• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.025 seconds

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.11-18
    • /
    • 2019
  • Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.

Regression Algorithms Evaluation for Analysis of Crosstalk in High-Speed Digital System

  • Minhyuk Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1449-1461
    • /
    • 2024
  • As technology advances, processor speeds are increasing at a rapid pace and digital systems require a significant amount of data bandwidth. As a result, careful consideration of signal integrity is required to ensure reliable and high-speed data processing. Crosstalk has become a vital area of research in signal integrity for electronic packages, mainly because of the high level of integration. Analytic formulas were analyzed in this study to identify the features that can predict crosstalk in multi-conductor transmission lines. Through the analysis, five variables were found and obtained a dataset consisting of 302,500, data points. The study evaluated the performance of various regression models for optimization via automatic machine learning by comparing the machine learning predictions with the analytic solution. Extra tree regression consistently outperformed other algorithms, with coefficients of determination exceeding 0.9 and root mean square logarithmic errors below 0.35. The study also notes that different algorithms produced varied predictions for the two metrics.

Implementation of Data Integrity Module in Wireless Internet Terminal for Mobile Customer Relationship Management(m-CRM) (m-CRM을 위한 무선인터넷단말기의 데이터무결성 모듈의 구현)

  • Park, Hyun-Cheol;Kim, Dong-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.485-494
    • /
    • 2004
  • Recently, the wireless internet terminals like mobile phones or PDAs prevail in the management of customers. With such terminals, businessmen can get business data and information of customers in real time, in connection with mobile group wares. By the wireless terminals, customers can conveniently get information of goods, search purchase sites, and give orders and do settlement. This paper aims to present the safe data integrity modules of the wireless internet terminal, for service providing correct real-time promotion information, by using users' disposition, situation, Purchase information. This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction

Factors Influencing Death Anxiety in the Aged (노인의 죽음불안에 영향을 미치는 요인)

  • Lee, Jung-In;Kim, Soon-Yi
    • Journal of Korean Public Health Nursing
    • /
    • v.25 no.1
    • /
    • pp.28-37
    • /
    • 2011
  • Purpose: The study examined influencing factors on death anxiety in the aged. Method: This was a descriptive survey study. Data were collected from March to June, 2010, from357 older home-dwelling adults. The questionnaires solicited information on death anxiety, family function, morale, health behavior and ego-integrity. Data was analyzed using descriptive statistics, Pearson's correlation, and stepwise multiple regression. Results: Average scores were 2.50 for death anxiety, 3.80 for family function, 9.0 for morale, 3.12 for health behavior and 2.84 for ego-integrity. There were statistically significant negative correlations between family function and death anxiety, morale and death anxiety, health behavior and death anxiety, and ego-integrity and death anxiety Morale, ego-integrity, and economic status were a significant predictor of death anxiety. Conclusion: Multilateral efforts are needed to assist the aged in successful aging through continuous body activities and active participation in society.

Study of EMC Optimization of Automotive Electronic Components using ECAE

  • Kim, Tae-Ho;Kim, Mi-Ro;Jung, Sang-Yong
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.3 no.3
    • /
    • pp.248-251
    • /
    • 2014
  • As more vehicles become equipped with advanced electronic control systems, more consideration is needed with regards to automotive safety issues related to the effects of electromagnetic waves. Unwanted electromagnetic waves from the antenna, electricity and other electronic devices cause the performance and safety problem of automotive components. In general, Power Integrity and Signal Integrity analysis have been widely used, but these analyses have stayed PCB level. PCB base analysis is different from radiated emission TEST condition so its results are used just for reference. This paper proposes EMC optimization technology using module level 3-dimensional radiation simulation process closed to fundamental test conditions. If module level EMC analysis, which is proposed in this study, is applied to all automotive electronics systems, unexpected EMC noise will be prevented.

A study for system design that guarantees the integrity of computer files based on blockchain and checksum

  • Kim, Minyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.392-401
    • /
    • 2021
  • When a data file is shared through various methods on the Internet, the data file may be damaged in various cases. To prevent this, some websites provide the checksum value of the download target file in text data type. The checksum value provided in this way is then compared with the checksum value of the downloaded file and the published checksum value. If they are the same, the file is regarded as the same. However, the checksum value provided in text form is easily tampered with by an attacker. Because of this, if the correct checksum cannot be verified, the reliability and integrity of the data file cannot be ensured. In this paper, a checksum value is generated to ensure the integrity and reliability of a data file, and this value and related file information are stored in the blockchain. After that, we will introduce the research contents for designing and implementing a system that provides a function to share the checksum value stored in the block chain and compare it with other people's files.

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.79-83
    • /
    • 2016
  • In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.

Development of Stream Cipher using the AES (AES를 이용한 스트림 암호 개발)

  • Kim, Sung-Gi;Kim, Gil-Ho;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.972-981
    • /
    • 2013
  • Future aspects of the has turned into a network centric warfare(NCW). Organically combined wired and wireless networks in a variety of cross-of-the-art combat power factor utilization of information and communication technology is a key element of NCW implementation. At used various information in the NCW must be the confidentiality and integrity excellent then quick situation assessment through reliability the real-time processing, which is the core of winning the war. In this paper, NCW is one of the key technologies of the implementation of 128-bit output stream cipher algorithm is proposed. AES-based stream cipher developed by applying modified OFB mode the confidentiality and integrity as well as hardware implementation to the security and real-time processing is superior.

Using Deep Learning for automated classification of wall subtypes for semantic integrity checking of Building Information Models (딥러닝 기반 BIM(Building Information Modeling) 벽체 하위 유형 자동 분류 통한 정합성 검증에 관한 연구)

  • Jung, Rae-Kyu;Koo, Bon-Sang;Yu, Young-Su
    • Journal of KIBIM
    • /
    • v.9 no.4
    • /
    • pp.31-40
    • /
    • 2019
  • With Building Information Modeling(BIM) becoming the de facto standard for data sharing in the AEC industry, additional needs have increased to ensure the data integrity of BIM models themselves. Although the Industry Foundation Classes provide an open and neutral data format, its generalized schema leaves it open to data loss and misclassifications This research applied deep learning to automatically classify BIM elements and thus check the integrity of BIM-to-IFC mappings. Multi-view CNN(MVCC) and PointNet, which are two deep learning models customized to learn and classify in 3 dimensional non-euclidean spaces, were used. The analysis was restricted to classifying subtypes of architectural walls. MVCNN resulted in the highest performance, with ACC and F1 score of 0.95 and 0.94. MVCNN unitizes images from multiple perspectives of an element, and was thus able to learn the nuanced differences of wall subtypes. PointNet, on the other hand, lost many of the detailed features as it uses a sample of the point clouds and perceived only the 'skeleton' of the given walls.

A Design for the Real-Time Enterprise based Logistics Information System of Postal Service (실시간 기반 우편 물류 정보시스템 모형 설계)

  • Sun, Ji-Ung;Song, Young-Hyo
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.162-176
    • /
    • 2007
  • As facing the rapid advance of information technologies, the postal service is required to have capabilities of real-time logistics characterized by collaboration, ubiquity and intelligence which are necessary to the organizational management. In this study we discuss the design of the next generation information system based on real-time enterprise strategy to achieve real-time integrity and upgrade of postal information system. After briefly addressing the issues on developing information system and current situation, we provide the design direction and the framework of the to-be system. We develop detailed specification of each subsystem and provide an operational scenario. We believe when this framework is put into use, it can contribute to competitive performance by giving the integrity and consistency in implementing information systems of the Korea Postal Service.