• Title/Summary/Keyword: Secure Monitoring

Search Result 337, Processing Time 0.026 seconds

A Secure Monitoring Mechanism for Short Distance Wireless Communication (근거리 무선 통신의 안전한 보안 모니터링 기법)

  • Seo, Dae-Hee;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.335-344
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth and WLAN which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth and WLAN has weaknesses in its security features when its in real services are applied to m-commerce. The purpose of this study is to propose techniques that affinity considers to item that is non-security enemy who is although there is no public secure division direct connection in peculiar environment of radio environment as well as limitation security enemy of short distance radio communication. Propose secure monitoring techniques for straggling device to user center also applying proposed way to Bluetooth and WLAN that are short distance communication representative technology based on item that is security enemy and item that is rain suity enemy.

NDynamic Framework for Secure VM Migration over Cloud Computing

  • Rathod, Suresh B.;Reddy, V. Krishna
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.476-490
    • /
    • 2017
  • In the centralized cloud controlled environment, the decision-making and monitoring play crucial role where in the host controller (HC) manages the resources across hosts in data center (DC). HC does virtual machine (VM) and physical hosts management. The VM management includes VM creation, monitoring, and migration. If HC down, the services hosted by various hosts in DC can't be accessed outside the DC. Decentralized VM management avoids centralized failure by considering one of the hosts from DC as HC that helps in maintaining DC in running state. Each host in DC has many VM's with the threshold limit beyond which it can't provide service. To maintain threshold, the host's in DC does VM migration across various hosts. The data in migration is in the form of plaintext, the intruder can analyze packet movement and can control hosts traffic. The incorporation of security mechanism on hosts in DC helps protecting data in migration. This paper discusses an approach for dynamic HC selection, VM selection and secure VM migration over cloud environment.

Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems

  • Islam, Md. Tahidul;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2213-2231
    • /
    • 2013
  • Compressed sensing is a novel technology used in the field of wireless communication and sensor networks for channel estimation, signal detection, data gathering, network monitoring, and other applications. It plays a significant role in highly secure, real-time, well organized, and cost-effective data communication in smart-grid (SG) systems, which consist of multi-tier network standards that make it challenging to synchronize in power management communication. In this paper, we present a multi-layer communication model for SG systems and propose compressed-sensing based data transmission at every layer of the SG system to improve data transmission performance. Our approach is to utilize the compressed-sensing procedure at every layer in a controlled manner. Simulation results demonstrate that the proposed monitoring devices need less transmission power than conventional systems. Additionally, secure, reliable, and real-time data transmission is possible with the compressed-sensing technique.

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks (무선센서 네트워크에서의 육분원 방식 모니터링 기반 안전한 데이터 병합 및 위조 데이터 필터링)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2012
  • Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.

An Efficient Monitoring Method of a Network Protocol for Downloadable CAS

  • Jeong, Young-Ho;Kwon, Oh-Yung;Ahn, Chung-Hyun;Hong, Jin-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.32-35
    • /
    • 2010
  • This paper presents an efficient monitoring method of a network protocol for a downloadable conditional access system (DCAS) that can securely transmit conditional access software via a bi-directional communication channel. In order to guarantee a secure channel based on mutual authentication between a DCAS head end server and set-top boxes, DCAS messages are encrypted and digitally signed. Owing to applied cryptographic algorithms, it is impossible to get information from messages directly without additional processing. Through categorizing DCAS messages into several groups, the proposed monitoring method can efficiently parse and trace DCAS messages in real-time. In order to verify the stability and effectiveness of the proposed monitoring method, we implement a DCAS monitoring system capable of capturing and parsing all DCAS messages. The experimental results show that the proposed monitoring method is well designed.

  • PDF

Monitoring and Tracking Model of Logistics Based on ICT network

  • Cho, Sokpal;Chung, Heechang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.489-492
    • /
    • 2016
  • Transportation in the logistics, many business organizations are engaged in monitoring and tracking the vehicles in order to improve logistics services, reduce expenses and secure security in cargo transportation. It is saving time and money by tracking and monitoring vehicles which transport cargo in supply chain of logistics. Therefore the main issue of delivery flow is to improve services, and ensure the safety in transportation system. This article suggests the tracking and monitoring model to keep safety transports on ICT network. It focuses on precise delivery control by monitoring and tracking vehicles to save time and costs. The status of product movement is analyzed for proper decision making. The vehicle embedded with RFID is automatically tracked in the movement process by tracking and monitoring model. The main role keeps safety tracking to reduce costs and to deliver products at proper time and location.

  • PDF

A Study on Applying 3D Automatic Displacement Measurement System for Safety Monitoring of Building Demolition Works (건축물 해체공사 안전 모니터링을 위한 3차원 자동변위계측 시스템 활용 방안 연구)

  • Park, Han-Bin;Han, Hye-Rim;Kim, Taehoon;Cho, Kyuman;Cho, Chang-Geun;Kim, Hyeong-Ki
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.11a
    • /
    • pp.229-230
    • /
    • 2022
  • According to the national building status, there are a total of 2.89 million buildings that are over 30 years old after completion, and the number is increasing by more than 70,000 to 80,000 buildings every year. As a result, the demand for demolition works is also increasing, and more than 3 to 4 collapse accidents occur steadily every year during demolition work. Major causes of accidents include non-compliance with plans, negligence of on-site supervisors, and failure to secure structural safety. Due to the strengthening of the Severe Disaster Punishment Act, there is growing interest in the demand for secure management of collapse detection during demolition works. Therefore, this study aims to investigate the applicability of real-time safety monitoring systems using a total station capable of 3D automatic displacement measurement in building demolition work for securing structural safety by the load changes during the demolition process.

  • PDF

Development and Application of SITES (부지환경종합관리시스템 개발과 적용)

  • Park, Joo-Wan;Yoon, Jeong-Hyoun;Kim, Chank-Lak;Cho, Sung-Il
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.3
    • /
    • pp.205-215
    • /
    • 2008
  • SITES(Site Information and Total Environmental Data Management System) has been developed for the purpose of systematically managing site characteristics and environmental data produced during the pre-operational, operational, and post-closure phases of a radioactive waste disposal facility. SITES is an integration system, which consists of 4 modules, to be available for maintenance of site characteristics data, for safety assessment, and for site/environment monitoring; site environmental data management module(SECURE), integrated safety assessment module(SAINT), site/environment monitoring module(SUDAL) and geological information module for geological data management(SITES-GIS). Each module has its database with the functions of browsing, storing, and reporting data and information. Data from SECURE and SUDAL are interconnected to be utilized as inputs to SAINT. SAINT has the functions that multi-user can access simultaneously via client-server system, and the safety assessment results can be managed with its embedded Quality Assurance feature. Comparison between assessment results and environmental monitoring data can be made and visualized in SUDAL and SITES-GIS. Also, SUDAL is designed that the periodic monitoring data and information could be opened to the public via internet homepage. SITES has applied to the Wolsong low- and intermediate-level radioactive waste disposal center in Korea, and is expected to enhance the function of site/environment monitoring in other nuclear-related facilities and also in industrial facilities handling hazardous materials.

  • PDF

Construction and Monitoring of Test bed in Urban Sediment Disaster Prevention Technology (도심지 토사재해 방어기술 테스트베드 구축 및 모니터링 연구)

  • Lee, Jung-min;Kim, Hyo-Jin;Lee, Yoon-Sang;Jin, Kyu-Nam
    • Land and Housing Review
    • /
    • v.8 no.3
    • /
    • pp.161-169
    • /
    • 2017
  • In this study, sediment transfer and precipitation analysis of the test bed watershed was conducted through the model for the application and practical use of the urban sediment disaster prevention technology, and used this as an aid to design to secure reliability. In addition, conducted the test bed monitoring with the defense technology, analyzed the effect, and established the maintenance plan. Analyzed the change of soil deposition volume through arbitrary slope adjustment for the currently installed stormwater conduit of the test bed watershed. As a result, it is important to reduce the total sedimentation amount in the adjustment of the slope of the entire pipeline, but it is important that the sedimentation depth of each sediment does not rise to such a degree as to threaten the performance of the pipeline. Considering these matters, it is necessary to design the pipeline to prevent the clogging of the soil from the viewpoint of the reliability of the entire pipeline. The sediment disaster defense technology test bed is divided into a new city and an old city, and old city test bed is under construction. The result obtained through the monitoring of the test bed in the new city, sediment disasters such as debris can delay the time to reach the downtown area, and it is possible to secure the golden time, such as evacuation and rescue through the warning system. Also, the maintenance of the test bed application was suggested. Continuous and systematic monitoring is required for securing the reliability of element technology and successful commercialization.

Technological Issues for Body Information Monitoring (생체정보 모니터링을 위한 기술적 이슈)

  • Park, Jong-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.2
    • /
    • pp.105-114
    • /
    • 2013
  • Expansion and growth of body information monitoring service based on WBAN technology speeds up technological evolution in bio-signal detection and measurement, real time monitoring of vital sign and telemedicine control. It is essential for taking action against such technological evolution that newest technology trend and standardization issue should be included in designing and materializing body-information monitoring system strategically to secure preceding technology and to preoccupy market. This paper investigates and analyzes technological trend & issues, and suggests task to take action technologically.