• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.028 seconds

An Efficient Clustering algorithm for Target Tracking in WSNs (무선 센서 네트워크에서 클러스터링을 이용한 효율적인 측위)

  • Rhee, Chung-Sei;Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.65-71
    • /
    • 2016
  • The use of Wireless Sensor Networks in many applications require not only efficient network design but also broad aspects of security, military and health care for hospital. Among many applications of WSNs, target tracking is an essential research area in WSNs. We need to track a target quickly as well as find the lost target in WSNs. In this paper, we propose an efficient target tracking method. We also propose an efficient clustering method and algorithm for target tracking.

A Study on the Cave Survey and the Management of Security (동굴탐사와 안전관리)

  • Byun Tae-Gun;Shin Dae-Bong
    • Journal of the Speleological Society of Korea
    • /
    • no.67
    • /
    • pp.65-72
    • /
    • 2005
  • There are lots of natural caves in northeastern area of China. in this paper emphasis on the securities of cave management and cave survey. And discussed about the securities of the tourist and the members of the survey team. Therefore, it is necessary to keep the items of the security management as a sightseeing caves and management environment and the situation of the conservation.

Analysis of implementation of SHA-1 hash function for Low power Sensor Network (저전력 센서 네트워크 노드용 SHA-1 해쉬함수 구현 분석)

  • Choi, Yong-Je;Lee, Hang-Rok;Kim, Ho-Won
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.201-202
    • /
    • 2006
  • In this paper, we achieved software and hardware implementation of SHA-1 hash function for sensor network. We implemented the software to be compatible with TinySec. In hardware design, we optimized operation logics for small area of hardware and minimized data transitions of register memory for low power design. Designed the software and hardware is verified on commercial sensor motes and our secure motes respectively.

  • PDF

A study on the precedent trend of safe port and its Implication (안전항 판례동향과 시사점에 관한 연구)

  • Kim, Taw-Woo;Lee, Won-Jeong
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.3
    • /
    • pp.93-99
    • /
    • 2010
  • As more than 90% of global trade is carried by sea there is little doubt that the safety of the ports at which the world's trading fleet call is of critical concern. The concept of 'safe port' continues to be an area of critical concern for charterers and ship-owners. In light of increased global security and health risks the recognised principles are under security. This paper examines the nature of safe port, and analyses the precedent trend of safe port and its Implication

Robust Quick String Matching Algorithm for Network Security (네트워크 보안을 위한 강력한 문자열 매칭 알고리즘)

  • Lee, Jong Woock;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.135-141
    • /
    • 2013
  • String matching is one of the key algorithms in network security and many areas could be benefit from a faster string matching algorithm. Based on the most efficient string matching algorithm in sual applications, the Boyer-Moore (BM) algorithm, a novel algorithm called RQS is proposed. RQS utilizes an improved bad character heuristic to achieve bigger shift value area and an enhanced good suffix heuristic to dramatically improve the worst case performance. The two heuristics combined with a novel determinant condition to switch between them enable RQS achieve a higher performance than BM both under normal and worst case situation. The experimental results reveal that RQS appears efficient than BM many times in worst case, and the longer the pattern, the bigger the performance improvement. The performance of RQS is 7.57~36.34% higher than BM in English text searching, 16.26~26.18% higher than BM in uniformly random text searching, and 9.77% higher than BM in the real world Snort pattern set searching.

An Adaptive Threshold Determining Method in Senor Networks using Fuzzy Logic (통계적 여과기법에서 퍼지 규칙을 이용한 적응적 보안 경계 값 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.177-180
    • /
    • 2008
  • There are many application areas of sensor networks, such as surveillance, hospital monitoring, and home network. These are dependent on the secure operation of networks, and will have serious outcome if the networks is injured. An adversary can inject false data into the network through the compromising node. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false data during forwarding process. In this scheme, it is important that the choice of the threshold value since it trades off security and overhead. This paper presents an adaptive threshold value determining method in the SEF using fuzzy logic. The fuzzy logic determines a security distance value by considering the situation of the network. The Sensor network is divided into several areas by the security distance value, it can each area to uses the different threshold value. The fuzzy based threshold value can reduce the energy consumption in transmitting.

  • PDF

Web browser secureness with respect to CVSS

  • Joh, HyunChul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.464-465
    • /
    • 2014
  • Analysis of characteristics in software vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerability discovered. Being a new research area, the quantitative aspects of software vulnerabilities and risk assessments have not been fully investigated. However, further detailed studies are required related to the security risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers (Internet Explorer (IE), Firefox (FX), Chrome (CR) and Safari (SF)) with respect to the Common Vulnerability Scoring System (CVSS). The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems, and exploitation aftermath is getting worse.

Design of Security Monitoring and Control System according to Security Control Area (보안통제영역에 따른 보안관제 시스템 설계 연구)

  • Lee, Hwangro;Choi, Eunmi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.456-459
    • /
    • 2015
  • 인터넷 활용이 다양해짐에 따라서, 사이버 상의 특정 조직에 대한 표적공격에서부터 불특정 다수에 대한 공격까지 불법적인 경로를 통해 목적을 달성하거나 금전적인 이득을 취하기 위한 사이버 공격기법은 갈수록 그 경로가 다양해지고 치밀해지고 있다. 스마트폰의 등장과 함께 휴대용 기기의 사용은 급증하였고, 휴대성과 편리성은 많은 사람들의 서비스 이용환경을 데스크톱환경에서 이동환경으로 변화되고 있다. 이러한 환경의 변화는 보안위협 경로를 확장시킨다. 지능적이고 다양해진 보안 위협으로부터 조직의 시스템에 대한 통합적 가시성을 확보하는 일은 위협에 대비할 수 있는 방법을 제공할 수 있게 된다. 본 연구에서는 보안위협이 될 수 있는 상황을 탐지하기 위해서 조직의 특성에 맞는 보안정책을 수립하는 방법에 대해 정리하고 이에 따른 보안 관제와 운영을 할 수 있는 시스템 설계 방법을 제안하고자 한다.

Real-time Face Tracking using the Relative Similarity of Local Area (지역적영역의 상대적 유사도를 이용한 실시간 얼굴추적)

  • Lee, JeaHyuk;Shin, DongWha;Kim, HyunJung;Weon, ILYong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1408-1411
    • /
    • 2013
  • 객체의 인식과 추적은 컴퓨터 비전 및 영상처리 분야에서 연구가 활발히 진행되고 있다. 특히 얼굴을 인식하고 추적하는 기술은 많은 분야에서 응용될 수 있다. 기존에 연구되어 온 기준 프레임과 관찰 프레임 사이의 차를 이용하여 객체를 인식하고 추적하는 방식은 관찰 대상이 다수인 경우 동일성을 확보하기에는 어려움이 많다. 따라서 본 논문에서는 각각의 프레임에서 빠르게 얼굴 영역을 인식하고, 독립적으로 인지된 얼굴들의 동일성을 연결하는 방법을 제시한다. 제안된 방법의 유용성은 실험으로 검증하였으며, 어느 정도 의미 있는 결과를 관찰할 수 있었다.

Looking Back to the European Disputes over the Second Iraqi War: Lessons Learned from the Division of Public Opinion in Europe

  • Chun, Kwang Ho
    • International Area Studies Review
    • /
    • v.20 no.2
    • /
    • pp.215-233
    • /
    • 2016
  • In 2003, the differing stances about the war in Iraq created a major diplomatic crisis among European countries. Considering various clues which have steadily emerged, this paper refutes the relevance of the debate about weapons of mass destruction and analyses the real motivations for these distinct positions through Europe: the role of the US in the transatlantic relationship, expectations towards the EU and the weight of public opinion. Then, it examines how these intrinsic divergences of political views and interests explain the difficulties encountered in implementing the European Security and Defence Policy and concludes on the keys issues which need to be addressed.