• Title/Summary/Keyword: Key Management Protocol

Search Result 299, Processing Time 0.024 seconds

Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information (방송프로그램 보호신호에 기반한 지상파 방송프로그램 보호 시스템)

  • Choo, Hyon-Gon;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.192-204
    • /
    • 2010
  • As illegal distribution of the terrestial DTV broadcast program occurs very frequently in on-line, the needs to protect broadcast program have increased. In this paper, a new approach to implement a system for terrestial DTV broadcast program protection based on program protection information(PPI) is proposed. In our approach, the broadcast program is recorded with encryption according to redistribution condition of the PPI and packaged into a file with key information and PPI together. And we also define a set of domain protocol for supporting user fair-use of broadcast program. In the proposed system, copy control can also be provided by process of home domain management. Implementation results show that our system can protect broadcast programs with efficiency and can support conditional distribution within home domain in order to satisfy user fair-use.

Low-Latency Handover Scheme Using Exponential Smoothing Method in WiBro Networks (와이브로 망에서 지수평활법을 이용한 핸드오버 지연 단축 기법)

  • Pyo, Se-Hwan;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.3
    • /
    • pp.91-99
    • /
    • 2009
  • Development of high-speed Internet services and the increased supply of mobile devices have become the key factor for the acceleration of ubiquitous technology. WiBro system, formed with lP backbone network, is a MBWA technology which provides high-speed multimedia service in a possibly broader coverage than Wireless LAN can offer. Wireless telecommunication environment needs not only mobility support in Layer 2 but also mobility management protocol in Layer 3 and has to minimize handover latency to provide seamless mobile services. In this paper, we propose a fast cross-layer handover scheme based on signal strength prediction in WiBro environment. The signal strength is measured at regular intervals and future value of the strength is predicted by Exponential Smoothing Method. With the help of the prediction, layer-3 handover activities are able to occur prior to layer-2 handover, and therefore, total handover latency is reduced. Simulation results demonstrate that the proposed scheme predicts that future signal level accurately and reduces the total handover latency.

  • PDF

Design of short-term forecasting model of distributed generation power for wind power (풍력 발전을 위한 분산형 전원전력의 단기예측 모델 설계)

  • Song, Jae-Ju;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.211-218
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

Comparative Review of Pharmacological Treatment Guidelines for Bipolar Disorder (양극성 장애의 약물치료 가이드라인 비교)

  • Seoyeon Chin;Hyoyoung Kim;Yesul Kim;;Bo-young Kwon;Boyoon Choi;Bobae Lee;Jiye Lee;Chae-Eun Kwon;Yeongdo Mun;Kaveesha Fernando;Ji Hyun Park
    • Korean Journal of Clinical Pharmacy
    • /
    • v.33 no.3
    • /
    • pp.153-167
    • /
    • 2023
  • Objective: Bipolar disorder displays a spectrum of manifestations, including manic, hypomanic, depressive, mixed, psychotic, and atypical episodes, contributing to its chronic nature and association with heightened suicide risk. Creating effective pharmacotherapy guidelines is crucial for managing bipolar disorder and reducing its prevalence. Treatment algorithms grounded in science have improved symptom management, but variations in recommended medications arise from research differences, healthcare policies, and cultural nuances globally. Methods: This study compares Korea's bipolar disorder treatment algorithm with guidelines from the UK, Australia, and an international association. The aim is to uncover disparities in key recommended medications and their underlying factors. Differences in CYP450 genotypes affecting drug metabolism contribute to distinct recommended medications. Variances also stem from diverse guideline development approaches-expert consensus versus metaanalysis results-forming the primary differences between Korea and other countries. Results: Discrepancies remain in international guidelines relying on meta-analyses due to timing and utilized studies. Drug approval speeds further impact medication selection. However, limited high-quality research results are the main cause of guideline variations, hampering consistent treatment conclusions. Conclusion: Korea's unique Delphi-based treatment algorithm stands out. To improve evidence-based recommendations, large-scale studies assessing bipolar disorder treatments for the Korean population are necessary. This foundation will ensure future recommendations are rooted in scientific evidence.

Implementation of Real Time P2P Framework for Spatial Data Sharing between Mobile Devices using SIP (모바일 기기 간의 SIP기반 실시간 공간정보 공유 프레임워크 구현)

  • Park, Key-Ho;Jung, Jae-Gon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.65-72
    • /
    • 2008
  • Mobile Collaboration is an enabling technology that makes users share information between mobile devices and various Mobile P2P platforms have been designed and implemented for it. There are, however, few research papers on application of SIP protocol to spatial data sharing on mobile devices. In this paper, SIP based real time sharing framework is proposed to compose a mobile P2P platform on which spatial data can be trans(erred. A new protocol based on WKT and WKB is defined to send and receive spatial objects with SIP MESSAGE method. Base maps such as digital maps and parcel maps can be provided by a map server that is integrated with SIP server after a new SIP session established and client agents are registered. The framework proposed based onSIP enables users to transfer spatial data such as maps and satellite images directly between mobile devices during VoIP based voice call and therefore, mobile applications can be applied in various domains such asforest management and national defense.

  • PDF

Risk Assessment Tools for Invasive Alien Species in Japan and Europe (일본과 유럽의 침입외래생물 생태계위해성평가 기법)

  • Kil, Jihyon;Mun, Saeromi;Kim, Chang-Gi
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.3
    • /
    • pp.191-197
    • /
    • 2015
  • Invasive alien species are considered to be one of the main factors that cause biodiversity loss. Establishment of management strategies through continuous monitoring and risk assessment is a key element for invasive alien species management policy. In the present study, we introduce examples of ecological risk assessment tools developed in Japan, Germany-Austria and Belgium. Invasive alien species have been designated in Japan based on the assessment of risks to ecosystems, human health and primary industry. German-Austrian Black List Information System categorized alien species into Black List, White List and Grey List according to their risks to biodiversity. In the Harmonia Information System developed in Belgium, invasiveness, adverse impacts on native species and ecosystem functions and invasion stages were assessed and alien species were categorized into Black List, Watch List and Alert List. These international risk assessment tools may be helpful to improve our national risk assessment protocol for the prioritization of invasive alien species management.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

An Assessment of Flood Mitigation Policies Integrated in Local Comprehensive Plans: The Case of Florida in the United States (지자체 도시기본계획의 홍수예방정책 평가: 미국 플로리다 사례를 중심으로)

  • Kang, Jung Eun
    • Journal of Environmental Policy
    • /
    • v.11 no.4
    • /
    • pp.59-84
    • /
    • 2012
  • 'Planning researchers' believe that losses from floods can be reduced if governments address this issue and adopt appropriate policies in their plan. As a starting point for examining this idea, this research assessed the ability of local government to incorporate flood mitigation policies in their local comprehensive plans using plan quality evaluation methodology. This study analyzed 53 local comprehensive plans in Florida against the protocol developed by including key flood mitigation policies. While flood mitigation through land use management tools, such as permitted land use in floodplain areas and wetland permit, gained widespread acceptance at the local level in Florida, incentive based tools/taxing tools and acquisition tools were rarely adopted. Study results show that 53 local plans in the sample received a mean score for total flood mitigation policy quality of 38.55, which represents 35.69 % of the total possible points. These findings indicate that there is still considerable room for improvement by local governments on flood issues. The scores of local plans varied widely, with coastal communities receiving significantly higher scores than non-coastal communities. Because the concept of the plan quality and its methodology offer an objective and straightforward tool for studying plan quality and guiding plan preparation, they can be applied to various environmental and hazard issues in Korea.

  • PDF