• Title/Summary/Keyword: Remote Security

Search Result 574, Processing Time 0.027 seconds

A Lightweight Packet Filter for Embedded System (임베디드 시스템을 위한 경량의 패킷필터)

  • Lee, Byong-Kwon;Jeon, Joong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.813-820
    • /
    • 2006
  • The advance of computer and communication technologies enables the embedded systems to be equipped with the network communication interfaces. Their appearance in network leads to security issues on the embedded systems. An easy way to overcome the security problem is to adopt the packet filter that is implemented in the general computer systems. However, general packet filters designed for host computers are not suitable to embedded systems because of their complexity. In this paper, we propose a lightweight packet filter for embedded systems. The lightweight packet filter is implemented in the kernel code. And we have installed a Web-GUI interface for user to easily set the filtering policies at remote space. The experimental results show that the proposed packet filter decreases the packet delivery time compared to the packet filter designed for host computers and it is comparable to the systems without packet filter.

Design and Implementation of Multiplex Certification System Using XML Signature For WBI (WBI에서 XML 전자 서명을 이용한 다중 인증 시스템 설계 및 구현)

  • Won, Eom-Ki;Kim, Jung-Jae;Jun, Moon-Seuck
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.457-464
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence abount an age of information demand is a education focused on a learner and remote education based on information technology. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. But using these are main contents that users have to pay about Certification service to get CA certificate from 2004 me. This paper propose multiplex Certification remote education agent system using XML digital signature to satisfy security requirement.

  • PDF

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

IOT Intelligent Watering Sensor For Indoor Plant

  • Hana, Mujlid;Haneen Daifallah, Alghamdi;Hind Abdulaziz, Alkharashi;Marah Awadh, Alkhaldi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.171-177
    • /
    • 2022
  • The number of people who own indoor plants is growing today, but as a result of their busy lifestyles-such as work or travel-as well as a lack of enthusiasm in caring for their plants, their plants wither. The use of an irrigation control system with a surveillance camera can assist such folks in taking care of their plants. Such a device can assist in remotely watering plants at predetermined times and checking on the health of the plants. The proprietors would be able to live comfortably without feeling bad thanks to this change. Internet access is required for this technology in order to monitor the plants and control the watering through apps. A sensor is installed in the soil to monitor soil humidity and send data to the microcontroller for irrigation, allowing the owner to schedule irrigation as they see fit and keep an eye on their plants all day. With the use of a remote irrigation control system, the plants will grow properly and be irrigated with the proper amount of water, and the owners will be so glad and delighted to watch their plants. Knowing the time and quantity of water are vital parts of the plant growth.

A Novel Method for Robots to Provide First Aid to Injured People Inside the Mines Using GIS Technology

  • Eman Galaleldin Ahmed Kalil
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.1-8
    • /
    • 2023
  • The artificial intelligence of robot is the weakness of digital intelligence of a person who able to train, self-realize and to develop competences, creative, professional and behavioral skills. A new methodology proposed for managing robots inside the mines using an electronic system designed for driving robots to injured people in seas, mines or wells who can not be reached by human force. This paper also explains the concept of managing and remote-controlling the process of searching and helping the injured. The user controls the robot through an application that receives all the reports that the robot sends from the injured person. The robot's tasks are to take a sample of the blood of the injured person, examine it, and measure the percentage of oxygen underground and send it to the user who directs the robot to pump a specific percentage of oxygen to the injured person. The user can also communicate with the person The patient and determine his condition through the camera connected to the robot equipped with headphones to communicate with the injured and the user can direct the camera of the robot and take x-rays from the injured.

A Study on the Improvement of User Identification of Non-Face-to-Face Financial Transactions with Messenger Phishing Case (비대면 금융거래 사용자 확인 개선방안 연구 - 메신저피싱 사례를 중심으로)

  • Eun Bi Kim;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.353-362
    • /
    • 2023
  • Messenger phishing, communications frauds crime, exploits remote control of smartphones and non-face-to-face financial transactions, causing property damage due to money transfers, as well as account opening and loans in the name of victims. Such financial accidents may be careless of victims, but the current messenger phishing criminal method is intelligent and can be seen as digging into loopholes in the non-face-to-face user verification process. In this paper we analyze how messenger phishing uses loopholes in user identification procedures in non-face-to-face financial transactions. Through experiments, it is suggested to improve the non-face-to-face verification process for safer financial transactions.

Load Control between PV Power Plants and Diesel Generators

  • Mohamed Khalil Abdalla MohamedAli;AISHA HASSAN ABDALLA HASHIM;OTHMAN KHALIFA
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.33-40
    • /
    • 2024
  • Introducing renewable energy sources, such as wind and photovoltaic arrays, in microgrids that supply remote regions with electricity represents a significant leap in electricity generation. Combining photovoltaic panels and diesel engines is one of the most common ways to supply electricity to rural communities. Such hybrid systems can reduce the cost of electricity generation in these remote power systems because they use free energy to balance the power generated by diesel engines. However, the combination of renewable energy sources and diesel engines tends to complicate the sizing and control of the entire system due to the intermittent nature of renewable energy sources. This study sought to investigate this issue in depth. It proposes a robust hybrid controller that can be used to facilitate optimum power sharing between a PV power source and diesel generators based on the dynamics of the available PV energy at any given time. The study also describes a hybrid PV-diesel power plant's essential functional parts that produce electricity for a microgrid using a renewable energy source. Power control needs to be adjusted to reduce the cost of power generation.

Matching Method for Ship Identification Using Satellite-Based Radio Frequency Sensing Data

  • Chan-Su Yang;Jaehoon Cho
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.2
    • /
    • pp.219-228
    • /
    • 2024
  • Vessels can operate with their Automatic Identification System (AIS) turned off, prompting the development of strategies to identify them. Among these, utilizing satellites to collect radio frequency (RF) data in the absence of AIS has emerged as the most effective and practical approach. The purpose of this study is to develop a matching algorithm for RF with AIS data and find the RF's applicability to classify a suspected ship. Thus, a matching procedure utilizing three RF datasets and AIS data was employed to identify ships in the Yellow Sea and the Korea Strait. The matching procedure was conducted based on the proximity to AIS points, ensuring accuracy through various distance-based sections, including 2 km, 3 km, and 6 km from the AIS-based estimated points. Within the RF coverage, the matching results from the first RF dataset and AIS data identified a total of 798 ships, with an overall matching rate of 78%. In the cases of the second and third RF datasets, 803 and 825 ships were matched, resulting in an overall matching rate of 84.3% and 74.5%, respectively. The observed results were partially influenced by differences in RF and AIS coverage. Within the overlapped region of RF and AIS data, the matching rate ranged from 80.2% to 98.7%, with an average of 89.3%, with no duplicate matches to the same ship.

The Study of Security Life Cycler Energy Service Platform or Universal Middleware (유니버설미들웨어상의 생명주기기반 보안에너지 서비스플랫폼 연구)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.291-293
    • /
    • 2017
  • Security services that support electric energy service gateway require relatively high reliability. In particular, the application services that accompany communications and data are run organically. Each of the security services should support a secure service platform that supports a secure, scalable life cycle for existing services which should be extends security layer of Universal Middleware such as OSGi platform. In this convergence platform, it is the study of security transfer modular services that allow independent life cycle management of systems through Universal middleware. First, It is modular in terms of energy consumption service and data, enabling real-time operation, communications, remote management and applications. Second, the life cycle of the secure module to support the life cycle of secure, delete, start and updating of the security module by applying the security policy module layer concept. It is modular in terms of power generation and accountability, enabling us to distinguish between reliability and accountability in a large volume of data models in the smart grid, the service was intended to be standardized and applied to the security service platform.

  • PDF

Consideration of New Convergence Security Threats and Countermeasures in the Zero-Contact Era (비대면 시대의 신 융합보안 위협과 대응 방안에 대한 고찰)

  • Yu, Dong-Hyun;Kim, Yong-Uk;Ha, Young-Jae;Ryu, Yeon-Seung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • Recently, new types of security crimes have been steadily occurring in Korea due to environmental changes such as the development of IT technology, and responding to these threats has become a key national task for the establishment of a safe society as well as individuals and businesses. Meanwhile, as the Zero-Contact Era has arrived since the COVID-19 Pandemics, a new convergence security threat that combines the characteristics of the Zero-Contact Era with the existing IT development is threatening our society. Research to prevent and correct these new levels of threats is continuously required in this study. Chapter 1 examined the causes of new convergence security threats and Chapter 2 discussed cybersecurity, fake news, remote voting·work and video security threats as five major threats.