• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.024 seconds

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Seamless and Secure Mobility Management with Location-Aware Service (LAS) Broker for Future Mobile Interworking Networks

  • Lee Minsoo;Kim Gwanyeon;Park Sehyun
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.207-221
    • /
    • 2005
  • The proliferation of wireless local area networks (WLANs) offering high data rate in hot spot area have spurred the demand for possible WLANs and third-generation (3G) cellular network integration solutions as the initiative step towards 4G systems. This paper provides a novel architecture for seamless location-aware integration of WLANs into 3G cellular networks and also an analysis for the efficient handover techniques. We introduce location as a key context in secure roaming mechanism for context-aware interworking in 4G systems. The fast secure roaming with location-aware authentication is implemented at an entity called location-aware service (LAS) broker that utilizes the concepts of direction of user and pre-warming zone. The location-ware interworking architecture supports seamless roaming services among heterogeneous wireless networks including WLANs, wireless metropolitan area networks (WMANs), and 3G cellular networks. This paper also includes a description of procedures needed to implement efficient mobility and location management. We show how the LAS broker with pre-warming and context transfer can obtain significant lower latency in the vertical handover.

A Study on the Working space Lay-out for Working on Information in the Offices (정보성 업무특성 따른 업무공간 레이아웃(Lay-out)에 관한 연구)

  • 이상호;신동준
    • Korean Institute of Interior Design Journal
    • /
    • no.32
    • /
    • pp.64-71
    • /
    • 2002
  • Today, term of ‘industrial society’means the totally changing society by new technical innovation through the Industrial Revolution begun in England at the mid-nineteenth century and it made social structure centering agricultural culture change with industrial culture with expansion of goods by the massive production. Information working area has to bo a space not just for improving business efficiency in industrial society but for developing efficiency in working in harmony with the information and structural aspects based on computer and communication technology. There are two kinds of environmental elements of working space : the tangible ones are the area and the structure of working space, lights, network, layout and information machines in office, the intangible ones are a feeling of satisfaction of management and arrangement of office information machines capability of information delivery, common ownership of documents and their files, the security and connection between office workers, and harmony. According to the wave of information begun from the late twentieth century, structural layout of working area has become various by the working type through network of new developed information communication machines. But it is hard to apply them in actually.

A Study on the Effect of Format String on Secure Programming in C Language (C언어에서 포맷 스트링이 프로그램 보안에 미치는 영향)

  • Lee, Hyung-Bong;Cha, Hong-Jun;Choi, Hyung-Jin
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.693-702
    • /
    • 2001
  • One of the major characteristics of C language is that it allows us to use pointer type variables to access any area of virtual address space. So, we can read/write/execute from/to virtual memory area not controlled delicately by operating system. We can access such memory area by using format string and it can be a vulnerability of C language from the point of secure programming. In this paper, we analyze in detail the process of security attack based on format string and then exploit a new virus style attack which is stepwise and durable with some actual scenarios to warn the severity of it, and grope for some preliminary responding actions.

  • PDF

A Study on Identification of the Heat Vulnerability Area - Case Study in Chungcheongnamdo - (폭염 취약지역 도출에 관한 연구 - 충청남도를 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.25 no.1
    • /
    • pp.67-74
    • /
    • 2019
  • This study is to identify the heat vulnerability area as represented by heat risk factors which could be attributable to heat-related deaths. The heat risk factors were temperature, Older Adults(OA), Economic Disadvantage(ED), Accessibility of Medical Services(AMS), The population Single Person Households(SPH). The factors are follow as; the temperature means to the number of days for decades average daily maximum temperature above $31^{\circ}C$, the Older Adults means to population ages 65 and above, furthermore, the Economic Disadvantage means to the population of Basic Livelihood Security Recipients(BLSR), the Accessibility of Medical Services(AMS) means to 5 minutes away from emergency medical services. The results of the analysis are showed that the top-level of temperature vulnerability areas is Dong, the top-level of vulnerability OA areas is Eup, the top-level of AMS vulnerability is Eup. Moreover, the top-level of vulnerability ED area appears in the Eup and Dong. The result of analysing relative importance to each element, most of the Eup were vulnerable to heat. Since, there are many vulnerable groups such as Economic Disadvantage, Older Adults in the Eup. We can be figured out estimated the number of heat-related deaths was high in the Eup and Dong by the data of emergency activation in the Chungcheongnam-do Fire Department. Therefore, the result of this study could be reasonable.

A Study on Vertiport Installation Standard of Drone Taxis(UAM) (드론택시(UAM)의 수직이착륙장(Vertiport) 설치기준 연구)

  • Choi, Ja-Seong;Lee, Seok-Hyun;Baek, Jeong-Seon;Hwang, Ho-Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.1
    • /
    • pp.74-81
    • /
    • 2021
  • UAM(Urban Air Mobility) systems have evolved in the form of helicopters in the 1960~1970s, tiltrotors in the 1980s, small aircraft transportation systems in the 2000s, and electric-powered Vertical Take-Off and Landing (eVTOL) in the 2010s; accordingly, the early heliport has evolved to its current form of a Vertiport. Vertical Takeoff and Landing Sites, Vertiports, are important factors for the successful introduction of UAM, along with the resolution of air traffic control (ATC), air security, and noise problems. However, there are no domestic or international installation standards and guidelines yet. Therefore, in this study, installation standards were prepared by referring to domestic and international case studies, ICAO standards, and MIT research papers. The study proposes to establish standards for Final Approach and Takeoff Area (FATO) as 1.5D, 1D for Touchdown and Lift-Off Area (TLOF), and 1.5D for Safety Area (SA). It also proposes to add "UAM Vertiport Installation Standards" to the 「Act on the Promotion and Foundation of Drone Utilization, Drone Act」.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Flooding Risk under Climate Change of Fast Growing Cities in Vietnam (베트남 급성장 도시지역의 기후변화 홍수재해 위험성 분석)

  • Kim, So Yoon;Lee, Byoung Jae;Lee, Jongso
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.1-9
    • /
    • 2020
  • Vietnamese cities have a high risk of flooding under climate change due to their geographical characteristics. In this situation, the urban area is expanding with rapid growth of urban population. However, the risk of flooding is increasing due to the increase in impermeable areas and insufficient infrastructure. This study analyzed the urban expansion trend at the national level in Vietnam for the past 10 years (2007-2017) by using the Urban Expansion Intensity Index. Also, this study selected Hue City as a region with a large impact of climate change and a rapid expansion and found the possibility of flooding in the urban expansion area. The result showed that cities have been expanded around major cities in the Red River Delta, Mekong Delta, and coastal areas. In the case of Hue City, the area with fast expansion rate has a higher expected flood area. It implies that the risk of flood disasters may increase if the urabn expansion is carried out without disaster prevention measures. It is expected that Korean urban disaster prevention policies such as urban climate change disaster vulnerability analysis system will be helpful in establishing urban plans considering climate change in the fast growing regions such as Vietnam.

Analysis of the Impact of Building Congested Area for Urban Flood Analysis (도심지 침수해석을 위한 건축물 밀집 지역 영향 분석)

  • Kim, Sung-Uk;Jun, Kye-Won;Lee, Seung-Hee;Pi, Wan-Seop
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.41-46
    • /
    • 2022
  • Recently, the scale of flood damage occurring in urban areas is increasing due to climate change and urbanization, so various flooding analysis techniques are needed. In the Sadangcheon Stream basin, which has been continuously flooded since 2010, a basic plan for improving drainage was established using XP-SWMM and measures to prevent flooding were proposed. However, in the process of inundation analysis, the analysis considering the city's buildings was not conducted, resulting in a problem that the degree of flooding damage tends to be overestimated. Therefore, in this study, XP-SWMM was used to compare and analyze cases where buildings were not considered and designated as inactive areas. As a result of the study, it was analyzed if the building was not considered, the flood damaged area was 271,100 m2 and the depth of submersion was 0.15 m, and if the building was considered inactive area, the flood damaged area was 172,900 m2 and the depth of submersion was 0.32 m that it is under-estimated about 36% and an flow velocity around the building increased from 1.62 m/s to 1.83 m/s about 1.12 times.

PCA Ruling on South China Sea : Implications for Region (필리핀 vs. 중국 간 남중국해 사건 중재판정의 동아시아 역내 함의)

  • Park, Young-Gil
    • Strategy21
    • /
    • s.40
    • /
    • pp.131-143
    • /
    • 2016
  • On 12 July 2016, China's maritime claim to most of the South China Sea (SCS) based on the so-called nine-dash line was rejected by the Arbitral Tribunal, constituted under Annex VII to the UN Convention on the Law of the Sea (UNCLOS) concerning issues in the South China Sea including the legality of the so-called "nine-dashed line", the status of certain maritime features and their corresponding maritime entitlements, together with the lawfulness of certain actions by China which the Philppines, in a case brought in 2013, alleged were violations. As having the Tribunal determined that China's claim had no legal grounds in UNCLOS, thus undermining China's claims, and establishing that China has no exclusive legal rights to control the area roughly the size of India. There are some major implications from the Tribunal's ruling in the Arbitration award. These include implications on: how to delimit the maritime boundary in disputed waters, how to promote maritime confidence-building measures, how to safeguard maritime safety and security, and how to promote the rule of law in the SCS. Since its application of UNCLOS in East Asia, it has been obvious that the only way to resolve maritime disputes in the region is to build strong maritime cooperative partnerships under the auspices of the rule of law.