• Title/Summary/Keyword: Network Security Management

Search Result 1,396, Processing Time 0.023 seconds

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng;Gui, Xiao-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2370-2387
    • /
    • 2012
  • A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.

A Study on Utilizing SNS to Vitalize Smart Learning (스마트러닝 활성화를 위한 SNS활용 방안 연구)

  • Kang, Jung-Hwa
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.265-274
    • /
    • 2011
  • Smart-Learning has been increasing with the growth of smartphone usage. Looking at previous research, this study established the concept of smart learning, current understanding of smart learning and the requirements for smart learning. Subsequently, It was established a concept of SNS, reviewing future education, self-directed learning by using social network, and suggests policies of vitalizing smart-learning by using SNS. In order to use SNS in smart learning, first it is proposed the need for smart learning laws and institutions, particularly with young people considering their emotions in order to expand what is proposed. secondly, the need for SNS usage to be socially and culturally relevant. third and finally, the need for strengthening information security with co-operation from the government.

A Effective LMS Model Using Sensing System (센싱기술을 이용한 효과적인 LMS 모델에 관한 연구)

  • Kim, Seok-Soo;Ju, Min-Seong
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.33-40
    • /
    • 2005
  • As e-learning studying is activated, learner's requirement increased. Therefore, need correct e-learning model augmented requirement of learner and new ubiquitous surrounding. In this treatise when, proposed to supplement studying contents relationship conversion service and cooperation studying service function to LMS that analyze existing e-learning model's limitation for ubiquitous environment e-learning model that can study regardless of, ubiquitously some contents and do based on SCORM ubiquitous-network and next generation sensor technology etc. Learning form conversion service senses a learner's surrounding situations and recognize his/her body condition using smart sensor technology and provides the learner with contents in the optimal form. Using sensing projects like Orestia and SOB, users can more effective collaborative learning service.

  • PDF

A Danger Theory Inspired Protection Approach for Hierarchical Wireless Sensor Networks

  • Xiao, Xin;Zhang, Ruirui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2732-2753
    • /
    • 2019
  • With the application of wireless sensor networks in the fields of ecological observation, defense military, architecture and urban management etc., the security problem is becoming more and more serious. Characteristics and constraint conditions of wireless sensor networks such as computing power, storage space and battery have brought huge challenges to protection research. Inspired by the danger theory in biological immune system, this paper proposes an intrusion detection model for wireless sensor networks. The model abstracts expressions of antigens and antibodies in wireless sensor networks, defines meanings and functions of danger signals and danger areas, and expounds the process of intrusion detection based on the danger theory. The model realizes the distributed deployment, and there is no need to arrange an instance at each sensor node. In addition, sensor nodes trigger danger signals according to their own environmental information, and do not need to communicate with other nodes, which saves resources. When danger is perceived, the model acquires the global knowledge through node cooperation, and can perform more accurate real-time intrusion detection. In this paper, the performance of the model is analyzed including complexity and efficiency, and experimental results show that the model has good detection performance and reduces energy consumption.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

Detecting Knowledge structures in Artificial Intelligence and Medical Healthcare with text mining

  • Hyun-A Lim;Pham Duong Thuy Vy;Jaewon Choi
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.817-837
    • /
    • 2019
  • The medical industry is rapidly evolving into a combination of artificial intelligence (AI) and ICT technology, such as mobile health, wireless medical, telemedicine and precision medical care. Medical artificial intelligence can be diagnosed and treated, and autonomous surgical robots can be operated. For smart medical services, data such as medical information and personal medical information are needed. AI is being developed to integrate with companies such as Google, Facebook, IBM and others in the health care field. Telemedicine services are also becoming available. However, security issues of medical information for smart medical industry are becoming important. It can have a devastating impact on life through hacking of medical devices through vulnerable areas. Research on medical information is proceeding on the necessity of privacy and privacy protection. However, there is a lack of research on the practical measures for protecting medical information and the seriousness of security threats. Therefore, in this study, we want to confirm the research trend by collecting data related to medical information in recent 5 years. In this study, smart medical related papers from 2014 to 2018 were collected using smart medical topics, and the medical information papers were rearranged based on this. Research trend analysis uses topic modeling technique for topic information. The result constructs topic network based on relation of topics and grasps main trend through topic.

A Study on the Development of National Defense Leadership through the Change of Civil-Military Relationships (민군관계의 변화와 국방리더십의 발전방안에 관한 연구)

  • Lee, Chang-Gi
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.83-118
    • /
    • 2006
  • This study is to develop digital leadership in a field of national defense. Today, korean society is facing the crisis of national security. But national defense leadership is not show in the circumstance of national security crisis. As you know, national defense leadership is a process that make use of influence. Which means it converges people's interest and demands well and also show people the right vision of national defense and make them to comply the policy about national security. Because of the environmental change, our national defense leadership is having a new turning point. First, international order, which is under post-cold war, raises possibility of guarantee of peace and security in international society but also, cause the increase of multiple uncertainty and small size troubles in security circumstance. In addition, Korean society is rushing into democratization and localization period by success in peaceful change of political power went through about three times. The issue of political neutralization of military is stepping into settlement but still, negative inheritance of old military regime is worrying about it. In this situation, we can't expect rise in estimation about the importance of security and military's reason for being. So, military have to give their concern to not only internal maintenance of order and control and growth of soldiers but also developing external leadership to strength influence to society and military's the reason for being. So for these alternative I'm suggesting a digital leadership of national defense which fits digital era. This digital leadership is the leadership which can accept and understand digital technology and lead the digital organization. To construct digital national defense we need a practical leadership. The leadership has to be digital leadership with digital competence that can direct vision of digital national defense and carry out the policy. A leader who ha s digital leadership can lead the digital society. The ultimate key to construct digital government, digital corporate and digital citizen depends on digital leader with digital mind. To be more specific, digital leadership has network leadership, next generation leadership, knowledge driven management leadership, innovation oriented leadership. A leader with this kind of leadership is the real person with digital leadership. From now on, to rise this, we have to build up human resource development strategy and develop educational training program.

  • PDF

Data Source Management using weight table in u-GIS DSMS

  • Kim, Sang-Ki;Baek, Sung-Ha;Lee, Dong-Wook;Chung, Warn-Il;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.27-33
    • /
    • 2009
  • The emergences of GeoSensor and researches about GIS have promoted many researches of u-GIS. The disaster application coupled in the u-GIS can apply to monitor accident area and to prevent spread of accident. The application needs the u-GIS DSMS technique to acquire, to process GeoSensor data and to integrate them with GIS data. The u-GIS DSMS must process big and large-volume data stream such as spatial data and multimedia data. Due to the feature of the data stream, in u-GIS DSMS, query processing can be delayed. Moreover, as increasing the input rate of data in the area generating events, the network traffic is increased. To solve this problem, in this paper we describe TRIGGER ACTION clause in CQ on the u-GIS DSMS environment and proposes data source management. Data source weight table controls GES information and incoming data rate. It controls incoming data rate as increasing weight at GES of disaster area. Consequently, it can contribute query processing rate and accuracy

  • PDF

Seamless and Secure Mobility Management with Location-Aware Service (LAS) Broker for Future Mobile Interworking Networks

  • Lee Minsoo;Kim Gwanyeon;Park Sehyun
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.207-221
    • /
    • 2005
  • The proliferation of wireless local area networks (WLANs) offering high data rate in hot spot area have spurred the demand for possible WLANs and third-generation (3G) cellular network integration solutions as the initiative step towards 4G systems. This paper provides a novel architecture for seamless location-aware integration of WLANs into 3G cellular networks and also an analysis for the efficient handover techniques. We introduce location as a key context in secure roaming mechanism for context-aware interworking in 4G systems. The fast secure roaming with location-aware authentication is implemented at an entity called location-aware service (LAS) broker that utilizes the concepts of direction of user and pre-warming zone. The location-ware interworking architecture supports seamless roaming services among heterogeneous wireless networks including WLANs, wireless metropolitan area networks (WMANs), and 3G cellular networks. This paper also includes a description of procedures needed to implement efficient mobility and location management. We show how the LAS broker with pre-warming and context transfer can obtain significant lower latency in the vertical handover.

Development of an USN Based Integrated Open Server System for Disaster Prevention Management (USN 기반 개방형 방재관리 통합시스템 개발)

  • Lee, Jeong-Kyoon;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.929-932
    • /
    • 2007
  • The integrated prevention of disaster management system is collected prevention of disaster data from prevention of disaster relation other systems and smart sensor in USN. This system manages fire fighting facility effectively. The relation equipment which is used in existing and network using "Open Protocols" about under using the support system which is integrated effectively as the destroyer. It connects CCTV, the sensitivity environmental sensor, automatic fire detection equipment and security equipment and air flow equipment system using Internet. The System Server was collected monitoring data at the each equipment and processing by operational scenario. It will verified the effectiveness of operational scenario and integrated prevention of disaster management system

  • PDF