• Title/Summary/Keyword: Security Area

Search Result 1,686, Processing Time 0.025 seconds

A Study on the Efficiency Method of Location-Based Control Function Applied to MDM Applications (MDM 앱에 적용되는 위치 기반 통제 기능의 효율화 방법에 관한 연구)

  • ChangIk Oh;SuGil Hwang;Hyun Son;Dongho Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.171-177
    • /
    • 2023
  • When configuring MDM services only with applications without a central control server, a method that allows security control to be released based on GPS signals in areas sufficiently far from the security area of the workplace is generally applied by embedding and distributing location information of workplaces in MDM applications. This study proposed a method in which each individual directly enters the location information of the security control area needed for them in the distributed app and maintains it as setting information without embedding location information of a specific area such as work in the MDM applications. The method proposed in this study can improve universality, compatibility and the security control level of MDM services, and minimize deployment costs.

Tracking Path Generation of Mobile Robot for Interrupting Human Behavior (행동차단을 위한 이동로봇의 추적경로 생성)

  • Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.460-465
    • /
    • 2013
  • In this paper, we describe a security robot system to control human's behavior in the security area. In order to achieve these goals, we present a method for representing, tracking and human blocking by laserscanner systems in security area, with application to pedestrian tracking in a crowd. When it detects walking human who is for the security area, robot calculates his velocity vector, plans own path to forestall and interrupts him who want to head restricted area and starts to move along the estimated trajectory. While moving the robot continues these processes for adapting change of situation. After arriving at an opposite position human's walking direction, the robot advises him not to be headed more and change his course. The experimental results of estimating and tracking of the human in the wrong direction with the mobile robot are presented.

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.

A Study on Stabilizing a Network Security Zone Based on the Application of Logical Area to Communication Bandwidth (통신 대역폭 논리영역 적용 기반의 네트워크 보안구간 안정화 연구)

  • Seo, Woo-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3462-3468
    • /
    • 2015
  • Regarding countless network disorders or invasions happening nowadays from 2014 until 2015, illegal access intended to attack through the communication line provided by ISP (Internet Service Provider) appears to be the source of the problem. As a defensive way to prevent such network-based attacks, not only stabilization structures for network communication but various policies as well as physical security devices and solutions corresponding to those have been realized and established. Therefore, now is the time to gain foundational research data to secure network security sections by producing logical area on communication bandwidth or such, suggest tasks to expand the communication line which is another research topic in the network security market, and recognize the fact that the active communication bandwidth linkage paradigm using network communication bandwidth is needed as one of the areas that can realize physical security. Additionally, it is necessary to limit the data in the forms of organizing visible security structures into a certain range of physical information by re-dividing communication capacity being currently provided by telecommunicators into subdivided organizational areas and applying the logical virtualization of communication capacity in each of the areas divided. By proposing a network security section based on a logical field application in place of the existing physical structure, basic data that designs a stable physical network communication structure will be provided.

Nuclear·Atomic Public Diplomacy: The Possibility of Expanding Toward New Issue Area (핵·원자력 공공외교: 새로운 영역으로의 확장 가능성)

  • Hanhyung Lee
    • Journal of Public Diplomacy
    • /
    • v.3 no.1
    • /
    • pp.43-63
    • /
    • 2023
  • Objectives: Nuclear security and atomic energy industry have always been the domain of political and economical diplomatic affairs. The issue of nuclear proliferation must be resolved politically or militarily given the importance of the problem, the impact it has on global security, the influence of major powers, and non-proliferation regimes. Considering scope of the budget, manpower, and scale of the project, the atomic energy issue was also viewed from an economic perspective. Therefore, the goal of this study is to depart from the conventional viewpoint and investigate if public diplomacy may be extended to a new issue domain of nuclear security and atomic energy. Methods: In order to determine whether there are any areas that overlap, the uniqueness of Korea's position in the nuclear security and atomic power domains is evaluated and compared with the traits of public diplomacy. Results: It seems plausible to broaden the scope and function of public diplomacy in that field given Korea's uniqueness in nuclear security and atomic energy issue and overlap with public diplomacy. This is especially true given that the state must take the leading role and that ongoing policy demands are made in light of Korea's security and economic structure. In reality, it is assessed that the Summer Fellows Program, run by the KAIST Nuclear Nonproliferation Education and Research Center (KAIST NEREC), has had a considerable impact on public diplomacy in the area of nuclear security and atomic energy. Conclusions: Nuclear security and atomic energy issues have traditionally been handled from the perspectives of political diplomacy, summit diplomacy, and economic diplomacy. However, this paper evaluate that the possibility of enhancing the role of public diplomacy in this issue area is high and underscore that the budget support, programs, and manpower for similar public diplomacy activities are needed. Through this, South Korea's nuclear security policy and atomic energy industry could be supported from international community and it will advance national interest.

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

Preparation and Holographic Recording of Fluorescent Photopolymer Films Containing Anthracene Polymer for Security

  • Park, Tea-Hoon;Kim, Yoon-Jung;Kim, Jeong-Hun;Kim, Eun-Kyoung
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.305-309
    • /
    • 2010
  • Photopolymer films containing fluorescent anthracene polymer, polymethyleneanthracene (PMAn), were prepared with different concentrations of PMAn for holographic recording useful for security documents. The fluorescent photopolymer film showed enhanced fluorescent intensity due to the micro-separation which arose from grating formation and diffusion during photopolymerization. Experimental values of diffraction efficiency were well matched to the simulated values for photopolymers having different PMAn concentrations. Holography patterning was carried out using the fluorescent photopolymer under a photo-mask. A grating was confirmed using microscope techniques in the recorded area under the pattern. Importantly the recorded area showed enhanced fluorescence compared to the unrecorded part, allowing fluorescence patterns at micro scale along with the submicron grating pattern. The fluorescence pattern recorded on the photopolymer film provides additional readability of holographic reading and thus is useful for secure recording and reading of information.

Wide-Area SCADA System with Distributed Security Framework

  • Zhang, Yang;Chen, Jun-Liang
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.597-605
    • /
    • 2012
  • With the smart grid coming near, wide-area supervisory control and data acquisition (SCADA) becomes more and more important. However, traditional SCADA systems are not suitable for the openness and distribution requirements of smart grid. Distributed SCADA services should be openly composable and secure. Event-driven methodology makes service collaborations more real-time and flexible because of the space, time and control decoupling of event producer and consumer, which gives us an appropriate foundation. Our SCADA services are constructed and integrated based on distributed events in this paper. Unfortunately, an event-driven SCADA service does not know who consumes its events, and consumers do not know who produces the events either. In this environment, a SCADA service cannot directly control access because of anonymous and multicast interactions. In this paper, a distributed security framework is proposed to protect not only service operations but also data contents in smart grid environments. Finally, a security implementation scheme is given for SCADA services.

Fiber Optic Security System based on Multimode Fiber (광파이비를 이용한 침입자 감시시스템)

  • Kim, Y.H.;Kim, I.S.;Park, H.S.;Oh, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 1997.07e
    • /
    • pp.1887-1889
    • /
    • 1997
  • This paper reports the principle, design, configuration, and test results of the fiber optic security system using multimode fiber. In this system, optical fiber works as a sensing element. The length of sensing element may be from several meters to several killometers. Physical principle of this system is the dependence of interferometric pattern on the end of the fiber on mechanical perturbation in the area, where this fiber is situated. Near and far field patterns of the output light for multimode fiber are speckle pattern. A number of speckles on the fiber depends on mode numbers. Light intensity in each point of the fiber end depends on phase difference of modes. Finally we introduced a "Fiber Optic Security System based on Multimode" Fiber which we developed, it may be available in the field of the important area and building.

  • PDF

A Roadmap for IoT Network Research and Development

  • almudayni, Ziyad;Soh, Ben;Li, Alice
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2022
  • To make the research and development in IoT networks witness a significant improvement and last for a long period, it is always important to attract new researchers to work on this area and be a part of it. The best way to attract researchers to work in any research area and have their interest is to give them a clear background and roadmap about it. In this way, researchers can easily find a deep point to start their research based on their interest. This paper presents an overview and roadmap about IoT technologies from the most five vital aspects: IoT architecture, communication technologies, type of IoT applications, IoT applications protocols and IoT challenges.