• Title/Summary/Keyword: Security Design

Search Result 3,395, Processing Time 0.026 seconds

Design of VHF Band Meander Sleeve Monopole Antenna for Satellite Communications (위성통신용 VHF대역 미앤더 슬리브 모노폴 안테나 설계)

  • Lee, Yun-Min;Shin, Jin-Seob
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we proposed a meander sleeve monopole antenna for low earth orbit satellite communications. The antenna has broadband property with the planar monopole and ground of meander sleeve. Monopole and ground conductors of the antenna are on the same plane, and exited through coaxial cable feeding. In order to confirm the property of antenna parameters, it was used a commercial software, HFSS, For the antenna fabrication, a FR4 dielectric substrate has a dielectric constant of 4.4 was used. The size of the antenna was $600mm{\times}20mm{\times}1.6mm$. Frequency band of the fabricated antenna was 130MHz~151MHz, and the bandwidth was 20MHz. Measurement results of the fabricated antenna, the return loss is more than -10dB return loss in the band could be obtained. Radiation pattern has a maximum gain of 2.64dBi value.

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

Design of Low-Complexity 128-Bit AES-CCM* IP for IEEE 802.15.4-Compatible WPAN Devices (IEEE 802.15.4 호환 WPAN 기기를 위한 낮은 복잡도를 갖는128-bit AES-CCM* IP 설계)

  • Choi, Injun;Lee, Jong-Yeol;Kim, Ji-Hoon
    • Journal of IKEEE
    • /
    • v.19 no.1
    • /
    • pp.45-51
    • /
    • 2015
  • Recently, as WPAN (Wireless Personal Area Network) becomes the necessary feature in IoT (Internet of Things) devices, the importance of data security also hugely increases. In this paper, we present the low-complexity 128-bit AES-$CCM^*$ hardware IP for IEEE 802.15.4 standard. For low-cost and low-power implementation which is essentially required in IoT devices, we propose two optimization methods. First, the folded AES(Advanced Encryption Standard) processing core with 8-bit datapath is presented where composite field arithmetic is adopted for reduced hardware complexity. In addition, to support $CCM^*$ mode defined in IEEE 802.15.4, we propose the mode-toggling architecture which requires less hardware resources and processing time. With the proposed methods, the gate count of the proposed AES-$CCM^*$ IP can be lowered up to 57% compared to the conventional architecture.

Cathodic Protection of Buried Gas Pipelines Using Common Anode Beds (공용양극을 이용한 가스배관의 전기방식)

  • Ha, Y.C.;Kim, D.K.;Bae, J.H.;Ha, T.H.;Lee, H.G.
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.1
    • /
    • pp.19-24
    • /
    • 2008
  • Due to industrialization and urbanization, underground metallic utilities with different owners have been rapidly increased and cathodic protection (CP) methods, especially impressed current CP systems, have been widely adopted to protect their utilities from corrosion with expanded recognition of this method. The stray current interference problem as well as the difficulty in spatial security for system installation, however, came to a ramification of which each owner couldn't resolve for himself. In this respect, this paper illustrates a field-diagnosed example for mutual interference due to separately operated CP systems and suggests an alternative method to overcome the interference situation by design and field-assessment of a common anode bed cathodic protection system.

  • PDF

Design and Implementation of Wireless Multicommunication Circuit Based On USN (USN 기반의 무선 멀티 커뮤니케이션 회로 설계 및 구현)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.33-42
    • /
    • 2011
  • In this paper we designed and implemented a wireless communication circuit which can control the remote devices integrating RFID and ZigBee. This system unifies transmit part and receive part. And this system recognizes RFID tag data, then the recognized information is controlled by MCU, and transmitted to a remote device through the ZigBee. This is operated on TinyOS. If this system is applied to a entrance security system, it can permit/deny one's entrance as well as control the personal computer or other electronic devices. Our experiment shows the result of the recognized data transmission is very different according to a opened playground and a closed place. The data transmission time is stable in the indoor and the data transmission distance is long in the outdoor. We anticipate that our system be applied the various office oriented domains by connecting to the Wired LAN or the WLAN of IEEE 802.11x category.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

Effects of National Pride and National Attachment on Consumer Ethnocentrism (국가 자부심, 국가 애착이 소비자 자민족주의에 미치는 영향)

  • Choy, Jung-Hyuck;Choi, Soon-Hwa
    • Journal of Distribution Science
    • /
    • v.14 no.12
    • /
    • pp.89-97
    • /
    • 2016
  • Purpose - In the major global markets, such as US and China, consumer ethnocentrism has been strengtened and there is a growing need for related study. This research aims to investigate the effects of national pride and national attachment on consumer ethnocentrism, using a nationally representative dataset from 2013 Korean General Social Survey. Based on the reviews of literature in social and political sciences, two dimensions of national pride were considered: national society pride which is based on positive evaluations on the nation's democracy condition or social security system, and national achievement pride which is based on positive evaluations regarding the country's achievements in the areas of technology, art, sports, and so on. Research design, data, and methodology - The authors developed a structural model in which two types of national pride, national society and achievement pride, are proposed to affect national attachment, thus influencing consumer ethnocentrism. 1,294 surveys were used for empirical analysis. The hypotheses were tested by utilizing SPSS 22.0 and AMOS 21.0. The unidimensionality of each construct and the nomological validity were supported from the results of factor analyses and correlation analysis. Results - It was found that both national society pride and national achievement pride have significant and positive effects on national attachment. Consumers who show stronger pride on the social systems or the global achievements of Korea are more likely to remain being a citizen of the country and support the country even in wrong. Also, there was a significant and positive relationship between national attachment and consumer ethnocentrism. Korean consumers who have stronger attachment to Korea tend to express higher ethnocentrism to protect Korean labor market and to promote economic development of the country. Conclusions - The findings of this study showed that companies and government need to emphasize the country's advanced social environments or global competitiveness in technology, sports, art, and so on, to boost national attachment. With a deeper understanding on the relationships among national pride, national attachment, and consumer ethnocentrism, the authors expect that both local and foreign companies in Korea will be able to develop more effective marketing strategies and to achieve sustainable competitive advantage.

A Study on the Smart Tourism Awareness through Bigdata Analysis

  • LEE, Song-Yi;LEE, Hwan-Soo
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.5
    • /
    • pp.45-52
    • /
    • 2020
  • Purpose: In the 4th industrial revolution, services that incorporate various smart technologies in the tourism sector have begun to gain popularity. Accordingly, academic discussions on smart tourism have also started to become active in various fields. Despite recent research, the definition of smart tourism is still ambiguous, and it is not easy to differentiate its scope or characteristics from traditional tourism concepts. Thus, this study aims to analyze the perception of smart tourism exposed online to identify the current point of smart tourism in Korea and present the research direction for conceptualizing smart tourism suitable for the domestic situation. Research design, data, and methodology: This study analyzes the perception of smart tourism exposed online based on 20,198 news data from portal sites over the past six years. Data on words used with smart tourism were collected from the leading portal sites Naver, Daum, and Google. Text mining techniques were applied to identify the social awareness status of smart tourism. Network analysis was used to visualize the results between words related to smart tourism, and CONCOR analysis was conducted to derive clusters formed by words having similarity. Results: As a result of keyword analysis, the frequency of words related to the development and construction of smart tourism areas was high. The analysis of the centrality of the connection between words showed that the frequency of keywords was similar, and that the words "smartphones" and "China" had relatively high connection centrality. The results of network analysis and CONCOR indicated that words were formed into eight groups including related technologies, promotion, globalization, service introduction, innovation, regional society, activation, and utilization guide. The overall results of data analysis showed that the development of smart tourism cities was a noticeable issue. Conclusions: This study is meaningful in that it clearly reflects the differences in the perception of smart tourism between online and research trends despite various efforts to develop smart tourism in Korea. In addition, this study highlights the need to understand smart tourism concepts and enhance academic discussions. It is expected that such academic discussions will contribute to improving the competitiveness of smart tourism research in Korea.

Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System (침입탐지시스템에서 경보정보에 대한 대응 능력 모델링 및 성능분석)

  • Jeon Yong-Hee;Jang Jung-Sook;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.855-864
    • /
    • 2005
  • In this paper, we propose an intrusion detection system(IDS) architecture which can detect and respond against the generation of abnormal traffic such as malicious code and Internet worms. We model the system, design and implement a simulator using OPNET Modeller, for the performance analysis on the response capacity of alert information in the proposed system. At first, we model the arrival process of alert information resulted from abnormal traffic. In order to model the situation in which alert information is intensively produced, we apply the IBP(Interrupted Bernoulli Process) which may represent well the burstiness of traffic. Then we perform the simulation in order to gain some quantitative understanding of the system for our performance parameters. Based on the results of the performance analysis, we analyze factors which may hinder in accelerating the speed of security node, and would like to present some methods to enhance performance.

A Study on the Effective Method of Generating the Dynamic Web Documents in the Multi-user System (다중-사용자 시스템에서의 효과적인 동적 웹 문서 발생 방법에 관한 연구)

  • Lee Hyun-Chang;Lee Jong-Eon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.478-485
    • /
    • 2006
  • In this paper, we analyze the conditions of generating the dynamic Web documents in multi-user server and propose effective method for it. PSSI technique leads to replace the complex process of modifying a CGI source program by simply correcting the HTML Web document in the external file form. This technique has the strong points of CGI, flexibility and security of programming as well as those of SSI, easiness of modifying Web documents. Due to the characteristics of PSSI that Web source documents are in the form of external file, we show that with a single CGI program an individual user can design and modify his own Web documents in his directory. This means that PSSI technique has more advantage in managing the server than the CGI method which requires CGI program to be set up whenever that service is needed.