• Title/Summary/Keyword: Secure area

Search Result 934, Processing Time 0.035 seconds

A Secure Communication Scheme without Trusted RSU Setting for VANET (신뢰 RSU 세팅이 필요 없는 VANET 보안통신 기법)

  • Fei, He;Kun, Li;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.75-87
    • /
    • 2010
  • Secure communication has been one of the main challenges in vehicular ad hoc networks(VANET) since broadcast messages from nearby vehicles contain life-critical information for drivers and passengers. So far various secure communication schemes have been proposed to secure the communication in VANET, and they satisfy most security requirements. However most of them need to put trust on roadside units(RSUs), which are usually deployed in unattended area and vulnerable to compromise. In this paper, we propose a secure communication scheme, which does not need to put trust on RSUs. And we adopt a grouping technique to averagely divide the huge burden in the server without jeopardizing the anonymity of users. Moreover we design a complete set of protocols to satisfy common security requirements with a relatively lower hardware requirement. At last, we evaluate the scheme with respect to security requirements, communication overhead, storage overhead and network performance.

Rethinking of Research and Educational Trends in Foreign Studies Field in Korea (한국에서의 해외지역 연구와 교육에 대한 비판적 고찰)

  • Kwon, Se Eun
    • Cross-Cultural Studies
    • /
    • v.22
    • /
    • pp.279-301
    • /
    • 2011
  • This paper is aimed to examine the current research and educational problems of foreign studies in Korean universities and review some alternative ways. Area studies as foreign studies have several characteristics which are different from those of the other research disciplines. It is a research and educational program that promotes comprehensive understanding about political, economic, social, and cultural phenomena of a specific area in the world. For better understand 'others', researchers in the field of area studies must explain the whole mechanism of the area, which could be revealed in terms of the very existence of its reality. Foreign studies are accomplished with joint-research method, collaborating two or more different research disciplines and based on the contemporary system of knowledge accumulation and educational program. Therefore, the critical issue can be gradually taken on a political and social characteristic. At this point, research and educational manner in foreign studies field in Korea should be changed to secure the academic reflections of temporality, sociality, placeness using a new paradigm such as complexity.

Analysis on Current Printing Industry in Russia (러시아 인쇄 산업 현황 분석 연구)

  • 김병현;신광철
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.20 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • The objective of this study was carried out to investigate the study of printing presses and material industry for foreign countries market development(The point of Russia market) by examine the status of printing industry in domestic and russian. The results obtained from this study were the development and insurance of technical in printing industry market seemed to have secure a technical area in 21th century owing to have a exercise influence over about itself and material industry area.

  • PDF

Evaluation of SWMM Model Adjustment for Rubber-tired Tram Disaster Management System against the Snow-melt during the Winter (겨울철 융설을 대비한 바이모달 트램 재해관리 시스템의 SWMM 모형 적용성 평가)

  • Kim, Jong-Gun;Park, Young-Kon;Yoon, Hee-Taek;Park, Youn-Shik;Jang, Won-Seok;Yoo, Dong-Seon;Lim, Kyoung-Jae
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.56-60
    • /
    • 2008
  • Increasing urban sprawl and climate changes have been causing unexpected high-intensity rainfall events. Thus there are needs to enhance conventional disaster management system for comprehensive actions to secure safety. Therefore long-term and comprehensive flood management plans need to be well established. Recently torrential snowfall are occurring frequently, causing have snow traffic jams on the road. To secure safety and on-time operation of the Bi-modal tram system, well-structured disaster management system capable of analyzing the urban flash flooding and snow pack melt/freezing due to unexpected rainfall event and snowfall are needed. To secure safety of the Bi-modal tram system due to torrential snowfall, the snow melt simulation capability was investigated. The snow accumulation and snow melt were measured to validate the SWMM snow melt component. It showed that there was a good agreement between measured snow melt data and the simulated ones. Therefore, the Bi-modal tram disaster management system will be able to predict snow melt reasonably well to secure safety of the Bi-modal tram system during the winter. The Bi-modal tram disaster management system can be used to identify top priority area for snow removal within the tram route in case of torrential snowfall to secure on-time operation of the tram. Also it can be used for detour route in the tram networks based on the disaster management system predicted data.

  • PDF

Usability Evaluation of Touch Keyboard in Smart Watch Environment

  • Oh, Euitaek;Choi, Jinhae;Cho, Minhaeng;Hong, Jiyoung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.6
    • /
    • pp.569-580
    • /
    • 2016
  • Objective: This study aims to identify the most effective keyboard layout in the area of performance for securing usability in a smart watch-using environment and to verify the usability of touch keyboard calibrated by hand. Background: It is necessary to understand the environmental characteristics in using the smart watch and to secure the usability of touch keyboard based on this understanding in order to take account of the users who use the touch screen in the extreme input conditions caused by the small screen of a smart watch. Method: 30 participants in this study were required to input characters using the QWERTY keyboard and 3x4 keypad (Naratgul, Chunjiin), which were familiar with them, in order to grasp the keyboard layout suitable in the smart watch- using environment; the performance (error rate, performance time) of this case was measured. In addition, 30 participants in this study were required to input the characters setting the QWERTY keyboard with calibrated touch area and the one with uncalibrated touch area, based on the characteristics of touch behavior, by finger typing the keyboard, with the performance (error rate and performance time) of this case measured. Results: QWERTY keyboard (93.3sec) is found to be 31.2% faster than Naratgul keyboard, a kind of 3x4 keypad, and 43.6% faster than Chunjiin keyboard, in the area of efficiency, in the results of the usability evaluation regarding the keyboard layout. QWERTY keyboard with calibrated touch area (7.5%) is found to be 23.5% improved compared to the QWERTY keyboard with uncalibrated touch area (9.8%) in the area of accuracy (error rate). The results of the usability evaluation regarding the QWERTY keyboard with touch area calibrated by finger typing the keyboard and QWERTY keyboard with calibrated touch area (80.7sec) is found to be 5.7% improved compared to QWERTY keyboard with uncalibrated touch area (85.6sec) in the area of efficiency (performance time). Conclusion: QWERTY keyboard is found to have an effective layout in the area of efficiency in the smart watch-using environment, and its improved usability is verified in the areas of accuracy and efficiency in the QWERTY keyboard with a touch area calibrated by finger typing the keyboard. Application: The results of this study may be used to set up the basic touch keyboard of the smart watch. The input usability is expected to secure the smart watch-using environment, which is an extreme input condition by applying QWERTY keyboard with touch area calibrated by finger typing the keyboard.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

ARBITRATION IN THE UNITED STATES SECURITIES INDUSTRY : PROCEDURES AND SUBSTANTIVE FAIRNESS (미국의 증권중재제도에 관한 소고 - 공정성 요건을 중심으로 -)

  • Kim, Hee-Cheol
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.51-69
    • /
    • 2008
  • The financial industry in which arbitration is most frequently resorted to so as to resolve disputes is the sector related to the securities industry. Most securities related disputes are raised from broker-dealer controversies which is not new in the Republic of Korea. The disputes between securities brokers and customers are very frequently settled by arbitration in the United States. But the arbitration in the securities area may deprive investors from securities regulation's protection. Introducing the United States' Federal Supreme Courts cases, the author explores the logic of how the pre-dispute arbitration agreement compatible with Securities regulations. However, the author insist the South Korea should more careful in accepting pre-dispute arbitration contract in securities area. Mostly because of the lack of more specific way to secure substantive fairness in securities arbitration. Also the author worries about the possibility of prevailing pre-dispute arbitration agreement in all of the securities investment contract without any other choices, or securities laws' protection. But the author also suggests to introduce public securities arbitration system of the States, and also insists the way to secure substantive fairness, or the application of securities regulations in securities arbitrations. Which may be the pre-requirements for the pre-dispute arbitration agreement in securities investment contract.

  • PDF

Practical Silicon-Surface-Protection Method using Metal Layer

  • Yi, Kyungsuk;Park, Minsu;Kim, Seungjoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.4
    • /
    • pp.470-480
    • /
    • 2016
  • The reversal of a silicon chip to find out its security structure is common and possible at the present time. Thanks to reversing, it is possible to use a probing attack to obtain useful information such as personal information or a cryptographic key. For this reason, security-related blocks such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and RSA (Rivest Shamir Adleman) engines should be located in the lower layer of the chip to guard against a probing attack; in this regard, the addition of a silicon-surface-protection layer onto the chip surface is a crucial protective measure. But, for manufacturers, the implementation of an additional silicon layer is burdensome, because the addition of just one layer to a chip significantly increases the overall production cost; furthermore, the chip size is increased due to the bulk of the secure logic part and routing area of the silicon protection layer. To resolve this issue, this paper proposes a practical silicon-surface-protection method using a metal layer that increases the security level of the chip while minimizing its size and cost. The proposed method uses a shift register for the alternation and variation of the metal-layer data, and the inter-connection area is removed to minimize the size and cost of the chip in a more extensive manner than related methods.

On the Design of Extending Airspace for Improving Incheon International Airport Capacity (공역확장을 통한 인천국제공항 수용능력 향상에 관한 고찰)

  • Lee, Young-Jong
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.103-107
    • /
    • 2015
  • In this paper, we propose a secure alternative for improving airspace capacity of Incheon International Airport. Since the direction of simultaneous independent approaches to runway 15/16 radar-guided approach for ILS approach procedures for the need to provide control services, in view of the radar is the smallest possible no-fly zone airspace propose the demilitarized zone (P-518) adjustment. If possible simultaneous independent approaches to secure a temporary increase in the holding area due to traffic, the military training airspace gradually secured a total of 10 miles by 5 miles, some military training airspace in Osan Approach Control is proposed to include in Seoul Approach Control.

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.