• Title/Summary/Keyword: KEIT

Search Result 19, Processing Time 0.025 seconds

V2X Technology Trends for Next-Generation Mobility

  • Kim, Young-Hak
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.7-13
    • /
    • 2020
  • We describes V2X technology, a connectivity-based recognition technology that is attracting attention as a key technology for implementing autonomous driving technology, and autonomous communication modules that implement ADAS technology, a sensor-based recognition technology. It also explains the trends in V2X technology standardization centered on IEEE 802.11p, which is a WAVE technology standard based on Wi-Fi/DSRC. Finally, we will discuss the market growth trend of V2X communication modules in the United States, the leading V2X technology module, and the development of technology development trends of major domestic and international companies that are leading the global technology market related to V2X communication modules. V2X and ADAS technologies will be the biggest influence on automotive purchasing decisions. In recent years, V2I mandates have been promoted beyond V2V, mainly in developed countries such as the United States. The related industry needs to focus on the development of information transmission network technology that can support high frequency high efficiency(transmission rate) and sophisticated positioning accuracy beyond conventional vehicle communication.

An Analysis on the Legislative Process and Problems of the Special Act on ICT (ICT특별법의 제정과정 및 문제점 분석)

  • Chung, Choong-Sik
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.111-128
    • /
    • 2014
  • President Park Geun-hye Administration has established the Ministry of Science, ICT and Future Planning (MSIP) to build a creative economy using Information and Communication Technology (ICT). July 2, 2013, The National Assembly has legislated the special act on the ICT promotion and convergence so called special ICT Act. This special ICT Act has reduced the legal basis through legislative process and departmental agreement. Therefore many experts worried that since the MSIP's key functions and roles are being reduced, there will be a limit to the MSIP's endeavor for the advancement of science technology and the ICT promotion and convergence. The establishment of the Agency, together with the formation of 'IT Strategy Committee', is considered to be one of the core items of the Special Act on ICT. MSIP originally planned to integrate the ICT R&D functions scattered across many governmental organizations, including Korea Communications Agency (KCA), KEIT and Korea Creative Contents Agency (KOCCA), into the Agency to separate the national ICT R&D from private R&D and streamline the process of 'discovery-selection-evaluation-commercialization'. The analytical results in this study are supposed to the establishment of efficient ICT governance systems as the practical strategies to actively cope with the changes of ICT convergence environment. It is also expected to the revision on the special ICT Act in the ICT budget and governance. Therefore, MSIP should cover research and development (R&D) as well as major ICT promotion functions to a creative economy.

Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Nyang, Dae-Hun;Chang, Beom-Hwan;Lee, Dong-Hoon;Lim, Jong-In
    • ETRI Journal
    • /
    • v.34 no.2
    • /
    • pp.235-244
    • /
    • 2012
  • An identity-based strong designated verifier signature scheme provides restricted verifiability only for a verifier designated by a signer and proper privacy for the signer. In this paper, we show that strong designated verifier signature schemes do not satisfy the self-unverifiability requirement in the sense that not only exposure of the verifier's secret key but also of the signer's secret key enables an attacker to verify signatures, which should have been the exclusive right of the verifier. We also present a generic method to construct a strong identity-based designated verifier signature scheme with self-unverifiability from identity-based key encapsulation and identity-based key sharing schemes. We prove that a scheme constructed from our method achieves unforgeability, non-transferability, and self-unverifiability if the two underlying components are secure. To show the advantage of our method, we present an example that outputs short signatures and we analyze its performance.

A Study on Gap between Government's Institutions and Public People based on Ontology Inference about ICT Future Technology

  • Kim, Su-kyoung;Kim, Sung-en;Cho, Ill-gu;Ahn, Kee-hong
    • International Journal of Contents
    • /
    • v.13 no.4
    • /
    • pp.47-62
    • /
    • 2017
  • This paper analyzes how much the gap existed between the public group and expert group using future issues and future core technologies that are announced in government institutions based on ontology. We calculated gap with two groups' point of view, one is expert groups' ideas that are based on future hopeful technologies documents, and another is public people ideas that are based on documents of contest that is hosted by 'Ministry of Science, ICT and Future Planning (MSIP)', and 'Institute for Information & communications Technology Promotion (IITP)'. For calculating these, we suggested SDGM model. In the case of ETRI Meta-trend ICT Field, there is a little gap between expert group and public group, and another case that is XT (ETRI determined future technologies excluding ICT field) Field, the gap is increasing annually. Moreover, in the case of all ETRI Meta trend, the gap is bigger than ICT and XT field. We analyzed, also, KEIT's future issues for generalizing this model. The gap existed between two groups. Utilizing SDGM model of this paper, people can interpret easily how much the gap exists between future technologies and issues that are announced in institutions.

Research on Security Threats for SMEs by Workplace in the COVID-19 Environment

  • Kim, Woo-Su;Lim, Heon-Wook
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.307-313
    • /
    • 2022
  • Although telecommuting of SMEs has been activated due to the COVID-19 phenomenon, the security model for this is insufficient. Accordingly, the study was divided into threats centered on smartphones and threats centered on smartphone users. As a result of the study, one-third of SMEs are working from home. At this company with 100 employees, more than 50% of them work from home.and In the metal, machinery and chemical industries with factories, 20% of them work from home. As a result of analyzing the correlation between telecommuting according to the presence or absence of a factory, the correlation coefficient (r=-.385) has a clear linear relationship. And, as a result of the regression analysis, the R-squared value was 0.148, so companies with factories are highly related to telecommuting. In other words, we found that SMEs with factories do not want to work from home. In addition, as a result of analyzing the level of security threats, there were great concerns about theft, hacking, and phone taking during remote work. As limitations of the study, there were difficulties in selecting SMEs from the population in a non-face-to-face work environment, and there were limitations in the questionnaire items for deriving a non-face-to-face work environment.

Study on the audience effect of advertisements of IoT products across different levels of sensory innovativeness (감각적 혁신성향에 따른 사물인터넷(IoT) 제품 광고의 수용자 효과에 관한 연구)

  • Cha, Hyeyoung;Youm, Dongsup
    • Journal of Digital Convergence
    • /
    • v.16 no.5
    • /
    • pp.145-152
    • /
    • 2018
  • This study was conducted to review whether there is a difference in the audience effect of advertisements of IoT products across different levels of sensory innovativeness. For the study, a total of 128 male and female university students and three advertisements of IoT products were selected. The study findings show that consumers with a higher tendency in purusing sensory innovativeness are more likely to rate more positively the perceived usefulness of the product and the attitude towards the product as shown in the advertisement. This finding is meaningful in that it was concluded from an empirical study at a time when studies on advertisements of IoT products are lacking. The study is also expected to provide beneficial insights into effective execution of advertisements of new technologies and establishment of marketing strategies. Follow-up studies that take into account a wider range of variables representing sensory innovativeness in consumers are suggested.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

A Study on the Applicability of Anonymous Authentication Schemes for Fine-Grained Privacy Protection (개인정보보호를 위한 익명 인증 기법 도입 방안 연구)

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Shim, Mi-Na;Jeong, Dae-Kyeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.195-208
    • /
    • 2010
  • As information communication technologies have highly advanced, a large amount of user sensitive information can be easily collected and unexpectedly distributed. For user-friendly services, a service provider requires and processes more user information. However known privacy protection models take on a passive attitude toward user information protection and often involve serious weaknesses. In reality, information exposure by unauthorised access and mistakenly disclosure occurs frequently. In this paper, we study on the applicability of anonymous authentication services for fine-grained user privacy protection. We analyze authentication schemes and classify them according to the level of privacy newly defined in this paper. In addition, we identify security requirements that a privacy protection scheme based on anonymous authentication can achieve within legal boundary.

Artificial intelligence-based chatbot system for use in RCMS (RCMS에 활용하기 위한 인공지능 기반 챗봇 시스템)

  • Kim, Yongkuk;Kim, Sujin;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.877-883
    • /
    • 2021
  • Artificial intelligence technology is widely used in industrial and smart home fields such as manufacturing robots, artificial intelligence speakers, and robot vacuum cleaners. In this paper, we designed and implemented a 1:1 chatbot system based on artificial intelligence for use in RCMS (Real-time Cash Management System). The RCMS chatbot implemented in this paper was constructed with a total of 210 query scenarios in nine areas, including research expenses and system usage, based on 13,500 questions and answers from existing online bulletin boards. The chatbot is expected to solve the problem of insufficient number of counselors and to increase user satisfaction by responding to the researcher's inquiries after working hours, and the recommendation service for the cost of use, which had the most inquiries from researchers, reduces the number of consultations. It is expected to improve the quality of answers to other counseling inquiries.