• Title/Summary/Keyword: Network Security

Search Result 5,849, Processing Time 0.034 seconds

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

Dynamic States Consideration for Next Hop Nodes Selection Method to Improve Energy Efficiency in LEAP based Wireless Sensor Networks (LEAP기반의 무선 센서 네트워크에서 가변적 상태를 고려한 에너지 효율적 다음 홉 노드 선택 기법)

  • Nam, Su-Man;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.558-564
    • /
    • 2013
  • Wireless sensor networks (WSNs) contain limited energy resources and are left in open environments. Since these sensor nodes are self-operated, attacks such as sinkhole attacks are possible as they can be compromised by an adversary. The sinkhole attack may cause to change initially constructed routing paths, and capture of significant information at the compromised node. A localized encryption and authentication protocol (LEAP) has been proposed to authenticate packets and node states by using four types of keys against the sinkhole attack. Even though this novel approach can securely transmits the packets to a base station, the packets are forwarded along the constructed paths without checking the next hop node states. In this paper, we propose the next hop node selection method to cater this problem. Our proposed method evaluates the next hop node considering three factors (i.e., remaining energy level, number of shared keys, and number of filtered false packets). When the suitability criterion for next hop node selection is satisfied against a fix threshold value, the packet is forwarded to the next hop node. We aim to enhance energy efficiency and a detour of attacked areas to be effectively selected Experimental results demonstrate validity of the proposed method with up to 6% energy saving against the sinkhole attack as compared to the LEAP.

Comparative Study of the Effects of the Intermodal Freight Transport Policies (인터모달 추진 정책과 효과에 관한 비교연구)

  • Woo, Jung-Wouk
    • Journal of Distribution Science
    • /
    • v.13 no.10
    • /
    • pp.123-133
    • /
    • 2015
  • Purpose - The Korean government has devised intermodal transportation policies and granted subsidies to shippers and logistics companies that made a conversion of transportation means through the policies. This provides support by expanding the complex uniform railroad transportation and overhauling the deteriorated railroad facilities. As for 2013, however, the freight transportation percentage of railroad was 4.5% in tons and 8.5% in ton kilometers. Meanwhile, since the 1990s, developed countries such as the U.S. and Europe have been trying to expand intermodal freight transport with a legal and institutional support to build a logistics system corresponding with social and economic environmental changes. In this study, I set out to examine the effects of the intermodal freight transport policies in the EU and the U.S., and to explore the direction of setting up a rail intermodal transport system in South Korea. Research design, data, and methodology - The paper used a qualitative research methodology through the literature review. First, was an overview of Intermodal transportation in the EU, U.S. and UN. Second, it describes the development of transport in Europe and the U.S. with particular emphasis on intermodal freight transport. Third, it explores the direction of setting up a intermodal freight transport in South Korea. The last section contains concluding remarks. Results - As for the EU, it has been promoting integration between transport and intermodal logistics network designs while utilizing ITS or ICT and supports for rail freight intermodal by giving reduction to a facilities fee or subsidizing for rail freight in order to minimize the cost of external due to freight transport. On the other hand, as for the U.S., it has been made up of an industrial-led operating project and has been promoting it to improve accessibility between intermodal hubs and cargo terminals through intermodal corridor program, and an intermodal cargo hub access corridor projects, etc. Moreover, it has tried to construct intermodal transport system using ITS or ICT and to remove Barrier. As a result, in these countries, the proportion of intermodal freight transport is going to be the second significant transport compared with rail and maritime transport. An Effective rail intermodal transport system is needed in South Korea, as seen in the case of these countries. In order to achieve this object, the following points are required to establish radical infrastructure policy; diversify investment financing measures taken under public-private partnerships, legal responsibilities, improvement of utilization of existing facilities to connect the railway terminal and truck terminal, and enhancement service competitiveness through providing cargo tracking and security information that combines the ITS and ICT. Conclusions - This study will be used as a basis for policy and support for intermodal freight transport in South Korea. In the future, it is also necessary to examine from the perspective of the shipper companies using the rail intermodal transport, ie, recognition of shipper, needed institutional supports, and transportation demand forecasting and cost-effective analysis of the railway infrastructure systems improvement.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

Implication Measures between Strategic Environmental Impact Assessment and Sustainable Development Indicators (전략환경영향평가와 지속가능한 발전 지표의 연계방안)

  • Hong, Sang-Pyo
    • Journal of Environmental Impact Assessment
    • /
    • v.25 no.1
    • /
    • pp.63-76
    • /
    • 2016
  • In 2015, Summits of State and Government at United Nations General Assembly agreed to set the world on a path towards Sustainable Development(SD) through the adoption of the 2030 Agenda. 2030 Agenda adopts 17 Sustainable Development Gooals(SDG) to achieve 3 pillars of social security, economic efficiency and environmental integrity. Sustainable Development Indicators(SDI) which are suggested by UN SDSN(United Nations Sustainable Development Solutions Network), have been developed for measuring SDG implementation, by which Sustainability Assessment(SA) can be accomplished to check through more holistic approaches to poverty alleviation, social inclusion and environmental management. In Korea, Strategic Environmental Impact Assessment(SEIA) has been applied to PPP(policy, plan, program) by 'Ministry of Environment', whereas 'National Land Planning Assessment(NLPA) which is one sort of SEA has been implemented to evaluate PPP of Ministry of Land, Infrastructure and Transport'. Although SEIA and NLPA have been utilized as decision-making support tools for stakeholders including high authorities, the reference criteria of these institutions are not considered as convincible and communicable. Evaluation criteria of alternatives which are core principles for SEIA and NLPA seem so ambiguous and unscientific. Through incorporation of SDI into SEIA, a convenient, quick and credible diagnosis of the key dimensions of SD comprising social equity, economic development and environmental management, can help develop a shared understanding of priorities of implementation of SDG.

A Performance Improvement Scheme for a Wireless Internet Proxy Server Cluster (무선 인터넷 프록시 서버 클러스터 성능 개선)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.415-426
    • /
    • 2005
  • Wireless internet, which becomes a hot social issue, has limitations due to the following characteristics, as different from wired internet. It has low bandwidth, frequent disconnection, low computing power, and small screen in user terminal. Also, it has technical issues to Improve in terms of user mobility, network protocol, security, and etc. Wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. In this paper, wireless internet proxy server clusters are used for the wireless Internet because their caching, distillation, and clustering functions are helpful to overcome the above limitations and needs. TranSend was proposed as a clustering based wireless internet proxy server but it has disadvantages; 1) its scalability is difficult to achieve because there is no systematic way to do it and 2) its structure is complex because of the inefficient communication structure among modules. In our former research, we proposed the All-in-one structure which can be scalable in a systematic way but it also has disadvantages; 1) data sharing among cache servers is not allowed and 2) its communication structure among modules is complex. In this paper, we proposed its improved scheme which has an efficient communication structure among modules and allows data to be shared among cache servers. We performed experiments using 16 PCs and experimental results show 54.86$\%$ and 4.70$\%$ performance improvement of the proposed system compared to TranSend and All-in-one system respectively Due to data sharing amount cache servers, the proposed scheme has an advantage of keeping a fixed size of the total cache memory regardless of cache server numbers. On the contrary, in All-in-one, the total cache memory size increases proportional to the number of cache servers since each cache server should keep all cache data, respectively.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Market Efficiency in Real-time : Evidence from the Korea Stock Exchange (한국유가증권시장의 실시간 정보 효율성 검증)

  • Lee, Woo-Baik;Choi, Woo-Suk
    • The Korean Journal of Financial Management
    • /
    • v.26 no.3
    • /
    • pp.103-138
    • /
    • 2009
  • In this article we examine a unique data set of intraday fair disclosure(FD) releases to shed light on market efficiency within the trading day. Specifically, this paper analyze the response of stock prices on fair disclosure disseminated in real-time through KIND(Korea Investor's Network for Disclosure) on Korea stock exchange during the period from January 2003 to September 2004. We find that the prices of stock experiences a statistically and economically significant increase beginning seconds after the fair disclosure is initially announced and lasting approximately two minutes. The stock price responds more strongly to fair disclosure on smaller firm but the response to fair disclosure on the largest firm stock is more gradual, lasting five minutes. We also examine the profitability of a short-term trading strategy based on dissemination of fair disclosure. After controlling for trading costs we find that trader who execute a trade following initial disclosure generate negative profits, but trader buying stock before initial disclosure realize statistically significant positive profit after two minute of disclosure. Summarizing overall results, our evidence supports that security prices on Korea stock exchange reflects all available information within two minutes and the Korea stock market is semi-strongly efficient enough that a trader cannot generate profits based on widely disseminated news unless he acts almost immediately.

  • PDF

A Study on the Suppression and Punishment of International Terrorism (국제(國際)테러리즘의 억제(抑制)와 처벌(處罰)에 관한 연구(硏究) -중국민항기(中國民航機) 공중납치사건(空中拉致事件)을 중심(中心)으로-)

  • Yoh, Yeung-Moo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.87-123
    • /
    • 1989
  • The purpose of this thesis is to do a research on suppression of peacetime international terrorism and penal system of terrorists by political and economic means. International terrorism means wanton killing, hostage taking, hijacking, extortion or torture committed or threatened to be comitted against the innocent civilian in peacetime for political motives or purposes provided that international element is involved therein. This research is limited to international terrorism of political purposes in peacetime, especially, hijacking of civil aircraft. Hijacking of civil aircraft include most of international terrorism element in its criminal act and is considered to be typical of international terrorism in view of multinationality of its crews, passengers and transnational borders involved in aircraft hijacking. Civil air transportation of today is a indispensable part of international substructure, as it help connect continuously social cultural and economic network of world community by dealing with massive and swift transportation of passengers and all kinds of goods. Current frequent hijacking of civil aircraft downgrade the safety and trust of air travel by mass slaughter of passengers and massdestruction of goods and endanger indispensable substructure of world community. Considering these facts, aircraft hijacking of today poses the most serious threat and impact on world community. Therefore, among other thing, legal, political, diplomatic and economic sanctions should be imposed on aircraft hijacking. To pursue an effective research on this thesis aircraft hijacking by six Chineses on 5th May, 1983, from mainland China to Seoul, Korea, is chosen as main theme and the Republic of Korea's legal, political and diplomatic dealing and settlement of this hijacking incident along with six hijackers is reviewed to find out legal, political diplomatic means of suppression and solution of international terrorism. Research is focused on Chinese aircraft hijacking, Korea-China diplomatic negotiation, Korea's legal diplomatic handling and settlement of Tak Chang In, mastermind of aircraft hijacking and responses and position of three countries, Korea, China and Taiwan to this case is thoroughly analyzed through reviewing such materials as news reportings and comments of local and international mass media, Korea-China Memorandum, statements of governments of Korea, China and Taiwan, verdicts of courts of Korea, prosecution papers and oral argument by the defendants and lawyers and three antiaircraft hijacking conventions of Hague, Tokyo and Montreal and all the other instruments of international treaties necessary for the research. By using above-mentioned first-hand meterials as yardsticks, legal and political character of Chinese aircraft hijacking is analyzed and reviewed and close cooperation among sovereign states based on spirit of solidarity and strict observance of international treaties such as Hague, Tokyo and Montreal Conventions is suggested as a solution and suppressive means of international terrorism. The most important and indispensable factor in combating terrorism is, not to speak, the decisive and constant resolution and all-out effort of every country and close cooperation among sovereign states based on "international law of cooperation."

  • PDF