• Title/Summary/Keyword: Network Resilience

Search Result 116, Processing Time 0.03 seconds

Sensor network key establishment mechanism depending on depending information (배치정보를 이용한 클러스터 기반 센서 네트워크 키 설정 메커니즘)

  • Doh In-Shil;Chae Ki-Joon;Kim Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.195-202
    • /
    • 2006
  • For applying sensor networking technology for our daily life, security service is essential, and pairwise key establishment is the key point for security. In this paper, we propose fairwise key establishment mechanism for secure coumunication in sensor networks. In the mechanism, we cluster the network field before deployment and predistribute key materials to normal sensor nodes and clusterheads. For clusterheads, more key materials are predistributed, and after deployment, sensor nodes which need to establish pairwise keys with other sensor nodes in different clusters make request for related key materials to their own clusterheads. Our proposal reduces the memory requirements for normal sensor nodes by distributing more information to clusterheads, and it raises the security level and resilience against node captures. In addition, it guarantees perfect pairwise key establishments for every pair of neighboring nodes and provides efficient and secure sensor communications.

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

Formation of a Competitive Paradigm of Ensuring Economic Security of Industrial Enterprises in the Conditions of Formation of Circular Economy

  • Pohrebniak, Anna;Tkachenko, Tetiana;Arefieva, Olena;Oksana, Karpenko;Chub, Anton
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.118-124
    • /
    • 2021
  • The article examines the formation of a competitive paradigm of economic security of industrial enterprises in the formation of a circular economy. The basic laws of industrial enterprises are formed, which determined the characteristics of competitive positions and threats. The basic competitive concepts and their application at maintenance of economic safety of the industrial enterprises in the conditions of formation of circular economy are described. Thus, the technological approach to the formation of a competitive paradigm is based on production technologies, opportunities for technological modernization and development of infrastructure and intellectual competencies. The institutional concept reveals the regulatory mechanisms for ensuring competitiveness through the protectionism of national industrial enterprises, standardization and regulation of market imbalances. The innovation-investment approach within the competitive paradigm is also manifested in the creation of competitive advantages due to the presence of active innovative developments and their commercialization, knowledge and competencies of staff, capitalization of intelligence and communications, constant updating of infrastructure and technologies. Collectively, innovation and investment effects on the level of economic security allow industrial enterprises to ensure resilience to increasing competition, the emergence of new market challenges in the formation of a circular economy. A strategic approach to the application of a competitive paradigm to ensure the economic security of industrial enterprises allows you to justify the prospects for development and design behavioral models to predict and assess potential threats. The concept of system management is based on the complexity of threat analysis, the integrity of the economic security system, system-forming functions and patterns of implementation of industrial development tasks in the formation of a circular economy. The application of the described concepts is formalized by the authors through the definition of the basic patterns, directions and characteristics of their impact on the elements of the security system of industrial enterprises in the formation of a circular economy.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

A Hint of Crisis Resilience of Industrial Agglomeration: The Production Networks and Spatial Characteristics of Dongdaemun Fashion Industry (산업집적지의 위기와 회복 가능성: 동대문 패션산업 생산네트워크와 공간적 특성)

  • Chung, SunWha
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.23 no.1
    • /
    • pp.18-34
    • /
    • 2020
  • This study aims to investigate Dongdaemun fashion industry once thrived in Seoul, now in a rapid decline. For this purpose, three research themes are put forward. That is, to fix the boundary of Dongdaemun fashion industry, to analyze the characteristics of its value chain, production network and industrial agglomeration, and to search for the cause of its decline and to suggest political solutions against it. The following is the findings of this study. Firstly, Dongdaemun fashion industry has spreaded out over the last six decades and now its boundary can be marked within a radius of 10 kilometers of Dongdaemun Market in northeastern Seoul. Secondly, Dongdaemun fashion industry has a buyer-driven chain and star production network, and therefore can be assumed that it is spatially segmented industrial agglomeration. Lastly, its rapid decline is directly from the shrink of market demand on Dondaemun fashion, and inherently in the topological structure of its star production network. Thus the feasible political solutions can be found in that direction. Consequently, these results have academic implications for clearing up some previous studies' misunderstandings and getting over one of the long-criticized research biases that pervades in industrial agglomeration theory, primarily focusing on the successful regions.

Positive Psychological Capital, Start-Up Intention, Start-Up Behavior Option Network Analysis (네일아트 자격증 학습자의 긍정심리자본, 창업의도, 창업행동 간의 연결망 분석)

  • Seo, Ran-Sug
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.1
    • /
    • pp.139-146
    • /
    • 2021
  • This study studied the network between positive psychology capital, intention of start-up, and start-up behavior for learners who are willing to start a business. The research targets were intended to study the impact of the connection relationship between each variable, targeting nail art certification learners who are willing to start their own businesses. For this study, the measurement variables of positive psychology capital, intention of start-up, and start-up behavior were set, and the collected data were analyzed for connection-centeredness and eigenvector after data collection. The findings are as follows. First, some variables affecting the intention of start-up showed optimism, resilience and hope of positive psychology capital. Second, the intention to start a business was shown to have a significant impact on the behavior of start-ups, which, unlike the preceding study, appeared to be almost outside the network structure, showing that the behavior of start-ups was not significantly affected by other variables. Third, it is important to increase self-efficacy in positive psychological capital in order to increase the behavior of start-ups. Fourth, the analysis of the eigenvactor among positive psychology capital, intention of start-up, and start-up behavior showed optimism as some of the most central variables. In other words, prospective start-ups were found to be aware of the hardships and expected positive results in the future. The implications of this study, along with the intention and behavior of prospective entrepreneurs, are important factors in positive psychology capital, and suggest the importance of various educational programs that can be enhanced by positive psychology capital in start-up education or training programs and what should be taught. In addition, this study analyzed the network by approaching it from the perspective of positive psychology capital of prospective entrepreneurs in order to enhance the effectiveness of support programs for start-ups by the government, public institutions or universities in the future.

Analyzing Research Themes and Trends in Living Lab Studies: An Exploratory Approach Using LDA Topic Modeling and Semantic Network Analysis (리빙랩에 관한 연구 주제 및 동향 분석: LDA 토픽모델링과 의미 연결망 분석을 통한 탐색적 접근)

  • Ki-youn Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.5
    • /
    • pp.171-182
    • /
    • 2024
  • This study aims to explore the scholarly advancements and research trends of living labs, highlighting their role as a strategic approach for addressing community challenges and driving innovation in public services through a systematic investigation of domestic academic research. A total of 510 research papers published between 2012 and 2024 were analyzed, focusing on unstructured data such as titles, abstracts, and keywords. Using text mining techniques, the underlying themes were systematically extracted and refined through Latent Dirichlet Allocation(LDA) topic modeling and semantic network analysis, leading to the identification of five core themes: 'Smart cities and participatory innovation', 'Community welfare and social innovation', 'User-driven field-Based innovation', 'Educational innovation linked to community issues', and 'Enhancement of quality of life, culture, and youth welfare'. Each theme was named based on high-frequency terms within topic clusters and further verified through a detailed literature review, ensuring the thematic categories accurately reflect the focus of the papers. Semantic network analysis further revealed the structural interconnections between keywords, adding depth to the understanding of their unique characteristics. The findings present a comprehensive view of the research landscape in living lab studies, highlighting thematic convergence and divergence across various scholarly focuses. This study provides actionable insights for academics and policymakers, suggesting that living labs can serve as a strategic framework for solving regional challenges, enhancing community resilience, and integrating digital solutions into public services and lays the foundation for future research and policy initiatives aimed at leveraging living labs for sustainable community innovation.

A Hybrid Scheme of the Transport Error Control for SVC Video Streaming (SVC 비디오 스트리밍을 위한 복합형 전송 오류 제어 기법)

  • Seo, Kwang-Deok;Moon, Chul-Wook;Jung, Soon-Heung;Kim, Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.34-42
    • /
    • 2009
  • In this paper, we propose a practical hybrid transport error control scheme to provide SVC video streaming service over error-prone IP networks. Many error control mechanisms for various video coding standards have been proposed in the literature. However, there is little research result which can be practically applicable to the multilayered coding structure of SVC(the scalable extension of H.264/AVC). We present a new hybrid transport error control scheme that efficiently combines layered Forward Error Correction(FEC) and Automatic Repeat Request(ARQ) for better packet-loss resilience. In the proposed hybrid error control, we adopt ACK-based ARQ instead of NACK-based ARQ to maximize throughput which is the amount of effective data packets delivered over a physical link per time unit. In order to prove the effectiveness of the proposed hybrid error control scheme, we adopt NIST-Net network emulator which is a general-purpose tool for emulating performance dynamics in IP networks. It is shown by simulations over the NIST-Net that the proposed hybrid error control scheme shows improved packet-loss resilience even with much less number of overhead packets compared to various conventional error control schemes.

The improvement measures for youth activity policies in the intelligent information society: focusing on programs, equipment and facility operation and leaders (지능정보사회에서의 청소년 활동정책 개선방안: 프로그램, 설비·시설, 지도자를 중심으로)

  • Lee, Kyeong-Sang;Lee, Chang-Ho;Kim, Min
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.62-84
    • /
    • 2019
  • The purpose of this study is to present improvement measures for youth activity policies that can change the youth activity programs, equipment and facility operation and leaders in order to cultivate youth capacities suitable for the intelligent information society. For this purpose, we conducted a literature study on the direction of youth activity policy changes with the forecasted social changes in the intelligence information society and an online survey and expert opinion surveys to identify how youth activity facilities are currently coping with the changes and to explore measures to improve youth activity policies. The research identified 17 policy tasks - 9 tasks for the program area, including 1) increase of intelligent information technology related programs, 2) increase of contents related to career resilience in career experience and training programs, and 3) systematic introduction and diffusion of STEAM and Maker education programs; 5 tasks for the equipment and facility operation area, including 1) strengthening cooperation network with external organizations related to the intelligent information technologies, 2) expansion of AR and VR technology application in activity program development, improvement and operation, and 3) big data building in the field of youth activities; and 3 tasks for the leaders area, including 1) extension of information provision on the intelligent information society to the leaders of the activity facilities, and 2) development of job models related to the intelligent information society and job training.