• Title/Summary/Keyword: Secure Development

Search Result 1,876, Processing Time 0.029 seconds

Development of pre-treatment for the injection water into the aquifer storage and recovery(ASR) in Korea: The two-step rapid filter to reduce physical clogging and secure the volume of the injected water (지하저수지(ASR) 유입수 전처리기법 개발: 물리적 폐색 저하 및 수량공급원활을 위한 2 단계 급속여과지)

  • Park, Byeong-Joo;Do, Si-Hyun;Hong, Seong-Ho
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.3
    • /
    • pp.337-345
    • /
    • 2015
  • Two step rapid filter system as a pre-treatment for the injected water into aquifer storage and recovery (ASR) in Korea was developed to reduce physical blockage and secure the volume of the injected water. First, single rapid sand filters with three different media sizes (0.4~0.7, 0.7~1.0 and 1.0~1.4 mm) were tested. Only two sizes (0.4~0.7 and 0.7~1.0 mm) satisfied target turbidity, below 1.0 NTU. However, they showed the fast head loss. To prevent the fast head loss and secure the volume of the injected water, a rapid anthracite filter with roughing media size (2.0~3.4 mm) were installed before a single rapid sand filter. As results, both the target turbidity and reduction of head loss were achieved. It was determined that the media size for a rapid sand filter in two step rapid filter system (i.e. a rapid anthracite filter before a rapid sand filter) was 0.7~1.0 mm. In addition, the effects of coagulant doses on the removal of natural organic matter (NOM), which might cause a biological clogging, were preliminarily evaluated, and the values of $UV_{254}$, dissolved organic carbon (DOC) and SUVA were interpreted.

Secure Authentication Protocol based on a Chameleon Hash Function for Ambient Living Assisted-Systems (전천 후 생활보조 시스템을 위한 카멜레온 해시 함수 기반의 안전한 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.73-79
    • /
    • 2020
  • Due to the rapidly ageing population and low birth rates, most countries have faced with the problems of an ageing population. As a result, research into aging and the means to support an aging population has therefore become a priority for many governments around the world. Ambient Assisted Living(AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can provide more safety for the elderly, offering emergency response mechanisms and fall detection solutions. Since the information transmitted in AAL systems is very personal, however, the security and privacy of such data are becoming important issues that must be dealt with. In this paper, we propose a Chameleon hash-based secure authentication protocol for AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.

Study on Digital Finance Secure Architecture based on Blockchain (블록체인 기반의 디지털 금융보안 아키텍처에 관한 연구)

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.5
    • /
    • pp.415-425
    • /
    • 2021
  • In line with the trend of the digital transformation, the financial sector is providing financial services with new technologies. Among them, the open banking, which is drawing attention from global financial industry, is a service environment that maximizes customers' convenience and data utilization. In addition, the shift in the digital paradigm has also increased anxiety that security problems such as hacking and information leakage caused by data sharing are also concerned. A failure to overcome the negative view will hinder the development of financial services. This study presents a security governance system that can safely and comprehensively manage data in a digital financial ecosystem. This prepares a technical application plan by presenting a digital financial security architecture to field workers, focusing on the open banking service environment. It can be seen that this study is worthwhile by presenting a comprehensive information protection system that allows financial IT to introduce and utilize open banking services in a changing environment.

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

A Study on Privacy Preserving Methods in the Metaverse Environment Using Secure Multi-Party Computation (안전한 다자간 연산을 활용한 메타버스 환경에서의 프라이버시 보존 방안 연구)

  • Jiun Jang;Kwantae Cho;Sangrae Cho;Soo Hyung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.725-734
    • /
    • 2024
  • The rapidly growing metaverse environment has received widespread attention across various fields such as health and medicine, culture and gaming, as well as politics. However, the excessive collection of personal data by the diverse sensors and devices used in the metaverse environment poses a substantial threat to user privacy. In this paper, we investigate existing cases of secure Multi-Party Computation(MPC) applications, examine the services anticipated to be necessary for the expansion of the metaverse environment, and analyze the privacy issues present in the metaverse environment as well as the limitations of current real-world services. Based on these findings, we propose application scenarios that utilize MPC to preserve user privacy in the metaverse environment. These proposed MPC application scenarios present a new perspective in metaverse security research. In the future, they are expected to be utilized in the development of secure metaverse services.

Health Policy and Social Epidemiology (보건정책과 사회역학)

  • Shin, Young-Jeon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.38 no.3
    • /
    • pp.252-258
    • /
    • 2005
  • Major approaches of Social epidemiology; 1)holistic, ecological approach, 2)population based approach, 3)development and life-course approach, 4)contextual multi-level approach, have stressed the importance of not only social context of health and illness, but also the population based strategy in the health interventions. Ultimately, it provides the conceptual guidelines and methodological tools to lead toward the healthy public policies; integrated efforts to improve condition which people live: secure, safe, adequate, and sustainable livelihoods, lifestyles, and environments, including housing, education, nutrition, information exchange, child care, transportation, and necessary community and personal social and health services.

Field Survey on the Shading Structure and Environmental Management for Ginseng Cultivation (인삼재배시설의 구조 및 환경관리 실태조사)

  • Nam, Sang-Woon
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.65-68
    • /
    • 2002
  • This study was conducted to secure the structural safety and to build fundamental data for development of controlled environment facilities in ginseng cultivation. Shading structures of ginseng cultivation were classified with materials, structural forms, and detailed setups. They are wood or steel pipe, single or multi span, and frame or cable type. For structures having representative forms and dimensions, modeling for structural analysis was builded by SAP2000. And there was almost no farm carrying out the environmental management specially.

  • PDF

Development of Security Analysis Tool for SSL/TLS Handshake Protocol (SSL/TLS Handshake 프로토콜의 보안성 평가도구 개발)

  • 박지철;양종필;박영호;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.840-843
    • /
    • 2002
  • 본 논문에서는 전송계층에서의 안전한 통신을 위한 사실상의 표준으로서 자리를 잡고 있는 Secure Sockets Layer(SSL)와 Transport Layer Security(TLS)의 Handshake 프로토콜 취약성을 평가하기 위한 평가 도구를 제안한다. SSL/TLS Handshake 프로토콜 고유의 취약성과는 달리 구현 제품들에서의 문제점으로 인하여 보안성이 결여될 수 있다. 현재 SSL/TLS를 구현한 제품들이 다양하게 구현되어 있으나 구현과정에서 벤더나 프로그래머에 따라 SSL/TLS Handshake 프로토콜 고유의 취약성들이 다르게 표출될 수 있으므로 본 논문에서는 이들 구현제품들의 문제점으로 인한 보안성 결여를 평가하기 위한 도구를 개발한다.

  • PDF