• Title/Summary/Keyword: Id

Search Result 2,849, Processing Time 0.029 seconds

Positioning Mechanism Using GPS and Pico-cell ID Access Probability (GPS와 Pico-cell ID접속 확률을 이용한 위치 추정 방법)

  • Jeong, Won-Young;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1459-1467
    • /
    • 2011
  • Cell-ID based positioning solution is cheaper and easier to implement than other wireless positioning solutions. However, its accuracy is relatively low. So we propose a novel approach to improve its accuracy. Our approach uses the probability that an MS will connect to each of BSs among several BSs to which an MS can access in a pico-cell network, and Cell-ID based positioning method is applied. The simulation result shows that performance of the proposed approach is improved compared to the other positioning solutions.

A design and implementation of a priority and context-aware event ID for U-City integrated urban management platform in U-City (U-City 도시통합관제플랫폼의 상황 이벤트 ID, 우선순위 기능 설계 및 구현)

  • Song, Kyu-Seog;Ryou, Jae-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.901-907
    • /
    • 2010
  • This paper proposes a standard method for linking data between the U-City Integrated Urban Management Platform and u-service systems through systemization of event identification and standardization of event priority. By applying the proposed method, the incoming events to the Management Platform are listed and processed according to their priority of urgency. The application of the systemized event ID and standardized event priority enables prompt counter-measures against urban emergencies and disasters, which improves the efficiency of business processes by reducing the time and cost to complete required actions.

Analysis on Vulnerability of ID/PW Management Solution and Proposal of the Evaluation Criteria (아이디/패스워드 통합 관리 제품의 취약성 분석 및 평가기준 제안)

  • Han, Jeong-Hoon;Lee, Byung-Hee;Hong, Su-Min;Kim, Seung-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.125-132
    • /
    • 2008
  • As the development of Internet technology, the number of IDs managed by each individuals has been increased. And many software development institutes have developed ID/PW management solutions to facilitate secure and convenient management of ID/PW. However, these solutions also can be vulnerable in case of administrator's password exposure. Thus, we need to derive security requirements from the vulnerability analysis of these solutions, also we need evaluation criteria for secure ID/PW management solution development. In this paper, we analyze the vulnerability of ID/PW management solution and propose the evaluation criteria for secure ID/PW management solution.

A Study on Image Electronic Money based on Watermarking Technique (워터 마킹 기술을 활용한 이미지 전자화폐에 관한 연구)

  • Lee, Jung-Soo;Kim, Whoi-Yul
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1335-1340
    • /
    • 2004
  • This study introduces a technology utilizing digital images as electronic money by inserting watermark into the images. Watermarking technology assign contents ID to images and inserts the contents ID into the images in an unnoticeable way. The server that manages the issue and the usage of mage electronic money (called ‘WaterCash’ hereafter) stores issued contents ID to database and manage them as electronic money. WaterCash guarantees anonymity and prevents the forgery and modification of WaterCash based on semi-fragile watermarking technique. In addition, WaterCash is transferable and the illegal use of WaterCash can be prevented based on the watermarking technology. The watermarking .technology used in this paper was designed to be robust to image compression but vulnerable to intentional or non-intentional Image processing.

User Authentication Mechanism based on Authentication Information using One-time Sessions (일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안)

  • Park, Yeong Su;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.421-426
    • /
    • 2019
  • Nowadays, various type of technologies are used for user authentication, such as knowledge based(ID/PW, etc.) authentication, biometric based(Iris/fingerprint/vein recognition) authentication, ownership based(OTP, security card, etc.) authentication. ID/PW authentication technology, a knowledge based authentication, despite the advantages of low in implementation and maintenance costs and being familiar to users, there are disadvantages of vulnerable to hacking attacks, Other authentication methods solve the vulnerability in ID/PW authentication technology, but they have high initial investment cost and maintenance cost and troublesome problem of reissuance. In this paper, we proposed to improve security and convenience over existing ID/PW based authentication technology, and to secure user authentication without restriction on the devices used for authentication.

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

Design of Short Indolicidin Analogs with Enhanced Prokaryotic Selectivity (증가된 원핵세포선택성을 가진 짧은 인돌리시딘 유사체의 설계)

  • Shin, Song Yub
    • Microbiology and Biotechnology Letters
    • /
    • v.40 no.4
    • /
    • pp.409-413
    • /
    • 2012
  • Indolicidin (ID) is a 13-residue Trp-rich antimicrobial peptide (AMP) isolated from bovine neutrophils. In addition to having a high antimicrobial potency, it is also toxic to mammalian cells. To develop novel ID-derived AMPs with shorter lengths and enhanced prokaryotic selectivities (meaning potent antimicrobial activity against bacterial cells without toxicity against mammalian cells) over the parental ID, several ID analogs were designed and synthesized. Finally, 10-residue ID analogs (SI, SI-PA, SI-WF and SI-WL) with much higher prokaryotic selectivity than the parental ID were developed. Our results suggest that the hydrophobic and aromatic amino acids at the central position of the analog SI with the highest prokaryotic selectivity are important for potent antimicrobial activity, but two Pro residues do not affect antimicrobial activity. The order of prokaryotic selectivity for ID and its designed analogs was SI > SI-PA > SI-WF > SI-WL > ID > SI-WA. Taken together, our designed short ID analogs could be developed as therapeutic agents for treating bacterial infections.

Performance Analysis of LED-ID Communication Systems In an Indoor Environment (실내 환경에서의 LED-ID 통신 시스템의 성능 분석)

  • Choi, Jae-Hyuck;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.4
    • /
    • pp.43-51
    • /
    • 2010
  • In this paper, we studied line coding technology tendency for high speed data communication at LED-ID (Identification) communication system in indoor environment. A LED-ID technology is a communication using visible ray (RGB) that come out in LED device. It is energy curtailment effect and possible in ubiquitous network service applications. The LED-ID system has the above advantages about that the communication throughout the whole room is enabled by high power lighting and lighting equipment with white colored LED which are easy to install and have good outward appearance. Therefore, the transmission by light waves is more suitable for wireless networks than by radio waves. We compared with the NRZ, AMI, 4B5B, HDB3, 8B10B line coding for efficient in error detection and serves data transmission of high speed.

The Analysis of TxID Signal's Effect to Legacy Receivers in ATSC DTV System (ATSC DTV 시스템에서 TxID 신호가 기존 수신기에 미치는 영향 분석)

  • Mok, Ha-Kyun;Park, Sung-Ik;Lee, Jae-Kwon;Ryu, Ho-Jin;Kim, Heung-Mook
    • Journal of Broadcast Engineering
    • /
    • v.15 no.3
    • /
    • pp.414-425
    • /
    • 2010
  • When we implement the single frequency network (SFN) in ATSC terrestrial DTV system, there is an interference problem to DTV receivers due to the use of same frequency channel among transmitters and repeaters. To resolve this problem, it is recommended to adopt the transmitter identification signals in transmitting equipments. In this paper, we analyzed the influence suffered by legacy DTV receivers when the TxID signal is added to the DTV transmitting signals and the results were further verified by computer simulation, laboratory test and field test. The above tests show that if the TxID signal is added to the level of -30dB compared to the original DTV signal, the TOV(Threshold Of Visibility) increment in legacy receivers is about 0.17 dB. It means that we can insert and transmit the TxID signal in ATSC terrestrial DTV system without making the negative effect to the legacy DTV receivers.

Improved Dynamic ID-based Remote User Authentication Scheme Using Smartcards (스마트카드를 이용한 향상된 동적 ID기반 원격 사용자 인증 기술)

  • Shim, Hee-Won;Park, Joonn-Hyung;Noh, Bong-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.223-230
    • /
    • 2009
  • Among the remote user authentication schemes, password-based authentication methods are the most widely used. In 2004, Das et al. proposed a "Dynamic ID Based Remote User Authentication Scheme" that is the password based scheme with smart-cards, and is the light-weight technique using only one-way hash algorithm and XOR calculation. This scheme adopts a dynamic ID that protects against ID-theft attack, and can resist replay attack with timestamp features. Later, many flaws of this scheme were founded that it allows any passwords to be authenticated, and can be vulnerable to impersonation attack, and guessing attack. By this reason many modifications were announced. These scheme including all modifications are similarly maintained security against replay the authentication message attack by the timestamp. But, if advisory can replay the login immediately, this attempt can be succeeded. In this paper, we analyze the security vulnerabilities of Das scheme, and propose improved scheme which can resist on real-time replay attack using the counter of authentication. Besides our scheme still secure against impersonation attack, guessing attack, and also provides mutual authentication feature.

  • PDF