• Title/Summary/Keyword: Logical security

Search Result 115, Processing Time 0.027 seconds

An Identity-based Ring Signcryption Scheme: Evaluation for Wireless Sensor Networks

  • Sharma, Gaurav;Bala, Suman;Verma, Anil K.
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.2
    • /
    • pp.57-66
    • /
    • 2013
  • Wireless Sensor Networks consist of small, inexpensive, low-powered sensor nodes that communicate with each other. To achieve a low communication cost in a resource constrained network, a novel concept of signcryption has been applied for secure communication. Signcryption enables a user to perform a digital signature for providing authenticity and public key encryption for providing message confidentiality simultaneously in a single logical step with a lower cost than that of the sign-then-encrypt approach. Ring signcryption maintains the signer's privacy, which is lacking in normal signcryption schemes. Signcryption can provide confidentiality and authenticity without revealing the user's identity of the ring. This paper presents the security notions and an evaluation of an ID-based ring signcryption scheme for wireless sensor networks. The scheme has been proven to be better than the existing schemes. The proposed scheme was found to be secure against adaptive chosen ciphertext ring attacks (IND-IDRSC-CCA2) and secure against an existential forgery for adaptive chosen message attacks (EF-IDRSC-ACMA). The proposed scheme was found to be more efficient than scheme for Wireless Sensor Networks reported by Qi. et al. based on the running time and energy consumption.

  • PDF

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

A Study of Low Back Pain Patient's Satisfaction with Physical Therapist in Seoul and Uijongbu City (요통환자의 물리치료사 만족도에 대한 조사 -서울 및 의정부 시 일부 병, 의원에 내원하는 외래, 재진 환자를 중심으로-)

  • Oh Seung-Kil
    • The Journal of Korean Physical Therapy
    • /
    • v.9 no.1
    • /
    • pp.37-50
    • /
    • 1997
  • Low back Pain(LBP) is a common problem, and the resulting disability frequently contains nonorganic, psycho-logical and social elements that are difficult for the physical therapists to manage. The physical therapist-patient relationship is the most important factors in the management of low back pain as chronic disease. The purpose of this study was to evaluate and to identify factors that had influenced low, back pain patients satisfaction with physical therapist The subjects of this study were 223 out-patients(116 males and 107 females) who had been visited to physical therapy room of medical institutions in Seoul and Uijgngbu city. They were examined by the questionaire of Dimatteo and Hays which was amended to serve the purpose of this study by author. The collected data was analyzed by ANOVA according to the purpose of this study. There was no difference with statistic value in LBP patient's satisfaction according to occupation, sex, schooling, religion, marital status, medical security, duration of disease, the tine required, recurrence, but was a difference according to age, income, period of treatment, cost, diagnosis, waiting time, the number of physical therpy's sort, sex ane age of physical therapists (p<.05). LBP patients was satisfied with physical therapist's communicative behavior, but was dissatisfied with physical therapist's competence.

  • PDF

Logical Design of Video Security System over Internet (인터넷 화상 방범 시스템 논리 설계)

  • 장명수;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.439-447
    • /
    • 2000
  • 현재 방범 시스템은 적외선, 초음파 둥의 I-지기의 신호에 의존하여 외부로부터의 침입을 감지하고 있으나 방범 시스템이 설치된 환경에 따라 이런 감지기의 정확성이 달라지므로 오 동작의 가능성을 포함하며 신뢰성이 저하되고 있다. 실제 외부로부터의 침입을 확인하기 위해서는 화상과 음성 그리고 감지기의 신호를 조합하여 정확한 판단이 가능하지만 화상을 전송하기 위해서는 고가의 회선비용을 부담해야만 한다. 하지만 인터넷을 이용하여 화상을 전송하는 제품들이 출시되면서 Real-time 화상감시가 가능해졌다. 이런 화상감시 제품들은 Netscape, MS Explorer와 같은 표준 Web Browser을 통해 Real-time으르 전세계 어디서나 화상을 감시할 수 있다는 장점을 가지고 있다. 적용분야는 호텔주변, 관광지의 여러 명소에 설치 후 홈페이지에 링크시켜 홍보용으로 사용하거나 공장 주요시설, 교통상황 둥의 중요지역의 Monitoring에 활용하고 있다. 그러나 방범 시스템에 적용하기에는 감지기의 확장성, 방범 관제센터 시스템과의 연동이 부족하여 본 고에서는 현재 출시된 화상감시 시스템과 기존 방범시스템을 Integration하여 방범의 최종 목표인 화상과 감지기 신호의 조합에 따른 정확한 방범시스템의 구현에 대해서 기술하고자 한다. 화상방범시스템의 구현은 크게 두 가지로 나누어지며 첫째는 화상감시 시스템과 방범시스템간의 통신을 설계하는 것으로 기존 대부분의 방범시스템이 사용하는 RS-485 통신 프로토콜을 재설계하여 화상감시 시스템과의 통신을 설계하였으며 둘째는 화상감시시스템과 관제센터 시스템간의 통신을 설계하는 것으로 현재 화상감시 시스템의 TCP/IP 프로토콜을 이용한 socket 통신으로 관제센터 시스템과의 실시간 데이터 전송을 가능하게 했다. 이 시스템을 활용할 경우 고객들은 반드시 관제센터시스템의 인증을 거쳐야 하므로 고객의 DataBase를 축적할수 있으며 이 정보를 활용하여 인터넷 화상방범 서비스 Potal Site구축이 가능하다는 장점이 있다.

  • PDF

A Study on Standard Classification of Disaster•Life Safety Accident Criteria

  • Park, Hyung-Joo
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.163-171
    • /
    • 2019
  • Purpose: Purpose: The National Safety Experience Center Establishment and Reinforcement Project Management Guidelines, established to build a national safety experience center that is central to practicing education on disasters and safety accidents, requires that appropriate experience training programs be in place. However, due to the lack of classification grounds for the six areas of disaster•safety accidents presented by the Ministry of Public Administration and Security, and the mortality statistics necessary for establishing sectors have accumulated for over a decade, they are based on this. Our purpose is to standardize classification of sectors belonging to each area. Methods: We will divide disaster•safety accidents into 6 areas by three steps, and the grounds for 6 areas of accidents are presented. The 15 external causes other than the disease since 2009 has been proposed by The National Statistical Office. Therefore on the basis of these causes, various sectors belonging to each area are classified. Results: We will divide all disaster•safety accidents into six areas through three logical separation stages, and the areas were systematically classified based on the 15 factors of death. In conclusion, we present the grounds for the classification criteria in the six areas, the transportation accident disaster area in three areas, the social infrastructure system area in four areas, the crime accident disaster area in four areas, the life safety accident area in four areas, we set up all disaster•safety accidents in six areas and finally standardize total 25 areas.

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Logical Configuration of Livelihood Benefit Standard for the Institutionalized Recipients under the Standard Median Income Scheme and the Level of Benefit by the Adjusted Equivalence Scale of the Institution (기준중위소득 방식을 반영한 보장시설생계급여 지급기준 논리 구성과 시설균등화지수 합리화에 따른 급여수준)

  • Jo, Joon-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.660-670
    • /
    • 2019
  • The purpose of this study is to elaborate the logical configuration of livelihood benefits for the institutionalized recipients under the renewed custom-tailored benefit system of National Basic Livelihood Security System(NBLSS) and to present appropriate level of benefits in terms of coherency of the system. In July 2015, the NBLSS was reformed to adopt a relative level of benefit standard for the general recipients according to certain amount of ratio of standard median income. However, the benefit for the institutionalized recipients was still based on the cost of necessities of absolute poverty level. It is at this juncture that this study suggests livelihood benefits for the institutionalized recipients reflect standard median income to comply with the reform of the NBLSS. To this end, this study firstly derives basic living items for the institutionalized recipients based on the literature review and FGI. Secondly, it calculates the reflection ratio of livelihood benefits utilizing Household Trend Survey's consumption data under 40%. Finally, it applies equivalence scale of households to adjust the under-represented scale for large size institutions. To continue the reflection ratio method, it is necessary to review the consumption trends and the stability of the reflection ratio periodically.

Address Auto-Resolution Network System for Neutralizing ARP-Based Attacks (ARP 기반 공격의 무력화를 위한 주소 자동 결정 네트워크 시스템)

  • Jang, RhongHo;Lee, KyungHee;Nyang, DaeHun;Youm, HeungYoul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.4
    • /
    • pp.203-210
    • /
    • 2017
  • Address resolution protocol (ARP) is used for binding a logical address to a physical address in many network technologies. However, since ARP is an stateless protocol, it always abused for performing ARP-based attacks. Researchers presented many technologies to improve ARP protocol, but most of them require a high implementation cost or scarify the network performance for improving security of ARP protocol. In this paper, we present an address auto-resoultion (AAR) network system to neutralize the ARP-based attacks. The AAR turns off the communication function of ARP messages(e.g. request and reply), but does not disable the ARP table. In our system, the MAC address of destination was designed to be derived from destination IP address so that the ARP table can be managed statically without prior knowledge (e.g., IP and MAC address pairs). In general, the AAR is safe from the ARP-based attacks since it disables the ARP messages and saves network traffics due to so.

A Study on the Necessity of Limitation for Legal Liability in Marine Accidents (해양사고에 있어서 책임귀속의 제한 필요성에 관한 연구)

  • Ji, Sang-Won
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.251-255
    • /
    • 2010
  • A marine accident is caused various legal liability such as compensation for damages on civil law, responsibility on the Criminal Code and administrative sanctions. The results occurred by any acts is not connected directly to the legal responsibility. As a prior condition for these legal liabilities, it is required the causation between the act caused and the occurrence of the effect. It is very difficult to find out the cause in marine accidents, because of trouble of a proof security, the place occurred, time difference between accident and investigation point of time etc.. However, finding out the correct cause is an element important to prevent similar accident and to determine the liability reverted. The logical concept of the causation is not limited, but there is early necessity to limit it in the liability reverted. Therefore, this study aims to suggest reasonable standard to determine liability reverted in marine accidents.