseudonym certificates as vehicle identities could satisfy both security and privacy requirements. However, to remove revoked certificates especially in vehicle communications, pseudonym certificate revocation list (CRL) should be distributed resource-efficiently from a practical deployment point of view and in a timely manner. In this paper, we propose a novel CRL distribution scheme capable of CRL multicast to only activated vehicles registered to the CRL multicast group using the group communication system enabler, namely, the GCSE which is being standardized. The scheme is resource efficient by using CRL distribution paths instead of paging processes to find out multicast vehicle(s) within a certain region. The analyzed results show that the proposed scheme outperforms in terms of paging cost, packets transmission cost, and the processing cost at the respective entities compared to the existing four schemes in the literature.

다국적 기업의 해외 자회사간 공용 정보시스템 구현 효율성에 관한 탐색적 연구 (An Exploratory Study on Common Information System Implementation Efficiency Among Overseas Subsidiaries of a Multinational Corporation)

  • 김도영;김영걸;이길형
    • Asia pacific journal of information systems
    • /
    • 제9권2호
    • /
    • pp.117-132
    • /
    • 1999
  • Common system deployment is one of the global information systems strategies of a multinational corporation for large-scale development that can provide economies of scale and optimal use of scarce technical expertise. But while the same (headquarter) team implements the same system, the resulting efficiencies of those projects differ widely among the subsidiaries. This paper focuses on the differences between the efficiencies of these implementation projects. Eight prepropositions about the factors causing the differences have been developed from the previous research. These prepropositions are explored through a case study on the twelve overseas subsidiaries of a multinational electronic corporation headquartered in Korea. We found that three factors(autonomy of subsidiary, complexity of task, experience level of users) have strong relevant relationships and two factors(level of subsidiary country, level of process formality) have partial relevant relationships with the implementation outcome.

  • PDF

Security Concerns on e-Healthcare System with Countermeasures Applied

  • ;김현호;박제훈;김창균;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.256-259
    • /
    • 2013
  • Data and network security for e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack. Moreover, an efficient and cost effective approach for countermeasures is discussed for the delivery of secure services.

  • PDF

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권2호
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

Cluster Based Object Detection in Wireless Sensor Network

  • Rahman, Obaidur;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2006년도 가을 학술발표논문집 Vol.33 No.2 (D)
    • /
    • pp.56-58
    • /
    • 2006
  • Sensing and coverage are the two relevant tasks for a sensor network. Quality of sensor network totally depends upon the sensing ability of sensors. In a certain monitored region success of detecting or sensing an object with the help of sensor network tells that how efficiently the network coverage perform. Here in this paper we have proposed a clustering algorithm for the deployment of sensors and thus calculated the object detection probability. Actually by this work we can easily identify the present network coverage status and accordingly can take action for its improvement.

  • PDF

A Comparative Study between LSI and LDA in Constructing Traceability between Functional and Non-Functional Requirements

  • Byun, Sung-Hoon;Lee, Seok-Won
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권7호
    • /
    • pp.19-29
    • /
    • 2019
  • Requirements traceability is regarded as one of the important quality attributes in software requirements engineering field. If requirements traceability is guaranteed then we can trace the requirements' life throughout all the phases, from the customers' needs in the early stage of the project to requirements specification, deployment, and maintenance phase. This includes not only tracking the development artifacts that accompany the requirements, but also tracking backwards from the development artifacts to the initial customer requirements associated with them. In this paper, especially, we dealt with the traceability between functional requirements and non-functional requirements. Among many Information Retrieval (IR) techniques, we decided to utilize Latent Semantic Indexing (LSI) and Latent Dirichlet Allocation (LDA) in our research. Ultimately, we conducted an experiment on constructing traceability by using two techniques and analyzed the experiment results. And then we provided a comparative study between two IR techniques in constructing traceability between functional requirements and non-functional requirements.

AMI 네트워크에서의 장치 배치를 위한 시뮬레이션 결과 분석 방법 (Method of Simulation Result Analysis for AMI Network Device Deployment)

  • 이준호;박민우;정태명
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.677-680
    • /
    • 2011
  • AMI 시스템은 기존의 전력망에 IT기술을 접목시키는 스마트그리드 구현을 위한 핵심 기술로서 스마트그리드의 인프라를 구성하는데 있어 필수적이다. AMI는 연결되어 있는 가정의 수에 따라 그 규모가 달라지므로 AMI의 규모와 적정 수준을 평가하기 위한 시뮬레이션과 시뮬레이션 결과 분석이 필요하다. AMI의 적절한 구성 장치 배치를 위해 서버 처리 능력과 노드의 적정 수를 산출하기 위한 방법을 제안한다.

WSN에서 3차원 노드 배치에 따른 효율적인 키관리 (The Efficiency Key management for three dimensional node deployment in WSN)

  • 이경효;오병균
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2008년도 춘계학술발표대회
    • /
    • pp.1124-1127
    • /
    • 2008
  • WSN에서 센서 노드는 저전력을 필요로 함으로 에너지 소비를 최소화할 수 있어야 하고 기존의 키관리 방식에서 암호키 검색시간의 절약과 키의 위치정보 추출 방법에 따른 효과적인 암호 키 관리가 필요하다. 따라서 본 논문에서는 키의 배분 및 저장을 3차원 적인 위치기반 키관리 방식을 적용하여 키관리에 있어서 기존의 위치기반의 형식보다 경로키수를 줄여 센서 노드의 에너지 소비를 줄여 가용성 보장을 할 수 있게 하였다.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • 제24권2호
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.