• Title/Summary/Keyword: Network Security Management

Search Result 1,366, Processing Time 0.024 seconds

Research on a Solution for Efficient ECG Data Transmission in u-Healthcare Environment (u-Healthcare 환경에서의 효율적인 ECG 데이터 전송 방안에 관한 연구)

  • Cho, Gyoun-Yon;Lee, Seo-Joon;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.397-403
    • /
    • 2014
  • In u-Healthcare environment, large amounts of important medical information is processed through wireless communication. Therefore there is a need to increase the efficiency of the network system of sending ECG data. This paper presents a compression solution for efficient ECG data transmission(ECGLZW) in u-Healthcare environment. The results showed that the average compression ratio of ECGLZW was 4.6, which got 200% better than existing methods(Huffman and LZW compression). ECGLZW's high compression ratio can increase the efficiency of wireless channels. As a result, reliable communication and security of u-Healthcare information could be achieved by applying these remaining channels to retransmission and encryption.

Design of High Speed Modular Exponentiation Operation Method for RSA Algorithm (RSA 알고리즘 부하 경감을 위한 고속 모듈러 멱승 연산 알고리즘 설계)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.507-512
    • /
    • 2008
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

Effective indexing of moving objects for current position management in Road Networks (도로 네트워크 환경에서 이동 객체의 현재 위치 관리를 위한 효율적인 색인 기법)

  • Kim, Tae-Gyu;Shin, Soong-Sun;Chung, Weo-Nil;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.33-43
    • /
    • 2011
  • Recently, advances in mobile communication and location identifying technology of the moving object is evolving. Therefore, the location-based services based on request for service have increased and a variety of the indexing for the position management of moving objects has been studied. Because the index based on Euclidean space are no restriction of movement, it is difficult to apply to the real world. Also, there is additional cost to find adjacent road segments in road networks-based indexing. Existing studies of fixed static objects such as buildings or hospitals are not considered. In this paper, we propose an efficient road networks-based indexing for management of current positions. The proposed indexing partitions road networks by grids and has integrated road connection informations and manage separated extra indexing for fixed static objects. Through the experiment, we show that the proposed indexing based on road networks improves the performance of operation for search or update than existing indexing.

A Study on the Development of Building Control and management System -Focusing on the Lighting Control and Monitoring system- (빌딩 제어 및 관리 시스템 개발에 관한 연구 -조명 제어 관리 시스템 구축을 중심으로-)

  • Cho, Sung-O
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.4
    • /
    • pp.110-118
    • /
    • 2007
  • Technology has been viewed at various stages of civilization as leading to future progress. The building, its services systems and management of the work process all contribute to the well-being of people within an organization. Productivity relies on there being a general sense of high morale and satisfaction with the workplace. Now buildings are considered as providing a milieu for human creativity. Flexibility, adaptability, service integration and high standards of finishes offer an intelligence threshold. Building Automation System(BAS) - controlled lighting systems may offer incremental energy saving. Conventional Lighting control systems often control equipment in a single room or over the limited area, because they are centralized control systems, which means that all the controlled circuits must be wired to a single control panel. The computers used by these systems are typically dedicated microprocess that perform only lighting control functions. By comparison, modern Building automation systems are distributed control system, which means that their computing hardware and software are distributed as a network that microprocessor-based control modules and standard PC. PLC(Programmable Logic controller) is extensible virtually without limits, so that all the lighting in a facility can be controlled by single, unified system - the same system that also can control and monitor the building's HVAC, security, and manufacturing processed, elevators, and more. A Building automation system can control light using schedules, manual controls, occupancy sensors, and photosensors, either singly or in combination. Building Lighting control and monitoring system will be for a energy saving and efficient building management system.

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

A Study on the Comparison and Semantic Analysis between SNS Big Data, Search Portal Trends and Drug Case Statistics (SNS 빅데이터 및 검색포털 트렌드와 마약류 사건 통계간의 비교 및 의미분석 연구)

  • Choi, Eunjung;Lee, SuRyeon;Kwon, Hyemin;Kim, Myuhngjoo;Lee, Insoo;Lee, Seunghoon
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.231-238
    • /
    • 2021
  • SNS data can catch the user's thoughts and actions. And the trend of the search portal is a representative service that can observe the interests of users and their changes. In this paper, the relationship was analyzed by comparing statistics on narcotics incidents and the degree of exposure to narcotics related words in tweets of SNS and in the trends of search portal. It was confirmed that the trend of SNS and search portal trends was the same in the statistics of the prosecution office with a certain time difference.In addition, cluster analysis was performed to understand the meaning of tweets in which narcotics related words were mentioned. In the 50,000 tweets collected in January 2020, it was possible to find meaning related to the sale of actual drugs. Therefore, through SNS monitoring alone it is possible to monitor narcotics-related incidents and to find specific sales or purchase-related information, and this can be used in the investigation process. In the future, it is expected that crime monitoring and prediction systems can be proposed as related crime analysis may be possible not only with text but also images.

Numerical Simulation of the Flood Event Induced Temporally and Spatially Concentrated Rainfall - On August 17, 2017, the Flood Event of Cheonggyecheon (시공간적으로 편중된 강우에 의한 홍수사상 수치모의 - 2017년 8월 17일 청계천 홍수사상을 대상으로)

  • Ahn, Jeonghwan;Jeong, Changsam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.45-52
    • /
    • 2018
  • This study identifies the cause of the accident and presents a new concept for safe urban stream management by numerical simulating the flood event of Cheonggyecheon on August 17, 2017, using rain data measured through a dense weather observation network. In order to simulate water retention in the CSO channel listed as one of the causes of the accident, a reliable urban runoff model(XP-SWMM) was used which can simulate various channel conditions. Rainfall data measured through SK Techx using SK Telecom's cell phone station was used as rain data to simulate the event. The results of numerical simulations show that rainfall measured through AWSs of Korea Meteorological Administration did not cause an accident, but a similar accident occurred under conditions of rainfall measured in SK Techx, which could be estimated more similar to actual phenomena due to high spatial density. This means that the low spatial density rainfall data of AWSs cannot predict the actual phenomenon occurring in Cheonggyecheon and safe river management needs high spatial density weather stations. Also, the results of numerical simulation show that the residual water in the CSO channel directly contributed to the accident.

A Study on Outplacement Countermeasure and Retention Level Examination Analysis about Outplacement Competency of Special Security Government Official (특정직 경호공무원의 전직역량에 대한 보유수준 분석 및 전직지원방안 연구)

  • Kim, Beom-Seok
    • Korean Security Journal
    • /
    • no.33
    • /
    • pp.51-80
    • /
    • 2012
  • This study is to summarize main contents which was mentioned by Beomseok Kim' doctoral dissertation. The purpose of this study focuses on presenting the outplacement countermeasure and retention level examination analysis about outplacement competency of special security government official through implement of questionnaire method. The questionnaire for retention level examination including four groups of outplacement competency and twenty subcategories was implemented in the object of six hundered persons relevant to outplacement more than forty age and five grade administration official of special security government officials, who have outplacement experiences as outplacement successors, outplacement losers, and outplacement expectants, in order to achieve this research purpose effectively. The questionnaire examination items are four groups of outplacement competency and twenty subcategories which are the group of knowledge competency & four subcategories including expert knowledge, outplacement knowledge, self comprehension, and organization comprehension, the group of skill competency & nine subcategories including job skill competency, job performance skill, problem-solving skill, reforming skill, communication skill, organization management skill, crisis management skill, career development skill, and human network application skill, the group of attitude-emotion competency & seven subcategories including positive attitude, active attitude, responsibility, professionalism, devoting-sacrificing attitude, affinity, and self-controlling ability, and the group of value-ethics competency & two subcategories including ethical consciousness and morality. The respondents highly regard twenty-two outplacement competency and they consider themselves well-qualified for the subcategories valued over 4.0 such as the professional knowledge, active attitude, responsibility, ethics and morality while they mark the other subcategories below average still need to be improved. Thus, the following is suggestions for successful outplacement. First, individual effort is essential to strengthen their capabilities based on accurate self evaluation, for which the awareness and concept need to be redefined to help them face up to the reality by readjusting career goal to a realistic level. Second, active career development plan to improve shortcoming in terms of outplacement competency is required. Third, it is necessary to establish the infrastructure related to outplacement training such as ON-OFF Line training system and facilities for learning to reinforce user-oriented outplacement training as a regular training course before during after the retirement.

  • PDF

Partial Path Selection Method in Each Subregion for Routing Path Optimization in SEF Based Sensor Networks (통계적 여과 기법 기반 센서 네트워크에서 라우팅 경로 최적화를 위한 영역별 부분 경로 선택 방법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.108-113
    • /
    • 2012
  • Routing paths are mightily important for the network security in WSNs. To maintain such routing paths, sustained path re-selection and path management are needed. Region segmentation based path selection method (RSPSM) provides a path selection method that a sensor network is divided into several subregions, so that the regional path selection and path management are available. Therefore, RSPSM can reduce energy consumption when the path re-selection process is executed. However, it is hard to guarantee optimized secure routing path at all times since the information using the path re-selection process is limited in scope. In this paper, we propose partial path selection method in each subregion using preselected partial paths made by RSPSM for routing path optimization in SEF based sensor networks. In the proposed method, the base station collects the information of the all partial paths from every subregion and then, evaluates all the candidates that can be the optimized routing path for each node using a evaluation function. After the evaluation process is done, the result is sent to each super DN using the global routing path information (GPI) message. Thus, each super DN provides the optimized secure routing paths using the GPI. We show the effectiveness of the proposed method via the simulation results. We expect that our method can be useful for the improvement of RSPSM.

A Resilient Key Renewal Scheme in Wireless Sensor Networks (센서 네트워크에서 복원력을 지닌 키갱신 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.103-112
    • /
    • 2010
  • In sensor networks, because sensors are deployed in an unprotected environment, they are prone to be targets of compromise attack, If the number of compromised nodes increases considerably, the key management in the network is paralyzed. In particular, compromise of Cluster Heads (CHs) in clustered sensor networks is much more threatening than that of normalsensors. Recently, rekeying schemes which update the exposed keys using the keys unknown to the compromised nodes are emerging. However, they cause some security and efficiency problems such as single group key employment in a cluster, passive eviction of compromised nodes, and excessive communication and computation overhead. In this paper, we present a proactive rekeying scheme using renewals of duster organization for clustered sensor networks. In the proposed scheme, each sensor establishes individual keys with neighbors at network boot-up time, and these keys are employed for later transmissions between sensors and their CH. By the periodic cluster reorganization, the compromised nodes are expelled from network and the individual keys employed in a cluster are changed continuously. Besides, newly elected CHs securely agree a key with sink by informing their members to sink, without exchangingany keying materials. The simulation results shows that the proposed scheme remarkably improves the confidentiality and integrity of data in spite of the increase of compromised nodes. Also, they show that the proposed scheme exploits the precious energy resource more efficiently than SHELL.