• Title/Summary/Keyword: Security Control

Search Result 3,102, Processing Time 0.026 seconds

A Study on the Continuity Essential Function of Critical Infrastructure Protection System for Public Safety (공공안전을 위한 국가기반체계 보호제도의 핵심기능연속성에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.795-802
    • /
    • 2017
  • If the function of the national infrastructure is suspended due to natural disasters and social disasters, the damage of the national infrastructure can be a serious threat to the national security as well as the life, body and property damage of the people. In this paper, we examine the domestic and overseas trends of the national system protection system and examine the domestic and overseas trends of the national system protection system. The detailed function of the essential function continuity, essential function, succession order, authority delegation, continuity facility, continuity communication, We examined the specific issues related to testing, education and training, transferring control and directing authority, analyzing the system related to the national infrastructure protection plan, and examined the specific problems and suggested an effective improvement plan for the critical infrastructure protection system.

Construction Schemes of GIS-based Integrated Water Environment Information Management System Linked with Korean Reach File (KRF를 연계한 GIS기반의 통합 물환경정보 관리시스템 구축 방안)

  • Lee, Chol Young;Kim, Kye Hyun;Park, Yong Gil;Lee, Hyuk
    • Journal of Korean Society on Water Environment
    • /
    • v.30 no.2
    • /
    • pp.226-241
    • /
    • 2014
  • This study proposes schemes of GIS-based system development for integrated information management in water environment linked with Korean Reach File (KRF). For this purpose, precedent studies and systems of the U.S. were investigated and analyzed to induce optimal methodology for Korean circumstances. Thereafter, data linkage methods of KRF and Water Environment Information System (WEIS), system configuration plans, application development plans, and KRF improvement and maintenance plans were considered. For data linkage and system configuration, three methods were suggested: an overlay operation-based data linkage method, entering spatial addresses into the existing DB, and creating link information between KRF and the existing DB. The first method was predicted to be the most effective for system implementation, the second method is advantageous for search tasks, and the third method is advantageous for system security and maintenance. Various types of applications should be developed in the consideration of the types of the users and their usages. Moreover, there is a need for further research on regular renewal of KRF, standard development, expansion of construction areas, etc. Based on the present results, research on actual system design and development also should be conducted for supporting Total Maximum Daily Loads (TMDLs).

Relationship among Health Status, Health Behaviors and Health Practices of Adults in a Poor Area (대구광역시 영세주민의 건강행위 및 건강실천행위 관련요인)

  • 임용찬;이중정;박종원
    • Korean Journal of Health Education and Promotion
    • /
    • v.21 no.2
    • /
    • pp.55-85
    • /
    • 2004
  • The problems of health in poor peoples are various and difficult things to solve it. They are highly susceptible to chronic disease because of bad environment and It is hard to access to medical services because of their Socio-demographic status. Therefore, it is important to address the problem of prevention of chronic disease and health promotion aspect. The purpose of this study was to determine the relationships among the health status, health behaviors and health practices of poor people in urban slum area. The subject of this study were 298 poor peoples who live in poor area in Daegu metropolitan city and they were asked to answer the survey questionnaires modified for Korean from behavioral risk factor surveillance system of Centers for Disease Control and Prevention USA. The result of the study were as follows; (1) There were significant relationships between health status (prevalence of chronic disease and perceived general health) and socio-demographic factor such as occupation, existence of spouse, number of family educational level, type of medical security. (2) There were some relationships between health risk behaviors such as smoking, drinking and obesity and health status of subject especially in female obesity.(3) There were relationships among health concern activity, prevalence of chronic disease and some social factor such as educational level and occupation. (4) There were relationships among health practice, health concern activity, health status and socio-demographic factors of subject. This study suggest that health status, socio-demographic status, health concerns and health promotion activity of study populations were associated and It is very important things supporting the poor people in the level of community and nation to practice healthy behaviors themselves.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

A Study on the Fundamental Comparison of Simulation and Optimization Approaches for Water Resources Systems Planning and Management (수자원시스템의 효율적 운영을 위한 시뮬레이션과 최적화 기법의 원론적 비교 연구)

  • Kong, Jeong-Taek;Kim, Jaehee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.4
    • /
    • pp.373-387
    • /
    • 2013
  • For the efficient operation and management of the water resources system, coordinated operation of weirs and reservoirs is required. A simulation based, and an optimization based approaches are available to deal with the operation and management problems. The simulation based approach does not guarantee an optimal solution, and the optimization based approach is not so flexible to consider, complex, nonlinear problems we will face when trying to allocate water to different uses, various demand sectors in a basin. Hence, it is important to develop a model that would compensate for the weak points in both models. We will compare and contrast intrinsic and extrinsic properties of two modeling approaches, addressing issues related to setting system operation and control rules that would lead us to more efficient use of water in the basin. As a result, we propose to use CoWMOM(Coordinated weirs and multi-reservoir operating model), a "simulation based" optimization model for a simple simulation of the past periods, and for the real-time simulation process considering uncertain inflow.

A Study on the Awareness of the Middle Aged for the Digital home System and Well-being Apartment Design Elements (디지털홈 시스템과 웰빙아파트 계획요소에 대한 중년층 의식 연구)

  • Cho, Sung-Heui;Lee, Tae-Kyung
    • Journal of the Korean housing association
    • /
    • v.18 no.2
    • /
    • pp.93-103
    • /
    • 2007
  • This study examined the awareness of the middle aged about the digital home system and well-being apartment design elements in order to suggest the design guidelines for planning of the elderly housing environment. By literature review, the concept and characteristics of the digital home system and well-being Apartment design elements were summarized the degree of satisfaction and preference of middle aged for these characteristics were investigated and analyzed. For this study, a questionnaire survey of 156 housewives living in apartment complex of Busan was carried out. The results of this study are as follows: The middle aged were generally short of recognition for digital skill and service, and also they showed positive evaluations to a few useful items of digital home system. These items belong under safety security system and interior environment control system and provided for convenient & comfortable life. Accordingly, satisfied digital home system can apply basic design element for housing for elderly. Whereas, the middle-aged were not satisfied with housework help system and cultural life system because items of these systems were not various and complicate to us. So, for the improvement of not satisfied digital home system, we needed development of digital contents and marketing & management for high accessibility and easy useability. The middle aged will concern about health & environment friendly continuously and become to stay long in their housing as the characteristics of elderly. So, It is necessary to be considered well-being apartment design elements of health & environment friendly very actively and lastingly in elderly housing environment design. Also, the awareness of middle aged for digital home system and well-being apartment design elements varied according to the background characteristics. This suggests housing environment for elderly life is considered differently as various background characteristics of middle aged.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.