• Title/Summary/Keyword: Secure Development

Search Result 1,865, Processing Time 0.033 seconds

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

A Study on Major Challenges for Korean High-Speed Railway and How to Secure Its Competitive Edge (고속철도의 중점과제와 경쟁력 확보 방안)

  • Kang, Jin-Kyu
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.40-45
    • /
    • 2003
  • Korea selected to introduce high-speed railway system from advanced countries in order to accumulate railway technologies and develop exiting domestic logistics system. After many twists and turns, we adopted to introduce France's high-speed railway called 'TGV'. Despite many difficulties along with trials and errors, it is expected that Korean high-speed railway will be brilliantly launched in April 2004, although it has been commissioned for multi-discipline tests. It is forecast that the opening of high-speed railway will bring us the epoch-making development of logistics system. However, what if there are really some problems in the operation of high-speed railway? We cannot consider and highlight only the positive aspects of our own high-speed railway. In terms of many challenging aspects we would face in the future, there would be some matters we must consider and point out in this opportunity. In this regard, the direction for developing high-speed railway stations requires the harmony between profitability and public benefits, which must involve compatibility with other traffice systems and practical policies to secure competitive edges.

  • PDF

Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel

  • Kim, Tae-Yong;Jang, Won-Tae;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.561-564
    • /
    • 2009
  • A cryptographic dongle, which is capable of transmitting encrypted voice signals over the CDMA/GSM voice channel, was designed and implemented. The dongle used PIC microcontroller for signals processing including analog to digital conversion and digital to analog conversion, encryption and communicating with the smart phone. A smart phone was used to provide power to the dongle as well as passing the encrypted speech to the smart phone which then transmits the signal to the network. A number of tests were conducted to check the efficiency of the dongle, the firmware programming, the encryption algorithms, and the secret key management system, the interface between the smart phone and the dongle and the noise level.

A study on the Critical speed of Korean Tilting Train (한국형 틸팅열차의 임계속도에 관한 연구)

  • Kim, Nam-Po;Kim, Jung-Seok;Park, Tae-Won
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.162-168
    • /
    • 2007
  • The critical speed above which the vehicle become unstable should be fundamentally verified in the development of new train. In case of high speed tilting train, which require both higher critical speed and higher curving speed, the critical speed should be more carefully treated because the both requirements are conflicting each other in the conventional train design. This research has been performed to estimate the linear and non-linear critical speed of 200km/h Korean Tilting Train which has been developing. The newly developed self-steering mechanism was attached to the tilting train to secure critical speed under the lower yaw stiffness which was inevitable to secure higher curving performance. The simulation to predict critical speed was done by commercial vehicle dynamic S/W. Full scale roller rig test was carried out for the validation of numerical results and effectiveness of self-steering mechanism.

  • PDF

CIM and OPC-UA based Integrated Platform Development for ensuring Interoperability

  • Kim, Jun-Sung;Park, Hee-Jeong;Choi, Seung-Hwan
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.2
    • /
    • pp.233-244
    • /
    • 2016
  • Smart grid is called it as a system of systems. There are diverse types of systems in smart grid environment. Therefore, one of key factors to achieve smart grid successfully is interoperability among diverse systems. To secure interoperability, smart grid operating system should be developed complied with standards in terms of the data representation and communication. Common Information Model (CIM) and OLE Process for Control - Unified Architecture (OPC-UA) are the representative international standards in smart grid domain. Each standard defines data representation and communication by providing common information model and the unified architecture. In this paper, we explain a smart grid platform that we have developed to comply with CIM and OPC-UA standards for secure interoperability among numerous legacy systems.

Development of Atomization Spraying System for Solvent-free Paint(I) - Flow Analysis of Hydraulic Actuator - (무용제 도료용 무화 분사시스템 개발(I) - 유압 엑츄에이터의 유동해석 -)

  • Kim, Dong-Keon;Kim, Bong-Hwan;Shin, Sun-Bin
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.10 no.2
    • /
    • pp.61-66
    • /
    • 2011
  • The purpose of this paper is to design a hydraulic actuator to operate under high pressure conditions. The flow characteristics under design conditions of hydraulic actuator were numerically conducted by commercial fluid dynamic code(ANSYS CFX V11). The numerical analysis was performed by transient technique according to the variation of stroke times, which was changed from 0 to 1 second by interval of 0.01. Turbulence model, $k-\omega$ SST was selected to secure more accurate prediction of hydraulic oil flow. The ICEM-CFD 11 and CFXMesher, reliable grid generation software was also adapted to secure high quality grid necessary for the reliable analysis. According to the simulation results, the flow rate which was supplied to the hydraulic actuator was 30.4l/min. These results are in good agreement with design results within 3.5% error.

Relationships Between Maternal Caregiving System and Child's Attachment System (어머니의 양육체계와 유아의 애착체계간의 관계)

  • Ryu, Youngmi;Lee, Young
    • Korean Journal of Child Studies
    • /
    • v.26 no.4
    • /
    • pp.125-143
    • /
    • 2005
  • This study focused on the importance of the attachment/caregiving system at a dyadic level, and examined relationships between maternal representations of caregiving, maternal caregiving behavior, and child attachment. Seventy-five middle-class mothers and their preschool children(ages 3-4) participated in the study. Results indicated a strong correspondence between maternal representations of caregiving and maternal caregiving behavior at the secure/insecure and ordered/disordered level. The correspondence between maternal representations of caregiving and their preschooler's attachment, and between maternal caregiving behavior and their preschooler's attachment at the secure/insecure level were also strong. The correspondence between maternal representations of caregiving and their preschooler's attachment was mediated by maternal caregiving behavior.

  • PDF

Investigation of Users' Satisfaction of Control & Operation Technology Development for Secure Container Transportation (컨테이너 화물 안전수송을 위한 관제 및 운용기술 개발에 관한 사용자 만족도)

  • Ha, Chang-Seung;Hwang, Seok-Jun;Sohn, Bo-Ra
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.24 no.4
    • /
    • pp.482-493
    • /
    • 2012
  • Logistics security has been enhanced to control cargo containers effectively and safely in global logistics. In response to the change, This study describes the system now being developed that tracks container position, watches cargo security status and gets informations of surrounding until the cargos arrived at its destination. We examine completion and satisfaction of the product for prospective users. For this, considering earlier studies about customer trust, satisfaction, service quality and purchase decision, we analyse an effect among the variables empirically. As a result, when the program is released, we examine customers' satisfaction and purchase decision for the informations to be offered from the program.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost