• Title/Summary/Keyword: Public Safety Communication

Search Result 281, Processing Time 0.022 seconds

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

Developing an On-line Scheduling System for Increasing Effectiveness of Public Research Facility (공공기관 연구시설장비 효율성 향상을 위한 온라인 일정계획 시스템 개발)

  • Lee, Chae-Yun;Kim, Ki-Hong;Shin, Seung-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.1
    • /
    • pp.181-189
    • /
    • 2017
  • The systematic management of technology infrastructure increasingly becomes critical as it represents the driving power for creating competitive advantage of nations and enterprises. In this sense, public facility and equipment, which is one major asset of technology infrastructure, should be managed effectively, systematically and efficiently to increase its overall equipment effectiveness. However, the manual and off-line communication was the unique way to communicate between the suppliers who provide facilities in the public sector and the customers who utilize the facilities in the industrial sector. This communication way caused invisibility of available usage time and increase of idle time, thereby decreasing the equipment effectiveness. This paper presents an web-based scheduling system that enables real-time collaboration and information sharing for increasing the equipment effectiveness. The designed system performs scheduling, facility management, order management and customer relationship management in an on-line platform, and carries out the processing and storing of relevant information in an integrated database. The paper includes a development approach to identify business process models and standardized system models by using object-modeling technique. The deliverable of the present work will contribute to increasing the equipment effectiveness by enhancing visibility, transparency and predictability by means of the integration with a legacy Enterprise Resource Planning.

A Study on Perception for Public Safety of Seoul Citizens using Multiple Regression Analysis (다중회귀분석을 이용한 서울시민 체감안전도에 관한 연구)

  • Uh, Soo Kyun;Cho, Sung-Hoon;Kim, Jeong-Joon;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.195-201
    • /
    • 2018
  • The government and the police are trying to expand the safety of the people by spreading "four major social evil erasures" intensively crackdown and prevention activities of sexual assault, school violence, domestic violence, and bad foods for the main purpose of security activities I made an effort. However, in spite of such efforts, the public's feelings of social unrest and the concern about security have not been significantly improved. Therefore, in this paper, using R which is the tool for analyzing big data which is most widely used in each field such as enterprise, consulting, public field, etc., R Using variables measured at each level, we analyzed by analyzing multiple regression analyzes, and confirmed what kind of correlation there is in relation to the direction affecting policy improvement I will try to present it.

A Study on Optimizing User-Centered Disaster and Safety Information Application Service

  • Gaeun Kim;Byungjoo Park
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.35-43
    • /
    • 2023
  • This paper emphasizes that information received in disaster situations can lead to disparities in the effectiveness of communication, potentially causing damage. As a result, there is a growing demand for disaster and safety information among citizens. A user-centered disaster and safety information application service is designed to address the rapid dissemination of disaster and safety-related information, bridge information gaps, and alleviate anxiety. Through the Open API (Open Application Programming Interface), we can obtain clear information about the weather, air quality, and guidelines for disaster-related actions. Using chatbots, we can provide users with information and support decision-making based on their queries and choices, utilizing cloud APIs, public data portal open APIs, and solution knowledge bases. Additionally, through Mashup techniques with the Google Maps API and Twitter API, we can extract various disaster-related information, such as the time and location of disaster occurrences, update this information in the disaster database, and share it with users.

A Study on the Mobile Application Security Threats and Vulnerability Analysis Cases

  • Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.180-187
    • /
    • 2020
  • Security threats are increasing with interest due to the mass spread of smart devices, and vulnerabilities in developed applications are being exposed while mobile malicious codes are spreading. The government and companies provide various applications for the public, and for reliability and security of applications, security checks are required during application development. In this paper, among the security threats that can occur in the mobile service environment, we set up the vulnerability analysis items to respond to security threats when developing Android-based applications. Based on the set analysis items, vulnerability analysis was performed by examining three applications of public institutions and private companies currently operating as mobile applications. As a result of application security checks used by three public institutions and companies, authority management and open module stability management were well managed. However, it was confirmed that many security vulnerabilities were found in input value verification, outside transmit data management, and data management. It is believed that it will contribute to improving the safety of mobile applications through the case of vulnerability analysis for Android application security.

Mid to Long Term R&D Direction of UAV for Disaster & Public Safety (재난치안용 무인기 중장기 연구개발 방향)

  • Kim, Joune Ho
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.83-90
    • /
    • 2020
  • Disasters are causing significant damage to the lives and property of our society and are recognized as social problems that need to be solved nationally and globally. The 4th industrial revolution technologies affecting society as a whole such as the Internet of Things(IoT), Artificial Intelligence(AI), Drones(Unmanned Aerial Vehicles), and Big Data are continuously absorbed into the disaster and safety industries as scientific and technological tools for solving social problems. Very soon, twenty-nine domestic UAV-related organizations/companies will complete the construction of a multicopter type small UAV integrated system ('17~'20) that can be operated at disaster and security sites. The current work considers and proposes the mid-to-long term R&D direction of disaster UAV as a strategic asset of the national disaster response system. First, the trends of disaster and safety industry and policy are analyzed. Subsequently, the development status and future plans of small UAV, securing shortage technology, and strengthening competitiveness are analyzed. Finally, step-by-step R&D direction of disaster UAV in terms of development strategy, specialized mission, platform, communication, and control and operation is proposed.

Developing the Vulnerability Factor Structure Affecting Injuries and Health Problems Among Migrant Seafood Processing Industry Workers

  • Jiaranai, Itchaya;Sansakorn, Preeda;Mahaboon, Junjira
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.170-179
    • /
    • 2022
  • Background: The vulnerability of international migrant workers is on the rise, affecting the frequency of occupational accidents at workplaces worldwide. If migrant workers are managed in the same way as native workers, the consequences on safety assurance and risk management will be significant. This study aimed to develop the vulnerability factor model for migrant workers in seafood processing industries because of significant risk-laden labor of Thailand, which could be a solution to control the risk effectively. Methods: A total of 569 migrant workers were surveyed (432 Burmese and 137 Cambodian), beginning with 40 initial vulnerability factors identified in the questionnaire established from experts. The data were analyzed through descriptive analysis; exploratory factor analysis (EFA) and confirmatory factor analysis (CFA) were used to ascertain the model. Results: The result of content validity >0.67 and the Cronbach's alpha of 0.957 specified the high reliability of 40 factors. The EFA indicated a total variance of 65.49%. The final CFA validated the model and had an empirical fitting; chi-square = 85.34, Adjust Goodness-of-Fit Index = 0.96, and root mean square error of approximation = 0.016. The structure concluded with three dimensions and 18 factors. Dimension 1 of the structure, "multicultural safety operation," contained 12 factors; Dimension 2, "wellbeing," contained four factors; and Dimension 3, "communication technology," contained two factors. Conclusion: The vulnerability factor structure developed in this study included three dimensions and 18 factors that were significantly empirical. The knowledge enhanced safety management in the context of vulnerability factor structure for migrant workers at the workplace.

Validity of a new information and communication technology platform for oral health care of persons with disabilities

  • Lee, Jae-Young;Paik, Hye Ran;Kim, Young-Jae;Jin, Bo-Hyoung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.21 no.3
    • /
    • pp.211-225
    • /
    • 2021
  • Objectives: To validate the role of a new information and communication technology platform that we created for the betterment of the oral health of persons with disabilities and for providing appropriate health care services. Methods: A Delphi survey was conducted among 16 people in various professions, including academia, government agencies, and dentistry, to evaluate the validity of the information and communication technology platform. Moreover, platform satisfaction was evaluated using a user experience questionnaire among 200 people, including persons with disabilities, parents, and public institutions. Results: Experts in consensus indicated a high validity for the categories of service provider (CV=0.29, CVR=0.69), service target (CV=0.29, CVR=0.38), service contests (CV=0.27, CVR=0.63), and financial support (CV=0.30, CVR=0.63) in our information and communication technology platform. In addition, information from questionnaires on user experience and communication technology satisfaction analysis showed that both users and providers were highly satisfied with the platform. Conclusions: The provision of oral health services based on the new information and communication technology platform has numerous advantages, in addition to providing adequate oral health care for the disabled. Furthermore, the social safety net for improved oral health may be further strengthened.

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

The Present Status and Future of Disaster Safety Communication Network (재난안전통신망의 현황과 미래)

  • Hong, Sung-Hwa;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.115-120
    • /
    • 2020
  • PS-LTE, which is mentioned as a next-generation disaster network technology, is a communication technology that supports communication between terminals and group communication necessary for public safety communication based on LTE technology. Currently, Korea is establishing a PS-LTE network construction plan and installing a PS-LTE system. The world is currently making a lot of efforts to build a disaster network system using PS-LTE. However, due to the characteristics of the closed network that only the related persons can access, it can not be operated like the existing commercial network, so it is necessary to build a new network. And it is expected that many periods and costs will be required. In order to establish a disaster safety communication network efficiently, it is necessary to consider the linkage of PS-LTE network, which is newly constructed by complementing the problems such as security and access priority to existing LTE network rather than unconditional new construction.