• Title/Summary/Keyword: Networks Safety

Search Result 575, Processing Time 0.028 seconds

Design and Implementation of Beacon based Wireless Sensor Network for Realtime Safety Monitoring in Subway Stations (지하철 역사에서 실시간 안전 모니터링 위한 비컨 기반의 무선 센서 네트워크 설계 및 구현)

  • Kim, Young-Duk;Kang, Won-Seok;An, Jin-Ung;Lee, Dong-Ha;Yu, Jae-Hwang
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.4
    • /
    • pp.364-370
    • /
    • 2008
  • In this paper, we proposed new sensor network architecture with autonomous robots based on beacon mode and implemented real time monitoring system in real test-bed environment. The proposed scheme offers beacon based real-time scheduling for reliable association process with parent nodes and dynamically assigns network address by using NAA (Next Address Assignment) mechanism. For the large scale multi-sensor processing, our real-time monitoring system accomplished the intelligent database processing, which can generate not only the alert messages to the civilians but also process various sensing data such as fire, air, temperature and etc. Moreover, we also developed mobile robot which can support network mobility. Though the performance evaluation by using real test-bed system, we illustrate that our proposed system demonstrates promising performance for emergence monitoring systems.

Consumer Movements, Consumer Policies, and Firms' Policies for Consumer Satisfaction in Japan (일본의 소비자운동, 소비자정책, 소비자지향적 경영에 관한 소고)

  • 허경옥
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.3
    • /
    • pp.173-190
    • /
    • 1998
  • This study reviewed both consumer movement and consumer policy of government in Japan. Their evolution since the Second World War will be reviewed and compared multiple periods, after the Second World war till the late 1960s, the period of the 1970s, the period after 1980s. In addition, firms' consumer satisfaction policies were briefly reviewed in order to fully understand consumer protection activities in japan. This study found four major characteristics of consumer protection activities led by both voluntary consumer organizations and government. First, consumer protection policy of government in Japan after the late 1960s was more active than that of consumer movement by consumer organizations. Second, major concerns for consumer protection were variant over time. The major goal in the first stage of period(during the 1960s) was to protect consumer safety from defective and dangerous goods and services, whereas the goal after the late 1970s was extended to cover various areas concerning the quality of life. Those areas refer to the quality of services, the way of sales and marketing, pollution of environment, and the quality of consuming life. Third, this study found that computer networks, aiming at collecting and analyzing the very useful to improve the consuming life of Japanese by providing sufficient consumer information to encourge rational choices of consumers. Forth, a close cooperation between the central and local administrations was crucial for the successful outcome In Japan This paper gives us useful guideline regarding how to improve consumer movement and govemments' policies for protecting consumer in Korea. In addition, other lessons on successful consumer satisfaction policies of Japanese firms may enable Korean firms to shape effective consumer policies of enhancing their competitiveness.

  • PDF

Analysis of Security Requirements on DCU and Development Protection Profile based on Common Criteria Version 3.1 (DCU 보안요구사항 분석 및 CC v3.1 기반의 보호프로파일 개발)

  • Cho, Youngjun;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.1001-1011
    • /
    • 2014
  • Smart Grid Devices could have security vulnerabilities that have legacy communication networks because of the fact that Smart Grid employs bi-directional communications and adopted a variety of communication interface. Consequently, it is required to build concrete response processes and to minimize the damage of the cyber attacks including security evaluation and certification methods. DCU is designed to collect meter data from numerous smart meter and send to utility's server so DCU installed between smart meter and utility's server. For this reason, If DCU compromised by attacker then attacker could use DCU to launching point for and attack on other devices. However, DCU's security evaluation and certification techniques do not suffice to be deployed in smart grid infrastructure. This work development DCU protection profile based on CC, it is expected that provide some assistance to DCU manufacturer for development of DCU security target and to DCU operator for help safety management of DCU.

An Introduction of Management and Policy of Biological Resources (생물자원의 관리와 정책)

  • Cho, Soon-Ro;Seol, Sung-Soo;Park, Jung-Min
    • Journal of Korea Technology Innovation Society
    • /
    • v.11 no.2
    • /
    • pp.219-240
    • /
    • 2008
  • This paper aims to suggest a policy for biological resource based on a comprehensive understanding on biological resources. Biological resources are different from traditionally recognized viable organisms (Biodiversity) in ecosystems. Biological resources are culturable and replicable resources of living organisms such as tissues, cells and genes. Moreover, biological resources include human-derived biological materials. Biological resources is not simply a matter of science and technology. Biological resources should be dealt with as national resources. There are many international issues regarding biological resources, such as intellectual property rights (IPRs), safety on handling and distribution, material transfer agreements (MTAs) for mutual benefits and biological standards. Ethical debates are also being raised because biological resources are related with human-derived biological materials. Every nation has tendency to adopt its government policies to strengthen its sovereignty on biological resources and international cooperation. In addition, international linkages are essential for providing enhanced worldwide accessibility to biological resources. Japan has shown several international initiatives in the field of biological resources. Korea has just begun to design appropriate policies for the use and R&D of biological resources. Therefore, this paper suggests the following needs: 1) policy at the national level beyond the interests of researchers, 2) inter-ministerial coordination across government ministries, 3) expansion of scope and size of each BRC (Biological Resource Centers), and 4) building networks and systems such as national information center, representative centers by field, and each BRC.

  • PDF

Design and Evaluation of an Early Intelligent Alert Broadcasting Algorithm for VANETs (차량 네트워크를 위한 조기 지능형 경보 방송 알고리즘의 설계 및 평가)

  • Lee, Young-Ha;Kim, Sung-Tae;Kim, Guk-Boh
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.95-102
    • /
    • 2012
  • The development of applications for vehicular ad hoc networks (VANETs) has very specific and clear goals such as providing intellectual safe transport systems. An emergency warning technic for public safety is one of the applications which requires an intelligent broadcast mechanism to transmit warning messages quickly and efficiently against the time restriction. The broadcast storm problem causing several packet collisions and extra delay has to be considered to design a broadcast protocol for VANETs, when multiple nodes attempt transmission simultaneously at the access control layer. In this paper, we propose an early intelligent alert broadcasting (EI-CAST) algorithm to resolve effectively the broadcast storm problem and meet time-critical requirement. The proposed algorithm uses not only the early alert technic on the basis of time to collision (TTC) but also the intelligent broadcasting technic on the basis of fuzzy logic, and the performance of the proposed algorithm was compared and evaluated through simulation with the existing broadcasting algorithms. It was demonstrated that the proposed algorithm shows a vehicle can receive the alert message before a collision and have no packet collision when the distance of alert region is less than 4 km.

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

A Preliminary Study to Determine Comprehensive Research and Development Plans for Promoting Mental Health Services

  • Kim, Chul Eung;Ko, Young-Mi;Lee, Sang-Uk;Choi, SungKu;Han, Kiwan;Park, Se Jin;Jo, MinKyung;Park, Yu Kyong;Lee, Hye Young;Park, Subin
    • Osong Public Health and Research Perspectives
    • /
    • v.9 no.6
    • /
    • pp.314-324
    • /
    • 2018
  • Objectives: The aim of this study was to analyze research and development projects in mental health services in Korea, using priority evaluation of mental health promotion policies to determine direction of the service. Methods: An online survey was conducted that targeted experts in the mental health service regarding promotion of mental health in Korea in 2016. The survey was based on 32 policy projects that resulted from 12 strategies according to 4 policy objectives. Results: Analysis of 32 mental health projects were assessed regarding the possibility of technology development success, magnitude of the ripple effect, and necessity of a national response. It was observed that 3 policy projects relevant to suicide, had a high relative priority. This was followed by policies for improvement of health insurance and the medical benefit cost system, and policies for reinforcement of crisis psychological support such as those for disaster victims. Conclusion: The prioritization of mental health services should place an emphasis on promotion of a healthy mental lifestyle, rehabilitation support for patients with serious mental illness, and reinforcement of social safety networks for suicide prevention.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

An exploratory study of stress wave communication in concrete structures

  • Ji, Qing;Ho, Michael;Zheng, Rong;Ding, Zhi;Song, Gangbing
    • Smart Structures and Systems
    • /
    • v.15 no.1
    • /
    • pp.135-150
    • /
    • 2015
  • Large concrete structures are prone to cracks and damages over time from human usage, weathers, and other environmental attacks such as flood, earthquakes, and hurricanes. The health of the concrete structures should be monitored regularly to ensure safety. A reliable method of real time communications can facilitate more frequent structural health monitoring (SHM) updates from hard to reach positions, enabling crack detections of embedded concrete structures as they occur to avoid catastrophic failures. By implementing an unconventional mode of communication that utilizes guided stress waves traveling along the concrete structure itself, we may be able to free structural health monitoring from costly (re-)installation of communication wires. In stress-wave communications, piezoelectric transducers can act as actuators and sensors to send and receive modulated signals carrying concrete status information. The new generation of lead zirconate titanate (PZT) based smart aggregates cause multipath propagation in the homogeneous concrete channel, which presents both an opportunity and a challenge for multiple sensors communication. We propose a time reversal based pulse position modulation (TR-PPM) communication for stress wave communication within the concrete structure to combat multipath channel dispersion. Experimental results demonstrate successful transmission and recovery of TR-PPM using stress waves. Compared with PPM, we can achieve higher data rate and longer link distance via TR-PPM. Furthermore, TR-PPM remains effective under low signal-to-noise (SNR) ratio. This work also lays the foundation for implementing multiple-input multiple-output (MIMO) stress wave communication networks in concrete channels.

A Robust Pair-wise Key Agreement Scheme without Trusted Third Party and Pre-distributing Keys for MANET Environments (MANET에서 제 3 신뢰기관(TTP)과 사전 키 분배가 필요 없는 강인한 키 교환 방식)

  • Han, Seung-Jin;Choi, Jun-Hyeog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.229-236
    • /
    • 2008
  • In this paper, re proposed scheme that it safely exchange encrypted keys without Trust Third Party(TTP) and Pre-distributing keys in ubiquitous environments. Existing paper assume that exist a TTP or already pre-distributed encrypted keys between nodes. However, there methods are not sufficient for wireless environments without infrastructure. Some existing paper try to use the Diffie-Hellman algorithm for the problem, but it is vulnerable to Replay and Man-in-the middle attack from the malicious nodes. Therefore, Authentication problem between nodes is solved by modified the Diffie-Hellman algorithm using ${\mu}TESLA$. We propose safe, lightweight, and robust pair-wise agreement algorithm adding. One Time Password(OTP) using timestamp to modified the Diffie-Hellman in ubiquitous environments, and verify a safety about proposed algorithm.

  • PDF