• Title/Summary/Keyword: Information Security System

Search Result 6,559, Processing Time 0.034 seconds

Attribute-based authentication scheme in IPTV broadcasting system (IPTV 방송 시스템에서의 속성기반 사용자 인증 기법)

  • Lee, Ji-Seon;Kim, Hyo-Dong
    • Journal of Broadcast Engineering
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2009
  • An IPTV (Internet Protocol Television) technology is the new convergence technology of the telecommunication and broadcasting which provides various bidirectional TV services. To provide these services only to legal subscribers, mutual authentication between set-top box connected with TV set and the smart card owned by a subscriber is needed. In this paper, we propose an attribute-based mutual authentication scheme that only someone who is satisfied with some attributes, such as titles or departments, can access the contents provided by the IPTV service in an organization. We also show that the proposed scheme is secure. Our proposed scheme has a virtue that user can access various services, provided by an organization where he/she belongs to, according to their attributes with only one time registration. As far as we know, this is the first attribute-based authentication scheme which can be applied to any organizations in IPTV environments.

Study on Mechanism of Preventing Application Piracy on the Android Platform (안드로이드 어플리케이션 위변조 방지를 위한 방안 연구)

  • Lee, Kwang-Hyoung;Kim, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.11
    • /
    • pp.6849-6855
    • /
    • 2014
  • Recently, with the increasing use of smart phones, security issues, such as safety and reliability of the use of the Android application has become a topic to provide services in various forms. An Android application is performed using several important files in the form of an apk file. On the other hand, they may be subject to unauthorized use, such as the loss of rights and privileges due to the insertion of malicious source code of these apk files. This paper examines the Android environment to study ways to define the threats related to the unauthorized use of the application source code, and based on the results of the analysis, to prevent unauthorized use of the application source code. In this paper, a system is provided using a third body to prevent and detect applications that have been counterfeited or forged illegally and installed on Android devices. The application provides services to existing systems that are configured with only the service server that provides users and applications general, This paper proposes the use of a trusted third party for user registration and to verify the integrity of the application, add an institution, and provide a safe application.

To improve the performance of BER using the 2-step interleaving for Visible Light Communication with LEDs (LED를 이용한 가시광 통신 시스템에서 2-step 인터리빙을 통한 BER 성능 향상)

  • Lee, Jonghyun;Seo, Hyoduck;Han, Doohee;Lee, Kyesan;Lee, Kyujin
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.46-53
    • /
    • 2015
  • Visible Light Communication (VLC) is effective way to realize the light device and communication device using a Light Emitting Diode (LED) simultaneously. VLC has high security for Field Of View (FOV) communication area, also which is possible to transmit the high data rate using visible light. In VLC, transmitting the divided data by the RGB channels is higher data rate than transmitting the same data by RGB channels. However, it occurred the burst error by scattering and reflection of visible light which is impossible to restore that. To solve the problem, we proposed the 2-step interleaving scheme that high data rate and improve the performance of BER in VLC. The proposed system implements cyclic interleaving and convolutional interleaving that is able to be standardized the performance of RGB channels and improve the performance of BER using error correction.

A Design and Implementation of Anomaly Detection Model based the Web Traffic Trend Analysis (웹 트래픽 추이 분석 기반 비정상행위 탐지 모델의 설계 및 구현)

  • Jang, Sung-Min;Park, Soon-Dong
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.5
    • /
    • pp.715-724
    • /
    • 2005
  • Recently many important systems that used to be operated in a closed environment are now providing web services and these kinds of web-based services are often an easy and common target of attacks. In addition, the great variety of web content and applications cause the development of new various intrusion technologies, while the misuse-based intrusion detection technology cannot keep the peace with the attacks and it seems to lack the capability to deal with such various new security threats, As a result it is necessary to research and develop new types of detection technologies that can detect newly developed attacks and intrusions as well as to be able to deal with previous types of exploits. In this paper, a HTTP traffic model is tested for its anomaly by using a HTTP request traffic pattern analysis and the field information analysis of the HTTP packet. Consequently, the HTTP traffic models by applying anomaly tests is designed and established.

  • PDF

Reliable extraction of moving edge segments in the dynamic environment (동적인 입력환경에서 신뢰성이 있는 이동 에지세그먼트 검출)

  • Ahn Ki-Ok;Lee June-Hyung;Chae Ok-Sam
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.5 s.311
    • /
    • pp.45-51
    • /
    • 2006
  • Recently, the IDS(Intrusion Detection System) using a video camera is an important part of the home security systems which start gaining popularity. However, the video intruder detection has not been widely used in the home surveillance systems due to its unreliable performance in the environment with abrupt illumination change. In this paper, we propose an effective moving edge extraction algerian from a sequence image. The proposed algorithm extracts edge segments from current image and eliminates the background edge segments by matching them with reference edge list, which is updated at every frame, to find the moving edge segments. The test results show that it can detect the contour of moving object in the noisy environment with abrupt illumination change.

Perception of Patient Safety Risk Factors and Performance Level of Safety Care Activities among Hospital Nurses (환자안전 위험요인에 대한 병원간호사의 인식수준과 안전간호활동 수행정도)

  • Son, Young Shin;Lee, Young Whee;Kim, Young Shin;Song, Eun Jeong;Lee, Hye Ryun;Lee, Ju Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.2
    • /
    • pp.190-200
    • /
    • 2018
  • Purpose: The purpose of this study was to identify the level of perception of safety risk factors and the degree of performance of safety nursing activities in order to develop an education program to improve the safety of patients. Methods: The subjects were 217 nurses from 3 university hospitals in Incheon. Data were collected with structured questionnaires and analyzed using descriptive analysis, t-test, and ANOVA using SPSS 22.0. Results: The level of perception of patient's safety risk factors and safety care activities was 2.93 and 4.68, respectively. Perception of patient safety risk factors which belonging to the risk type of therapeutic devices, equipment, service and infrastructure all scored below average; also in addition, behavior, performance, and violence risk type and work system, information and communication risk type showed relatively low perception levels. Safety nursing activities showed a low level of performance in accurate communication among medical teams, management of fire and disaster, security management, use of restraints, identification of patients, and correct performance of operations and procedures. Conclusion: Based on these results, it is necessary to improve the safety of patients by taking proper management measures along with education.

Research on Effective Scientific Investigation Methods with Regards to Explosion Accidents (폭발사고시 효과적인 과학수사 방법에 관한 연구)

  • Jun, Sang-Gun;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.72-87
    • /
    • 2006
  • Accidents and terrorist acts that utilize explosives have a great influence on society and thus require a prompt investigation for the arrest of the culprit. However, such investigations are often met with difficulties due to the vastness of the crime scene, restrictions on approaching the scene, fragility of the evidence, complexity of investigation, and the lack of expertise. In spite of such facts, scientific investigation regarding explosives have not been widely studied in Korea. Therefore, the focus of this research primarily concerns the effective scientific investigation methods in cases of accidents that involve chemical explosives. Although the a systematic investigation method is at the heart of scientific investigation in cases of explosive accidents, it is only at its rudimentary stage. Therefore, in this research, a systematic investigation method is put forth for the 'scene investigation, the documentation of the scene, and the collection and processing of evidence. Further, I have set forth a 'scene investigation check list' the ensure a thorough scene investigation and to promote an exhaustive evidence collection that would guarantee the admissibility of such evidence in court. The above efforts were aimed at simplifying the currently complicated investigation system. 1) In the future, a guidebook that can be generally applied to accidents involving explosives in Korea ught to be produced, a continual systematic education and integrated training excises for investigators ought to be established, laws that require additives in explosives ought to be instituted so that the type, components, and source of explosives can be identified, and lastly, a database that contain information on former explosion accidents, trends, and techniques of criminal activities that involve explosion accidents should be compiled.

  • PDF

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

USN Channel Establishment Algorithm for Sensor Authentication and Anti-collision (센서 인증과 충돌 방지를 위한 USN 채널 확립 알고리즘)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.74-80
    • /
    • 2007
  • Advances in electronic and computer technologies have paved the way for the proliferation of WSN(wireless sensor networks). Accordingly, necessity of anti-collusion and authentication technology is increasing on the sensor network system. Some of the algorithm developed for the anti-collision sensor network can be easily adopted to wireless sensor network platforms and in the same time they can meet the requirements for sensor networks like: simple parallel distributed computation, distributed storage, data robustness and auto-classification of sensor readings. To achieve security in wireless sensor networks, it is important to be able to establish safely channel among sensor nodes. In this paper, we proposed the USN(Ubiquitous Sensor Network) channel establishment algorithm for sensor's authentication and anti-collision. Two different data aggregation architectures will be presented, with algorithms which use wavelet filter to establish channels among sensor nodes and BIBD (Balanced Incomplete Block Design) which use anti-collision methods of the sensors. As a result, the proposed algorithm based on BIBD and wavelet filter was made for 98% collision detection rate on the ideal environment.

Implementation of Intelligent and Human-Friendly Home Service Robot (인간 친화적인 가정용 지능형 서비스 로봇 구현)

  • Choi, Woo-Kyung;Kim, Seong-Joo;Kim, Jong-Soo;Jeo, Jae-Yong;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.6
    • /
    • pp.720-725
    • /
    • 2004
  • Robot systems have applied to manufacturing or industrial field for reducing the need for human presence in dangerous and/or repetitive tasks. However, robot applications are transformed from industrial field to human life in recent tendency Nowadays, final goal of robot is to make a intelligent robot that can understand what human say and learn by itself and have internal emotion. For example Home service robots are able to provice functions such as security, housework, entertainment, education and secretary To provide various functions, home robots need to recognize human`s requirement and environment, and it is indispensable to use artificial intelligence technology for implementation of home robots. In this paper, implemented robot system takes data from several sensors and fuses the data to recognize environment information. Also, it can select a proper behavior for environment using soft computing method. Each behavior is composed with intuitive motion and sound in order to let human realize robot behavior well.