• Title/Summary/Keyword: Public safety network

Search Result 197, Processing Time 0.028 seconds

A Study of Call Service Mechanism on SIP for Emergency Communication Services (긴급통신서비스 제공을 위한 SIP에서의 호 서비스 메커니즘에 관한 연구)

  • Lee, Kyu-Chul;Lee, Jong-Hyup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.293-300
    • /
    • 2007
  • As the development of the various IP-based services, it is expected that Internet telephony service will gradually replace the traditional PSTN-based telephony service. But there are many issues resolved to spread the Internet telephony service. One of them is to support the emergency services in the Internet telephony. In the case of USA, it has been regulated that 911 services should be supported in the Internet telephony services using VoIP on the similar performance level to PSTN 911 service. According to the regulation, basic VoIP 911 calls should be routed to the general access line of LEA without the location information or the callback number, but the enhanced VoIP 911 calls with the location information and callback number should be routed on the dedicated 911 network and destined to the local 911 distribution center such as PSAP. But, in the current VoIP-based Internet telephony network, the emergency call service has not been handled as one of the special services as well at has a worse performance in comparison to it on PSTN. Moreover, the service has a critical problem that it can not be destined to the nearest PSAP because of the insufficient information about the location information and the call back number. In this paper, we suggest the SIP-based emergency call service mechanism in order to resolve the problems above mentioned. This suggested mechanism is implemented to show its effectiveness and efficiency.

Characteristics of Social Security Contained in Mecius's People-Care Theory(保民論) (맹자의 보민론(保民論)이 지닌 사회보장적 성격)

  • Yoo, Jong Kook
    • Korean Journal of Social Welfare
    • /
    • v.65 no.1
    • /
    • pp.109-126
    • /
    • 2013
  • This paper aims to define Mecius's people-care theory(保民論), and aims to recognize the characteristics of social security contained in Mecius's people-care theory. Mecius considered to the public relief as King's obligation. So to speak, the King protects to the property of the people. Especially his people-care theory implicate to continuity of safety life, a relief fund on the property, protection of disaster damage. Continuity of safety life means to enabling the people procurable food, clothing and bury dead persons without difficulties. It's may be said that implicated to the theory and system of modern social-welfare. It is reason for his opinion that a state should construct in the minimum social safety network by taking responsibility for basis needs of life. He was a humanist so much. He thought about the pursuit of the human happiness and the improvement in quality of life. Therefore his idea nearly means to the social security system in a modern sense. His thought is not only an ideal background on the public assistance and a social relief security in the contemporary but also a relief activity system such as Jindaebup called historical prototype of social welfare. It is an important fact that his people-care theory implicate to social security system.

  • PDF

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Improved Strong Password Mutual Authentication Protocol to Secure on Replay Attack (재전송 공격에 안전한 개선된 강력한 패스워드 상호인증 프로토콜)

  • Kim, Jun-Sub;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.415-425
    • /
    • 2010
  • In public network, user authentication is important security technology. Especially, password-based authentication method is used the most widely in distributed environments, and there are many authentication methods. Their SPMA protocol indicates vulnerability about problem that NSPA protocol does not offer mutual authentication, and proposed Strong Password Mutual Authentication protocol with mutual authentication. However, SPMA protocol has vulnerability of replay attack. In the paper, we analyzed vulnerability to replay attack of SPMA protocol. And we also proposed Improved Strong Password Mutual Authentication protocol to secure on replay attack with same efficiency.

The Korea's indiscretion in maritime-terrorism and the counter plan (한국 해양테러의 실태 및 대응방안)

  • Park, Jun-seok;Park, Yu-Deuk;Kim, Gi-sang
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.2
    • /
    • pp.79-93
    • /
    • 2007
  • With international urgence of terror situation, many methods of terror techniques and skills are appearing and more intense and threatening terror is braking out not only in the air(plane), but also in the sea(ship). Korea is surrounded by 3 sides of sea and is a proud maritime nation that should advance to foreign country through the sea because South Korea and North Korea are confronting. Korea depend on the maritime transportation, 99.7% of exporting, importing material resources. Therefore, acquisition of the marine safety has the great affect on national security and economical life. On the high tension of situation about threat and possibility of maritime terroism, the potential ways of the improvement policy for counter-tactics against big maritime terror are the following. First, we should construct clear and well-organized network for accurate information about maritime terrorism Second, we should have the information of all domestic, foreign passenger's ships Third, national important facilities such as atomic energy plant, thermo-electric power plant, shipyard need policies to manage all emergency situation Fourth, government authorities should improve tactic abilitities by competing with support and budget inside of nation as well as outside of nation. To develop big maritime terror of our country, we will have to hold cooperative training & tactics contest of big maritime terror by cooperating educational industry organization with similar institute, improve the ability of members of big terror and acquire tactics information by excavating and exchanging a new technique through tactics seminar and public hearing.

  • PDF

The Design of the Security Protocol for Electronic Commerce Payment System (전자상거래 지불시스템을 위한 보안 프로토콜 설계)

  • Lee, Sang-Duck;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.112-117
    • /
    • 2007
  • The Internet leads the transformation of the all-over social life with its radical diffusion and development. Moreover, it can be more focussed on the electronic commerce using the Internet - a new type of commerce, which is diffusion and developing. In the paper, we propose an electronic payment protocol with a network-type electronic-cash based on Public Key Infrastructure(PKI). The proposed protocol overcomes the problem of NetBill which deals with only contents and can't ensure anonymity. It also prevents illegal copy and distribution and insures the greatest safety by means of giving a certification number to the digital contents offered on the on-line.

  • PDF

A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology (정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고)

  • Kim, Hyun-Kyung
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.

Research & Development of High Performance & Multi-Functional New Grouting Materials for Ground Improvement & Reinforcement (고성능 다기능 특수 그라우트 신재료 개발 및 기초지반보강재로의 사례 연구)

  • Park, Bong-Geun;Cho, Kook-Hwan;Na, Kyung;Yoon, Tae-Gook;Lee, Yong-Jun
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.338-350
    • /
    • 2010
  • As existing materials for ground reinforcement, chemical grout material using cementitous materials and waterglass was used. But many problems in terms of ground reinforcement effects were implicated. In this study, for development and applicability verification of new materials, viscosity, fluidity, permeability, Self-Leveling, keeping of drilled hole, antiwashout underwater, resistance of water (groundwater dilution and minimize material eluting) and the early strength and long-term strength characteristics of developed materials was confirmed, and material standards, and establishing construction standards for the various model tests were conducted. As a result, high viscosity, flowability, permeability and keeping of drilled hole characteristics are excellent, in addition to the early strength properties, dilution does nat occur to groundwater, including groundwater is available for dealing with environmental issues. Application of basic and reinforcement method by Filler function in addition to structure can also or development of a new concept can be expected. In addition, middle and large-diameter drilled shaft, micropile, ground anchors, soil-nailing, steel pipes multi-grouting reinforcement for cement injection process could be used enough to even be considered.

  • PDF

Application of Health Care Big data and Necessity of Traditional Korean Medicine Data Registry (보건의료 빅데이터를 활용한 연구방법 및 한의학 레지스트리의 필요성)

  • Han, Kyungsun;Ha, In-Hyuk;Lee, Jun-Hwan
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.17 no.1
    • /
    • pp.46-53
    • /
    • 2017
  • Health care big data is thought to be a promising field of interest for disease prediction, providing the basis of medical treatment and comparing effectiveness of different treatments. Korean government has begun an effort on releasing public health big data to improve the quality and safety of medical care and to provide information to health care professionals. By studying population based big data, interesting outcomes are expected in many aspects. To initiate research using health care big data, it is crucial to understand the characteristics of the data. In this review, we analyzed cases from inside and outside the country using clinical data registry. Based on successful cases, we suggest research method for evidence-based Korean medicine. This will provide better understanding about health care big data and necessity of Korean medicine data registry network.