• Title/Summary/Keyword: Security Control

Search Result 3,087, Processing Time 0.038 seconds

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

A Study on the Fundamental Comparison of Simulation and Optimization Approaches for Water Resources Systems Planning and Management (수자원시스템의 효율적 운영을 위한 시뮬레이션과 최적화 기법의 원론적 비교 연구)

  • Kong, Jeong-Taek;Kim, Jaehee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.4
    • /
    • pp.373-387
    • /
    • 2013
  • For the efficient operation and management of the water resources system, coordinated operation of weirs and reservoirs is required. A simulation based, and an optimization based approaches are available to deal with the operation and management problems. The simulation based approach does not guarantee an optimal solution, and the optimization based approach is not so flexible to consider, complex, nonlinear problems we will face when trying to allocate water to different uses, various demand sectors in a basin. Hence, it is important to develop a model that would compensate for the weak points in both models. We will compare and contrast intrinsic and extrinsic properties of two modeling approaches, addressing issues related to setting system operation and control rules that would lead us to more efficient use of water in the basin. As a result, we propose to use CoWMOM(Coordinated weirs and multi-reservoir operating model), a "simulation based" optimization model for a simple simulation of the past periods, and for the real-time simulation process considering uncertain inflow.

A Study on the Awareness of the Middle Aged for the Digital home System and Well-being Apartment Design Elements (디지털홈 시스템과 웰빙아파트 계획요소에 대한 중년층 의식 연구)

  • Cho, Sung-Heui;Lee, Tae-Kyung
    • Journal of the Korean housing association
    • /
    • v.18 no.2
    • /
    • pp.93-103
    • /
    • 2007
  • This study examined the awareness of the middle aged about the digital home system and well-being apartment design elements in order to suggest the design guidelines for planning of the elderly housing environment. By literature review, the concept and characteristics of the digital home system and well-being Apartment design elements were summarized the degree of satisfaction and preference of middle aged for these characteristics were investigated and analyzed. For this study, a questionnaire survey of 156 housewives living in apartment complex of Busan was carried out. The results of this study are as follows: The middle aged were generally short of recognition for digital skill and service, and also they showed positive evaluations to a few useful items of digital home system. These items belong under safety security system and interior environment control system and provided for convenient & comfortable life. Accordingly, satisfied digital home system can apply basic design element for housing for elderly. Whereas, the middle-aged were not satisfied with housework help system and cultural life system because items of these systems were not various and complicate to us. So, for the improvement of not satisfied digital home system, we needed development of digital contents and marketing & management for high accessibility and easy useability. The middle aged will concern about health & environment friendly continuously and become to stay long in their housing as the characteristics of elderly. So, It is necessary to be considered well-being apartment design elements of health & environment friendly very actively and lastingly in elderly housing environment design. Also, the awareness of middle aged for digital home system and well-being apartment design elements varied according to the background characteristics. This suggests housing environment for elderly life is considered differently as various background characteristics of middle aged.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

A Study on the IUU Governance System of Regional Fishery Management Organization and Major State (국제 지역 수산 관리 기구와 주요 국가의 IUU 통제제도 연구)

  • Park, Min-Gyu
    • The Journal of Fisheries Business Administration
    • /
    • v.41 no.3
    • /
    • pp.103-127
    • /
    • 2010
  • The FAO reports that IUU fishing activities have widespread economic, social, and management consequences, including depriving legitimate fishers of harvest opportunities. It affects all fisheries from small scale to industrial. It also affects the ability of governments to support sustainable livelihoods for fishers and, more broadly, to achieve food security. The complexity of IUU requires various measures to combat IUU fishing such as adoption of IUU vessel lists; stronger port State controls; improved monitoring, control and surveillance (MCS); implementation of market-related measures to help ensure compliance; and capacity-building assistance. Trade and market measures reduce opportunities for IUU fishing activities by precluding or impeding access to markets for IUU product in a manner consistent with international law. ICCAT, CCAMLR, and IATTC, have put in place trade tracking programs or catch documentation schemes, and WCPFC is considering such a program. Vessel lists assist enforcement authorities in determining which vessels are or are not authorized to be fishing or conducting fishing support activities in specified areas. A number of RFMOs maintain records of IUU vessels: CCAMLR, IATTC, ICCAT, NAFO, NASCO, NPAFC, WCPFC. Section 608 of the US MSRA calling on the Secretary of Commerce, in consultation with the Secretary of State, and in cooperation with relevant regional fishery management councils and any relevant advisory committees, to take actions to improve the effectiveness of international fishery management organizations in conserving and managing stocks under their jurisdiction. EU IUU Regulation entered into force on 1 January 2010, was intended to regulate the highly complex multi-channel fisheries supply system of the European Community (EC) in an effort to improve global fisheries sustainability.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

A Study on the Efficiency of Import-Export Logistics through Advance Presentation of Vessel Manifest (해상적하목록 사전제출을 통한 수출입물류 효율화 방안에 관한 연구)

  • Kim, Yong-Jin;Seo, Dong-Gyun
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.275-296
    • /
    • 2011
  • The purpose of this study was to examine ways of ensuring the efficiency and stability of import-export logistics in our country by introducing an advance presentation system of vessel manifest. This advance presentation system of vessel manifest has already been introduced in the United States, the EU and China whom our country has actively traded with, and the reinforcement of logistics security is a global trend. Under the circumstances, the introduction of the advance presentation system of vessel manifest is required to assist exporters to properly respond to changing trade practices as early as possible, and it's also necessary to exercise stricter control over an import criminal cargo. Our country should urgently introduce the advance presentation system of vessel manifest that is up to global standard, and the establishment of an internet based manifest consolidation and presentation system and the introduction of an export inspection system of port of loading are requested as well. If all the systems are introduced and work properly, that will make a great contribution to the efficiency of import-export logistics in our country.

Intelligent Emergency Alarm System based on Multimedia IoT for Smart City

  • Kim, Shin;Yoon, Kyoungro
    • Journal of the Semiconductor & Display Technology
    • /
    • v.18 no.3
    • /
    • pp.122-126
    • /
    • 2019
  • These-days technology related to IoT (Internet of Thing) is widely used and there are many types of smart system based IoT like smart health, smart building and so on. In smart health system, it is possible to check someone's health by analyzing data from wearable IoT device like smart watch. Smart building system aims to collect data from sensor such as humidity, temperature, human counter like that and control the building for energy efficiency, security, safety and so forth. Furthermore, smart city system can comprise several smart systems like smart building, smart health, smart mobility, smart energy and etc. In this paper, we propose multimedia IoT based intelligent emergency alarm system for smart city. In existing IoT based smart system, it communicates lightweight data like text data. In the past, due to network's limitations lightweight IoT protocol was proposed for communicating data between things but now network technology develops, problem which is to communicate heavy data is solving. The proposed system obtains video from IP cameras/CCTVs, analyses the video by exploiting AI algorithm for detecting emergencies and prevents them which cause damage or death. If emergency is detected, the proposed system sends warning message that emergency may occur to people or agencies. We built prototype of the intelligent emergency alarm system based on MQTT and assured that the system detected dangerous situation and sent alarm messages. From the test results, it is expected that the system can prevent damages of people, nature and save human life from emergency.