• 제목/요약/키워드: Security Area

Search Result 1,688, Processing Time 0.023 seconds

A Study on Distributed Power Control for Energy Efficiency in Multicast Routing (멀티캐스트 라우팅에서의 전력 분산 제어(DPC)에 관한 연구)

  • Chung, Hyun-Gi;Yang, Seung-In
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.17 no.10 s.113
    • /
    • pp.985-992
    • /
    • 2006
  • The classic routing algorithms try to minimize the number of hops to reach a destination. In our DPC(Distributed Power Control) this hop-by-hop power level selection is also used to select the path guaranteeing low energy consumption. The main goal is to realize a dynamic protocol able to be aware of mobility and to automatically set security threshold in order to get the best performance in every situation. In conclusion, the simulation DPC has improved energy gain of the AMRIS routing algorithm at the narrow area, and ODMRP routing algorithm has improved energy gain at the wide area.

The Comparative Study for Truncated Software Reliability Growth Model based on Log-Logistic Distribution (로그-로지스틱 분포에 근거한 소프트웨어 고장 시간 절단 모형에 관한 비교연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.85-91
    • /
    • 2011
  • Due to the large-scale application software syslmls, software reliability, software development has animportantrole. In this paper, software truncated software reliability growth model was proposed based on log-logistic distribution. According to fixed time, the intensity function, the mean value function, the reliability was estimated and the parameter estimation used to maximum likelihood. In the empirical analysis, Poisson execution time model of the existiog model in this area and the log-logistic model were compared Because log-logistic model is more efficient in tems of reliability, in this area, the log-logistic model as an alternative 1D the existiog model also were able to confim that you can use.

A Role-based Storage Encryption for the Electronic Approval System of Battle Management Systems (전장관리체계 전자결재시스템을 위한 역할기반 스토리지 암호화 기법)

  • Her, Kyoung-Soon;Lee, Soo-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.37 no.1
    • /
    • pp.71-85
    • /
    • 2011
  • The most important factors of Electronic approval system of battle management system are availability and reliability. Therefore, the electronic approval system uses a SAN(storage area network) to construct the reliable server and storage. In this paper, we analyze the security vulnerabilities of the SAN storage that stores the critical military information in the electronic approval system of battle management system. Based on the analysis, we verify the possibility of information leakage by the inside attackers through the scenario-based experiment. And we finally propose a new storage encryption algorithm on the basis of user's role that can prevent the leakage of information by the inside attackers.

A Study of the Factors Affecting Adoption of a Mobile RFID : Focused on the Technology Area of Mobile RFID (모바일 RFID의 특성이 실제 사용의도에 미치는 영향에 관한 연구)

  • Lee, Da Hoon;Cho, Sung Min;Whang, Jaehoon
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.67-85
    • /
    • 2013
  • The emergence of RFID markets and development of various RFID-embedded mobile devices has brought fundamental changes to our lives. As the availability of RFID readers and tags that are implanted in smart phones and table PCs increases, information on RFID-affixed objects can be tracked wirelessly and this had open possibilities for B2B businesses to be run like B2C businesses. However, given the popularity of the RFID markets, there is limited research in this area. This paper serves to develop an extended technology acceptance model by Mobile RFID characteristics (perceived cost, security, instant connectivity, context awareness, and result demonstrability) examines the determinant factors that cause the acceptance of mobile RFID. To do so, the study conducted a survey targeting smart phone users and used the PLS path modeling, one of the structural equation models to verify the significance of research hypothesis. As a result, perceived cost, instant connectivity, context awareness, and result demonstrability turned out to have a real effect on intention to use mobile RFID by means of perceived usefulness and perceived ease of use. Security turned out to have a partial effect on intention to use mobile RFID by means of perceived usefulness or perceived ease of Use.

A Study on Landslide Warning Guidelines Based on Regional Rainfall (지역별 강우량 기반 급경사지 붕괴 예경보기준 연구)

  • Ryu, Ji Hyeob;Park, Jung Yong;Lim, Ik Hyun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.55-63
    • /
    • 2013
  • The existing landslide warning guideline was mostly issued in 1990's and did not consider recent weather changes such as focused area heavy rainfall or regional geographic features. And every regional government applies the guideline equally which results in continued disasters. Thus it is necessary to conduct a research on landslide with regards to the correlation between the increased focused rainfall and regional geographic features. We propose a renewed emergency escape guideline against steep slope landslides that can assess most likely avalanche time according to amounts of rain and a continued raining time, for a swift escape of the residents of the affected area.

Analysis of GPR Exploration Limit of Open-Cut Type Excavation (개착식 굴착현장의 GPR 탐사한계 분석기법 연구)

  • Han, Yushik;Kim, Woo-Seok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.47-53
    • /
    • 2017
  • Accurate exploration of the risk factors of the ground subsidence is needed to predict and evaluate the subsidence of the surrounding ground due to the excavation of the ground. In this study, we analyzed the distribution of soil relaxation area by analyzing the behavior around the ground excavation site and simulated the GPR exploration under various conditions. As a result, Although there are some differences according to the water content, distribution of the strata and the distribution of the relaxation region were confirmed in the unsaturated soil, and it was found that there was a difficulty in the GPR exploration in the saturated soil.

Neighbor Cooperation Based In-Network Caching for Content-Centric Networking

  • Luo, Xi;An, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2398-2415
    • /
    • 2017
  • Content-Centric Networking (CCN) is a new Internet architecture with routing and caching centered on contents. Through its receiver-driven and connectionless communication model, CCN natively supports the seamless mobility of nodes and scalable content acquisition. In-network caching is one of the core technologies in CCN, and the research of efficient caching scheme becomes increasingly attractive. To address the problem of unbalanced cache load distribution in some existing caching strategies, this paper presents a neighbor cooperation based in-network caching scheme. In this scheme, the node with the highest betweenness centrality in the content delivery path is selected as the central caching node and the area of its ego network is selected as the caching area. When the caching node has no sufficient resource, part of its cached contents will be picked out and transferred to the appropriate neighbor by comprehensively considering the factors, such as available node cache, cache replacement rate and link stability between nodes. Simulation results show that our scheme can effectively enhance the utilization of cache resources and improve cache hit rate and average access cost.

Intelligent Surveillance System for Urban Transit using Context-aware technology (도시철도 지능형 종합 감시시스템을 위한 상황인식기술 적용방안 연구)

  • An, Tae-Ki;Shin, Jeong-Ryol;Lee, Woo-Dong;Kim, Moon-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.399-400
    • /
    • 2007
  • The one of the necessary technologies to live in the ubiquitous society that we can exchange some informations whenever it is and wherever we are, is the technology of context-awareness. The technology of context-awareness can be used various fields-medical science, national defense, national security and etc. and the technology can affect our society by and large. The technology of context-awareness is also applicable to many fields in the urban transit. In this paper, we describe the present condition of the technology of context-awareness and the examples of practical application of it and suggest some plans that are applicable to build an intelligent surveillance system for urban transit. We can connect the operating officer who is in the nearest to the place where the some events happened within the urban transit service area through the intelligent surveillance system for urban transit and we can eel a foothold in perceiving automatically various events within urban transit service area. So, the technology of context-awareness is the basic technology to realize an intelligent surveillance for urban transit, for the security of passengers and the protection of facilities in urban transit.

  • PDF

Registration of the 3D Range Data Using the Curvature Value (곡률 정보를 이용한 3차원 거리 데이터 정합)

  • Kim, Sang-Hoon;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.161-166
    • /
    • 2008
  • This paper proposes a new approach to align 3D data sets by using curvatures of feature surface. We use the Gaussian curvatures and the covariance matrix which imply the physical characteristics of the model to achieve registration of unaligned 3D data sets. First, the physical characteristics of local area are obtained by the Gaussian curvature. And the camera position of 3D range finder system is calculated from by using the projection matrix between 3D data set and 2D image. Then, the physical characteristics of whole area are obtained by the covariance matrix of the model. The corresponding points can be found in the overlapping region with the cross-projection method and it concentrates by removed points of self-occlusion. By the repeatedly the process discussed above, we finally find corrected points of overlapping region and get the optimized registration result.

  • PDF

Low-Power Design of Hardware One-Time Password Generators for Card-Type OTPs

  • Lee, Sung-Jae;Lee, Jae-Seong;Lee, Mun-Kyu;Lee, Sang-Jin;Choi, Doo-Ho;Kim, Dong-Kyue
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.611-620
    • /
    • 2011
  • Since card-type one-time password (OTP) generators became available, power and area consumption has been one of the main issues of hardware OTPs. Because relatively smaller batteries and smaller chip areas are available for this type of OTP compared to existing token-type OTPs, it is necessary to implement power-efficient and compact dedicated OTP hardware modules. In this paper, we design and implement a low-power small-area hardware OTP generator based on the Advanced Encryption Standard (AES). First, we implement a prototype AES hardware module using a 350 nm process to verify the effectiveness of our optimization techniques for the SubBytes transform and data storage. Next, we apply the optimized AES to a real-world OTP hardware module which is implemented using a 180 nm process. Our experimental results show the power consumption of our OTP module using the new AES implementation is only 49.4% and 15.0% of those of an HOTP and software-based OTP, respectively.