• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.03 seconds

Preliminary Results of Marine Traffic Monitoring Field Campaigns for the Jurisdictional Sea Area of South Korea: Monitoring on the Ieodo Ocean Research Station (관할해역 해상교통 모니터링을 위한 기초 연구: 이어도해양과학기지 실험 중심으로)

  • Yang, Chan-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.68-69
    • /
    • 2014
  • At the present, ship traffic monitoring and management are focused on the harbor area and the specified coastal zone in South Korea. It, however, is required that the Jurisdictional Sea Area of South Korea is monitored from two viewpoints: Safety and Security. Through a safe sea line (transport route) over the world, it is possible to expand our ocean economical territory. As a first step, we have been in field campaigns for integrated ship monitoring on the Ieodo Ocean Research Station in November 2013 after the first test in Gyunggi Bay.

  • PDF

Design of Low-area Encryption Circuit Based on AES-128 Suitable for Tiny Applications (소형 애플리케이션에 적합한 AES-128 기반 저면적 암호화 회로 설계)

  • Kim, Hojin;Kim, Soojin;Cho, Kyeongsoon
    • Journal of IKEEE
    • /
    • v.18 no.2
    • /
    • pp.198-205
    • /
    • 2014
  • As the development of information technology, the interests in tiny applications such as wearable devices, portable devices and RFID are increased and the importance of low-area encryption circuit is emphasized. This paper proposes a compact architecture of AES-based encryption circuit suitable for tiny applications. The circuit area is reduced by minimizing storage space and sharing computation resources. The synthesized gate-level circuit using 65nm standard cell library consists of 2,241 gates and two $8{\times}16$-bit SRAMs. It can process data at a rate of 50.57Mbits per second. Therefore, the proposed encryption circuit is suitable for various applications requiring very small encryption circuit.

Analysis of Residential Location Preference Factors by Characteristics of Households in the Case of Seoul Metropolitan Area Households : Comparative Analysis with the Case of Daegu·Gyeongbuk Households (수도권 가구의 가구특성별 주거입지 선호요인 분석 - 대구·경북 가구사례와의 비교분석 -)

  • Park, Wonseok
    • Journal of the Korean association of regional geographers
    • /
    • v.21 no.3
    • /
    • pp.515-528
    • /
    • 2015
  • The purpose of this paper is to analyze the residential location preference factors by households' characteristics in the case of Seoul metropolitan area households. The main results of this study are as follows. Firstly, residential location factors most preferred by Seoul metropolitan area households are accessibility of public transportation, followed by security and living environment. Therefore, we can see Seoul metropolitan area households prefer amenity and quality of life as residential location factors. Secondly, according to the results of AHP by age and household income, the residential location factors Seoul metropolitan area households prefer are different by age and household income. Thirdly, according to the results of comparative analysis between the case of Seoul metropolitan area and Daegu Gyeongbuk households, Seoul metropolitan area households more prefer safety and quality of life, on the other hand, Daegu Gyeongbuk households more prefer investment value of housing.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Voice Coding Using Only the Features of the Face Image

  • Cho, Youn-Soo;Jang, Jong-Whan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.3E
    • /
    • pp.26-29
    • /
    • 1999
  • In this paper, we propose a new voice coding using only the features of the face image such as mouth height(H), width(W), rate(R=W/H), area(S), and ellipse's feature(P). It provides high security and is not affected by acoustic noise because we use only the features of face image for speech. In the proposed algorithm, the mean recognition rate for the vowels approximately rises between 70% and 96% after many tests.

  • PDF

Vulnerabilities Analysis and Security Measures of Storage Area Network (SAN의 취약성 분석 및 대응방안)

  • 김광혁;이상도;정태명
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.841-843
    • /
    • 2002
  • 인터넷의 보급으로 데이터의 생산, 수요, 유통이 급격히 증가하였으며, 조직내의 정보의 공유 및 활용의요구가 점자 증대되었다. 이에 대한 해결책으로 스토리지 네트워크의 사용이 확산되어 중요정보의 백업,긴급복구등의 기능을 쉽게 사용할 수 있게 되었다. 그러나 조직내의 중요만 데이터에 대한 백업 및 공유를 수행하면서도 데이터에 대안 보안은 상대적으로 매우 취약만 신정이어서 향후 보안문제가 대두 될 것으로 보인다. 본 논문에서는 SAN의 구성과 동향을 살펴보고 현재 보편화된 SAN 보안 기법인 LUN Masking과Zoning의 구조와 기능, 이들의 한계점등을 알아보도록 한. 또 향후 SAN 동향과 그중 IP네트워크의 결합으로 발생되어지는 보안 문제점과 해결책을 제시하도록 한다.

  • PDF

Mobile Banking Systems Using Personal Digital Assistants (PDA를 이용한 모바일 뱅킹 시스템)

  • An, Geon-Ho;Yang, Su-Cheol;Chu, Yeong-Yeol
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.143-146
    • /
    • 2003
  • In mobile Internet banking service through wireless local area network, security is a most important factor to consider. We describe the development of mobile banking service using Personal Digatal Assistant (PDA). In order to increase the strength of encryption, we adopted hybrid approach where both of the public key algorithm and the secret key algorithm are used during the transaction among PDA, banking server and authentication server.

  • PDF

Security For Storage Area Networking System (SAN환경에서의 보안)

  • Sung, Chun-Ho;Jun, Sung-Tag
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1705-1708
    • /
    • 2002
  • 오늘날 점점 방대해지고 커지는 DATA의 처리를 위해 네트워크 스토리지 시스템의 요구가 증대됨에 따라 네트워크 스토리지의 보안문제가 대두되고 있다. 네트워크 스토리지중 그 성장이 두드러지는 SAN 스토리지의 보안을 위해 정보보호 서비스 구현의 상세한 지식을 필요로 하지 않는 장점을 가진 GSS-API인증 시스템을 이용하여 SAN 스토리지 보안문제에 접근해 보았다.

  • PDF

An Implementation of Wireless Channel Scanning for Unauthorized Mobile APs Detection (비인가 모바일 AP 탐지를 위한 채널 스캔의 구현에 관한 연구)

  • Hwang, Jaeryong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.363-364
    • /
    • 2015
  • On the area which is restricted an unauthorized WiFi service, mobile WiFi hotspot causes security problems like leaking and gathering internal data. In this paper, we modify a wireless lan driver and implement a detector that periodically scans the wireless channels.

  • PDF

Multi-target Tracking Filters and Data Association: A Survey (다중표적 추적필터와 자료연관 기법동향)

  • Song, Taek Lyul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.3
    • /
    • pp.313-322
    • /
    • 2014
  • This paper is to survey and put in perspective the working methods of multi-target tracking in clutter. This paper includes theories and practices for data association and related filter structures and is motivated by increasing interest in the area of target tracking, security, surveillance, and multi-sensor data fusion. It is hoped that it will be useful in view of taking into consideration a full understanding of existing techniques before using them in practice.