• Title/Summary/Keyword: Information and Communications security

Search Result 1,069, Processing Time 0.033 seconds

A Study on Realization of Visible Light Communication System for Power Line Communication Using 8-bit Microcontroller

  • Yun, Ji-Hun;Hong, Geun-Bin;Kim, Yong-Kab
    • Transactions on Electrical and Electronic Materials
    • /
    • v.11 no.5
    • /
    • pp.238-241
    • /
    • 2010
  • The purpose of this study is to solve the problems of radio frequency bandwidth frequency depletion, confusion possibilities, and security that are in current wireless communications systems, and to confirm the possibility of applying those solutions for the next generation network. To solve the problems of the current wireless communications system, a visible light communications system for power line communication (PLC) via 8-bit microcontroller is created and the capacity is analyzed. The exclusive PLC chip APLC-485MA, an 8-bit ATmega16 microcontroller, high brightness 5pi light emitting diodes (LEDs), and the LLS08-A1 visible light-receiving sensor were used for the transmitter and receiver. The performance was analyzed using a designed program and an oscilloscope. The voltage change was measured as a function of distance from 10-50 cm. Blue LEDs showed the best performance among the measured LED types, with 0.47 V of voltage loss, but for a distance over 50 cm, precise data was not easy to obtain due to the weak light. To overcome these types of problems, specific values such as the changing conditions and efficiency value relevant to the light emitting parts and the visible light-receiving sensor should be calculated, and continuous study and improvements should also be realized for better communication conditions.

Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud

  • Wang, Boyang;Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.592-599
    • /
    • 2014
  • Cloud computing enables users to easily store their data and simply share data with others. Due to the security threats in an untrusted cloud, users are recommended to compute verification metadata, such as signatures, on their data to protect the integrity. Many mechanisms have been proposed to allow a public verifier to efficiently audit cloud data integrity without receiving the entire data from the cloud. However, to the best of our knowledge, none of them has considered about the efficiency of public verification on multi-owner data, where each block in data is signed by multiple owners. In this paper, we propose a novel public verification mechanism to audit the integrity of multi-owner data in an untrusted cloud by taking the advantage of multisignatures. With our mechanism, the verification time and storage overhead of signatures on multi-owner data in the cloud are independent with the number of owners. In addition, we demonstrate the security of our scheme with rigorous proofs. Compared to the straightforward extension of previous mechanisms, our mechanism shows a better performance in experiments.

Design of WiFi-AP Doppler Detection based Wireless Security Services (WiFi-AP 도플러 검파 기반의 무선 보안서비스 설계)

  • Kang, Min-Goo
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.16-19
    • /
    • 2014
  • In this paper, the beacon signals of WiFi doppler frequency detection based WiFi-AP was designed with the subcarrier between a transmitter and a receiver of WLAN(wireless LAN). We can use such signals to identify human moving as an antenna array and tracking of RF beam. This wireless security services with the combination of WiFi doppler frequency and adaptive beacon time signal was proposed for wireless detection and motion based services.

Deep Packet Inspection for Intrusion Detection Systems: A Survey

  • AbuHmed, Tamer;Mohaisen, Abedelaziz;Nyang, Dae-Hun
    • Information and Communications Magazine
    • /
    • v.24 no.11
    • /
    • pp.25-36
    • /
    • 2007
  • Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. Fundamentally, almost intrusion detection systems have the ability to search through packets and identify contents that match with known attach. In this paper we survey the deep packet inspection implementations techniques, research challenges and algorithm. Finally, we provide a comparison between the different applied system.

Counterfeit Detection Using Characterization of Safety Feature on Banknote with Full-field Optical Coherence Tomography

  • Choi, Woo-June;Min, Gi-Hyeon;Lee, Byeong-Ha;Eom, Jong-Hyun;Kim, Ju-Wan
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.316-320
    • /
    • 2010
  • We report an application of full-field optical coherence tomography (FF-OCT) for identifying counterfeit bank notes. The depth-resolved imaging capability of FF-OCT was used for tomographic identification of superficially-identical objects. By retrieving the internal structures of the security feature (cash hologram) of an original banknote, we could demonstrate the feasibility of FF-OCT to identify counterfeit money. The FF-OCT images showed that the hologram consisted of micron scale multi-coated layers including an air gap. Therefore, it is expected that FF-OCT has potential as a new non-invasive tool to discern imitation of currency, and it would find applications in a wide field of counterfeit sciences.

Issues and Suggestions for "Act on the Development of Cloud Computing" and Protection of its Users ("클라우드컴퓨팅 발전 및 이용자 보호에 관한 법률"의 쟁점 및 개선방안)

  • Lee, Jung Koo;Min, Daihwan;Kwon, Hun Yeong
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.81-91
    • /
    • 2017
  • In Korea, "Act on the Development of Cloud Computing and Protection of its Users" has been enforced since September 28, 2015. Many countries implemented 'Cloud First' policies and global companies such as Amazon, Microsoft, IBM started cloud services in Korea. Under these circumstance, the Act was established for developing the cloud computing industry. The Act includes clauses for encouraging the use of private cloud computing by public organizations, supporting small- and medium-size cloud service providers, and utilizing secure cloud computing services by users. However, some terms appear to be similar but have different meanings from "Act on Promotion of Information and Communications Network Utilization and Information Protection, etc." and "Personal Information Protection Act". This generated some confusion and conflicts in relation to providing user information to a 3rd party and notifying the intrusion in the Cloud Computing Act. This paper discusses these issues and suggestions for revision of the Cloud Computing Act.

Research on Major Weakness Rules for Secure Software Development (소프트웨어 개발 보안성 강화를 위한 주요 보안약점 진단규칙 연구)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.831-840
    • /
    • 2013
  • Recently, to enhance the security of software, static analysis tools for removing weaknesses, the cause of vulnerability, have been used a lot in the software development stage. Therefore, the tools need to have the rules being able to diagnose various weaknesses. Top 5 weaknesses found in the software developed by major domestic information projects from 2011 to 2012 is 76% of top 10 weaknesses per year. Software security can be improved a lot if top 5 weaknesses just are removed properly in software development. In this paper, we propose the PMD's rules for diagnosing the major weaknesses and present the results of its performance test.

Security Threat Factors and Improvement Methods in Enterprise Hybrid Applications (기업용 하이브리드 애플리케이션 보안 위협 요소 및 대응방안 연구)

  • Lee, Yoonjae;Oh, Junseok;Kim, Yongwon;Lee, Bong Gyou
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.531-534
    • /
    • 2011
  • 본 연구의 목적은 차세대 MEAP 환경에서의 보안 평가 모델을 제시하는 것이다. 기업용 애플리케이션 개발환경은 PES 및 MEAP을 거쳐 완벽한 OSMP구현을 위한 HTML5 환경으로 발전하고 있다. 이와 더불어 보안의 위협도 증대되고 있으나, HTML5 환경에서의 보안에 대한 연구는 미흡한 실정이다. 이러한 문제에 대비하기 위해서는 기존 개발환경의 보안 특징을 살펴볼 필요가 있다. 본 연구에서는 보안위협요소를 Back-End System, Client, Developer, OS 4가지로 도출한 후, 이에 해당하는 보안 위협 문제들을 살펴보고 보안 평가 모델을 제시하였다. 본 모델은 단계별 보안이슈를 포함하고 있으며, 향후 HTML5 시대에 논의될 보안 이슈의 방향성을 제시한다는데 그 의미가 있다. 따라서 본 연구는 기업형 하이브리드 애플리케이션 개발을 준비하는 기업 및 연구자에게 시사점을 제공할 것으로 기대된다.

Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1 (DCU 보안요구사항 분석 및 CC v3.1 기반의 보호프로파일 개발)

  • Cho, Youngjun;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.1001-1011
    • /
    • 2014
  • Smart Grid Devices could have security vulnerabilities that have legacy communication networks because of the fact that Smart Grid employs bi-directional communications and adopted a variety of communication interface. Consequently, it is required to build concrete response processes and to minimize the damage of the cyber attacks including security evaluation and certification methods. DCU is designed to collect meter data from numerous smart meter and send to utility's server so DCU installed between smart meter and utility's server. For this reason, If DCU compromised by attacker then attacker could use DCU to launching point for and attack on other devices. However, DCU's security evaluation and certification techniques do not suffice to be deployed in smart grid infrastructure. This work development DCU protection profile based on CC, it is expected that provide some assistance to DCU manufacturer for development of DCU security target and to DCU operator for help safety management of DCU.

Theoretical Aspects Of The Organizational And Pedagogical Conditions Of Creative Self-Development Of Distance Learning Students

  • Sydorovska, Ievgeniia;Vakulenko, Olesia;Dniprenko, Vadim;Gutnyk, Iryna;Kobyzhcha, Nataliia;Ivanova, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.231-236
    • /
    • 2021
  • The purpose and hypothesis of the article was the need to solve the following research tasks: Analysis of psychological and pedagogical literature on the research problem. To identify and experimentally test the effectiveness of organizational and pedagogical conditions affecting the creative self-development of a distance learning student. Research methods: analysis of philosophical and psychological-pedagogical literature on the problem under study; pedagogical experiment; modeling, questioning, testing, analysis of the products of students' creative activity (essays, creative works, creative projects) and the implementation of educational tasks, conversations, observations.