• Title/Summary/Keyword: Remote Security

Search Result 574, Processing Time 0.021 seconds

A Model to Identify Expeditiously During Storm to Enable Effective Responses to Flood Threat

  • Husain, Mohammad;Ali, Arshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.23-30
    • /
    • 2021
  • In recent years, hazardous flash flooding has caused deaths and damage to infrastructure in Saudi Arabia. In this paper, our aim is to assess patterns and trends in climate means and extremes affecting flash flood hazards and water resources in Saudi Arabia for the purpose to improve risk assessment for forecast capacity. We would like to examine temperature, precipitation climatology and trend magnitudes at surface stations in Saudi Arabia. Based on the assessment climate patterns maps and trends are accurately used to identify synoptic situations and tele-connections associated with flash flood risk. We also study local and regional changes in hydro-meteorological extremes over recent decades through new applications of statistical methods to weather station data and remote sensing based precipitation products; and develop remote sensing based high-resolution precipitation products that can aid to develop flash flood guidance system for the flood-prone areas. A dataset of extreme events has been developed using the multi-decadal station data, the statistical analysis has been performed to identify tele-connection indices, pressure and sea surface temperature patterns most predictive to heavy rainfall. It has been combined with time trends in extreme value occurrence to improve the potential for predicting and rapidly detecting storms. A methodology and algorithms has been developed for providing a well-calibrated precipitation product that can be used in the early warning systems for elevated risk of floods.

Designing a Remote Electronic Irrigation and Soil Fertility Managing System Using Mobile and Soil Moisture Measuring Sensor

  • Asim Seedahmed Ali, Osman;Eman Galaleldin Ahmed, Kalil
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.71-78
    • /
    • 2022
  • Electronic measuring devices have an important role in agricultural projects and in various fields. Electronic measuring devices play a vital role in controlling and saving soil information. They are designed to measure the temperature, acidity and moisture of the soil. In this paper, a new methodology to manage irrigation and soil fertility using an electronic system is proposed. This is designed to operate the electronic irrigation and adds inorganic fertilizers automatically. This paper also explains the concept of remote management and control of agricultural projects using electronic soil measurement devices. The proposed methodology is aimed at managing the electronic irrigation process, reading the moisture percentage, elements of soil and controlling the addition of inorganic fertilizers. The system also helps in sending alert messages to the user when an error occurs in measuring the percentage of soil moisture specified for crop and a warning message when change happens to the fertility of soil as many workers find difficulty in daily checking of soil and operating agricultural machines such as irrigation machine and soil fertilizing machine, especially in large projects.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

The Proposal and Implementation of New Private Parcel Locker with Automatic Transmission Function of Short Message Service by Smartphone Application (스마트폰 어플리케이션에 의해 단문 메시지 서비스의 자동 발송 기능을 가진 새로운 무인 택배함 제안 및 구현)

  • Seo, Jong-Beom;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.101-108
    • /
    • 2017
  • In existing public parcel locker, if there is not an empty storage box, it is not used. In existing private parcel locker, because it is a lock-based locker, there is strong weak point in security. To prevent these drawbacks, the proposed private parcel locker has a menu-driven remote control application which is operated on smartphone. The lock release and the security number change by the security number which is stored in the Electrically erasable read-only memory, are possible. As a result, the proposed method has better advantages than the existing methods in terms of unnecessariness of empty storage box check and security by the security number accumulation function and the automatic SMS transmission representing parcel locker operation result.

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

A Design and Implement of IPSec-based iSCSI Storage system in wireless computing environment (무선 컴퓨팅 환경에서의 IPSec 기반 iSCSI 스토리지 시스템의 설계 및 구현)

  • Chung, Ho-Won;Kim, Dae-Sung;Oh, Sei-Woong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.302-307
    • /
    • 2004
  • It need remote storage system using iSCSI to overcome a limit of PDA storage device used in currently wireless network environment, and IPSec to solve a security problem of wireless environment increasing continually. In this paper, it design and implement iSCSI to use a remote storage system on PDA, and IPSec for security. The experimental results in real environment show a system performance.

  • PDF

Web Based Smart Home Automation Control System Design

  • Hwang, Eui-Chul
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.70-76
    • /
    • 2015
  • The development of technology provides and increases security as well as convenience for humans. The development of new technology directly affects the standard of life thanks to smart home automatic control systems. This paper describes a door control, automatic curtain, home security (CCTV, fire, gas, safe, etc.), home control (energy, light, ventilation, etc.) and web-based smart home automatic controller. It also describes the use of ARM (Advanced RISC Machines) for automatic control of home equipment, a Multi-Axes Servo Controller using FPGA (Field Programmable Gate Array) and PLC (programmable logic controller). Additionally, it describes the development of a HTML editor using web auto control software. The tab loading time (7 seconds) is faster when using ARM-based web browser software instead of Chrome and Firefox is used because the browser has a small memory footprint (300M). This system is realized by web auto controller language which controls and uses PLCs that are easier than existing devices. This smart home automatic control technology can control smart home equipment anywhere and anytime and provides a remote interface through mobile equipment.