• Title/Summary/Keyword: Security Agents

Search Result 211, Processing Time 0.024 seconds

Study IoT Asset Management System Based on Block-Chain Framework (블록체인 프레임워크 기반 IoT 자산관리시스템)

  • Kang, Sung Won;Kim, Young Chul
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.94-98
    • /
    • 2019
  • In this paper, we developed the tools enabling to manage the IoT systems owned by managers. Since equipment agents consists based on open-source block-chain framework, we can secure the invariance on data and furthermore can locate the resources by searching the AP connected to the equipments. Also the manager can trace the connecting details on equipments from their block-chain accounts. In addition, we work on the possibility of protecting ARP poisoning attacks by removing the credibility on additional ARP requests being generated during the process of network creation.

Efficient Authentication for Convergence of IoT and Mobile IP (사물인터넷과 모바일 IP의 융합을 위한 효율적 인증 메커니즘)

  • Lee, YunJung;Cho, Jungwon;Kim, Chul-Soo;Lee, Bong-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.13-18
    • /
    • 2019
  • This paper proposes efficient and secure two-way authentication protocol for binding update messages between mobile devices and home agents / correspondent nodes in IoT and Mobile IPv6 (MIPv6) environments with limited computing power and resources. Based on the MIPv6 message exchange, the proposed protocol satisfies both the authentication and the public key exchange optimized for both sides of the communication with minimum modification. In the future, we will carry out a performance analysis study by implementing the proposed protocol in detail.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

Comparison of Factors Influencing to Mobilization of Police to Crowd Gathering Occasion (다중운집행사 경찰동원에 영향을 미치는 요인 비교)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.643-649
    • /
    • 2017
  • This research is to compare factors which influence to mobilize police force necessary for crowd gathering occasions, and the purpose of this research is to prepare scientific basis for mobilization of police force by understanding order of priority of obstructive factors to mobilize police force for progressing safe crowd gathering occasions. Crowd gathering occasion has a characteristic that minor cause can lead to huge damage because many people concentrically gather at a specific place. In order to control these risks, it is necessary to analyze criteria on order of priority which can arouse risk to mobilize police force. In this research, I classified the factors influencing safety of crowd gathering occasion as internal risk factor, external risk factor and traffic safety threatening and set up the level of private security manpower and participants mobilized to crowd gathering occasion as independent variable and set up mobilized police force from 2013 to 2014 as dependent variable and analyzed it hierarchical analysis. From the result of analysis, the biggest influence to mobilization of police force for crown gathering occasion was the number of participants, and next self order-keeping agents and reason of mobilizing police force. Based on the result of analysis that the biggest factor to mobilize police force to crowd gathering occasion is the number of participants, it can be resulted that the number of participants influence to the risk of crowd gathering occasion.

A Study on Control of Access to Internal Network Information and Authority Set Up Management for Client by Class (제한된 내부 네트워크 정보 접근제어와 계층별 클라이언트 권한설정 관리에 관한 연구)

  • Seo, Woo-Seok;Park, Jae-Pyo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.287-293
    • /
    • 2012
  • It has been only few years that various contents information subject for information processing system has been remarkably increased in online. If we say the year 2000 is the technology based year when deluge of information and data such as real time sharing, the time since after 2000 until 2011 has been a period plentiful of application based functions and solutions. Also, as the applicable range of these information process systems extends, individual information effluence has been social issues twice in 2009 and 2010. Thus now there are continuous efforts made to develop technologies to secure and protect information. However, the range problem has been extended from the illegal access from outside to the legal access from internal user and damages by agents hidden in internal information process system and client system. Therefore, this study discusses the necessity for the studies on efficiency based information security by control of access to internal information and authority setting for administrator and internal users. Based on the result of this study, it provides data that can be used from SOHO class network to large scale for information security method.

An Analysis of the Determinants of Employment Productivity in Korean Transportation Industry Using Korea Labor and Income Panel Study (한국노동패널자료를 활용한 국내 운송업 고용생산성 결정요인 분석)

  • So, Ae-rim;Shin, Seung-sik
    • Journal of Korea Port Economic Association
    • /
    • v.35 no.1
    • /
    • pp.57-76
    • /
    • 2019
  • This study deals with the determinants of employment productivity of transportation labor, who are the main agents of the transportation industry that has made significant contributions to our country's industrial development. The study selected the determinants of employment productivity using the Korea Labor and Income Panel Study data, and analyzed the effects of various factors using panel logistic regression, panel OLS model, and panel robust regression. The results were as follows. First, a more positive effect was shown when employees held a regular job, had a "high level of education", "joining the labor union" and "experiencing vocational training". Second, in the case of job security, having a "high level of education" and "joining the labor union" showed a more positive effect; further, job security was higher for employees who worked in a "big company" or were "married". Third, in the case of higher income productivity, higher values of "age", "academic ability" and "company size" had a more positive effect, whereas larger values of "education" and "health condition except job training" had a negative one. Fourth, in the case of job satisfaction, "female", "joining the labor union" and having a higher "income" or "job security" led to higher satisfaction and a better "health condition compared to an average person". Further, a higher "overall life satisfaction" and "economic level" led to lower job satisfaction. The analysis of the determinants of employment productivity of transportation business and seeking for improvement plan is expected to improve the employment productivity in the transportation business.

Knowledge and Current Status about AED in the Public Facilities - Focused on the Gwangju City - (다중이용시설에서의 AED에 관한 지식 및 운영실태에 관한 연구 - 광주광역시 중심으로 -)

  • Park, Si-Goo;Park, Chang-Hyun;Chae, Min-Jung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.14 no.3
    • /
    • pp.13-28
    • /
    • 2010
  • Purpose: In this study, we investigated the better application of the law which is about the AED installation and more effective ways of emergency medical care system, to understand the law and to research the current condition of public facilities which belong to local governments, and to seize the aspect of safety guards who currently work in order to provide the installation of AED in the public facilities and to provide more efficient emergency medical service with the effectuation of the immunity law of the good intention of first-aid treatment. Methods: In Gwang-ju, 234 public facilities have been identified by 31 December, 2008. With the exception of the duplication, we researched 158 facilities and received the answers from 95 of them. Results: In the research, 53% of them have had internal emergency first-aid education, and 55% of them didn't have this education and a CPR education manual, and 30% of the facilities even didn't know how to connect with the manager of the company for the first-aid department. On the other hand, most of them were highly interested in CPR and AED education on the ratio of 91% and 93%. 88% of them have been trained about first-aid, 51% of them haven't been retrained, 17% have never been trained. so, the reality of emergency system at public facilities is serious. 78% of them knew they are working at public facilities, though 49% of them didn't know about AED installation. 57% of them didn't know the fact there is the immunity law related with good intentions for first-aid treatment. 63% of the facilities have security guards, and 30% of them didn't answer the questions. Also, many of them agreed to the opinion that all employees should have first-aid training. At representative survey report of participator of public-facility, emergency treatment is 61%, 16% of patients calling. Accordingly they importantly think better doing an on-site first-aid than evacuating the patient. And the rates show that 57% of them answerers tend to call Fire-Office(119) for evacuating the patients, and 28% of them EMIC(1339) for the first-aid. Conclusions: In this study, we are suggest to improve the details of the efficient operations and management after the grasp of the uninstallation, indifference, and unreliable conditions of AED. 1) Need a publicity of AED install cognition which is an emergency medical instrument at public facilities. 2) Arrangement of safety agents at facilities and concerns about them for good management from the parties concerned. 3) Need a designation of legal details according to the decision of the AED installation and the standard of the AED installation. 4) Training about first-aid of safety guards and the persons concerned in the facilities should be practiced participation with the positive and through this, first-aid treatment could be done by anyone who knows the immunity law related to medical emergency. 5) The brochures for the potential users and the results form practicing the instructions need to be improved in many ways through recording the emergency cases that have happened.

  • PDF

Phenomenological Study about Bodyguards' Ethical Dilemmas (신변보호요원의 윤리적 딜레마에 대한 현상학적 연구)

  • Park, Young-Man
    • Korean Security Journal
    • /
    • no.46
    • /
    • pp.31-62
    • /
    • 2016
  • This study is about the phenomenological study of bodyguards' ethical dilemmas. Through this study, the meaning and essence of bodyguards' ethical dilemmas will be analyzed based on empirical facts. The purpose of this study is to provide basic information of the prevention and solutions for their ethical dilemmas and to understand and research the process and the essentials of them. To achieve this goal of the study, seven bodyguards who experienced ethical dilemmas working more than five years are selected as objects of the study. Colaizzi's six stage method are applied into this study so information gathered through interviews and questionnaire from 0ctober 1st, 2015 to November 20th, 2015 is analyzed. From the process of this research, these following conclusions are drawn considering validity of this study and ethical things. As a result, bodyguards' ethical dilemmas are divided into six centric meanings and 20 thematic statement. First, the centric meaning is conflict factors and the themes are discordance of pre-practice, regulatory or procedure problems, communication about sturcture and job and service disagreement. Second, the centric meaning is limited professional roles and the themes are institutional custom, decision making, priorities. Third, the centric meaning is difficulties of circumstantial judgement at work places and the themes are ambiguity of decision, conflict of knowledge, experience and opinion. Forth, the centric meaning is reasonable self-defense and the themes are lack of responsibility, rationalization, intentional negligence and sense of shame. Fifth, the centric meaning is difficulties of social network and the themes are the relationships between subordinates and superiors, the role of a moderator, uncooperative work and unpleasant sayings and doings. Sixth, the centric meaning is keeping secrets and the themes are burried for and illegal practice.

  • PDF

A Classification Model for Illegal Debt Collection Using Rule and Machine Learning Based Methods

  • Kim, Tae-Ho;Lim, Jong-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.93-103
    • /
    • 2021
  • Despite the efforts of financial authorities in conducting the direct management and supervision of collection agents and bond-collecting guideline, the illegal and unfair collection of debts still exist. To effectively prevent such illegal and unfair debt collection activities, we need a method for strengthening the monitoring of illegal collection activities even with little manpower using technologies such as unstructured data machine learning. In this study, we propose a classification model for illegal debt collection that combine machine learning such as Support Vector Machine (SVM) with a rule-based technique that obtains the collection transcript of loan companies and converts them into text data to identify illegal activities. Moreover, the study also compares how accurate identification was made in accordance with the machine learning algorithm. The study shows that a case of using the combination of the rule-based illegal rules and machine learning for classification has higher accuracy than the classification model of the previous study that applied only machine learning. This study is the first attempt to classify illegalities by combining rule-based illegal detection rules with machine learning. If further research will be conducted to improve the model's completeness, it will greatly contribute in preventing consumer damage from illegal debt collection activities.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.