• Title/Summary/Keyword: Security Enhancement

Search Result 362, Processing Time 0.03 seconds

Groundwater Management Pradigm Shift and Policy Directions for Integrated Water Management in Korea (통합 물관리를 위한 우리나라 지하수 관리 패러다임 전환과 정책방향)

  • Hyun, Yunjung;Han, Hye Jin
    • Journal of Soil and Groundwater Environment
    • /
    • v.26 no.6
    • /
    • pp.176-185
    • /
    • 2021
  • This paper aims to develop a new paradigm for groundwater management which is compatible with integrated water management policies in Korea. Three key roles of groundwater are defined for addressing water cycle distortion, high water stress, water quality degradation, aquatic ecosystems deterioration, and water-related hazards. Firstly, groundwater plays an important role in contributing soundness of water cycle as a component of water cycle. Secondly, it is a local water resource to ensure water supply sustainability. Thirdly, groundwater is an essential water resource for drought and emergencies. In order to support the groundwater roles, we propose a paradigm shift for groundwater management and policy directions towards integrated water management. The new paradigm consists of managements for sound water cycle on a watershed scale and groundwater environment(quantity, quality, and groundwater dependent ecosystems) managements for both human and nature. A prospective management also constitutes the new paradigm. In addition, this paper proposes four policy directions in groundwater management. The policies emphasize the integrated management of groundwater and surface water, management of groundwater environment(quantity, quality, and groundwater dependent ecosystems), management of groundwater uses for water sustainability and security, and enhancement of groundwater publicity.

Review on LTE-Advanced Mobile Technology

  • Seo, Dae-woong;Kim, Yoon-Hwan;Song, Jeong-Sang;Jang, Bongseog;Bae, Sang-Hyun
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.197-203
    • /
    • 2018
  • Long Term Evolution-Advanced (LTE-A) is the next drive in the broadband mobile communication, which allows operators to improve networks performance and service capabilities. LTE-A targets the peak data rates of 1Gbps in the downlink and 500Mbps in the uplink. This requirement is only fulfilled by a transmission bandwidth of up to 100MHz. However the accessibility of such large part of the contiguous spectrum is uncommon in practice. Therefore LTE-A uses some new features on top of the existing LTE standards to provide very high data rate transmission. Some of the most significant features introduced in LTE-A are carrier aggregation, heterogeneous network enhancement, coordinated multipoint transmission and reception, enhanced multiple input and multiple output, and development relay nodes with universal frequency reuse. This review paper presents an overview of the above mentioned LTE-A key features and functionalities. Based on this review, in the conclusion we discuss the current technical challenges for future broadband mobile communication systems.

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.

Cascaded Residual Densely Connected Network for Image Super-Resolution

  • Zou, Changjun;Ye, Lintao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.2882-2903
    • /
    • 2022
  • Image super-resolution (SR) processing is of great value in the fields of digital image processing, intelligent security, film and television production and so on. This paper proposed a densely connected deep learning network based on cascade architecture, which can be used to solve the problem of super-resolution in the field of image quality enhancement. We proposed a more efficient residual scaling dense block (RSDB) and the multi-channel cascade architecture to realize more efficient feature reuse. Also we proposed a hybrid loss function based on L1 error and L error to achieve better L error performance. The experimental results show that the overall performance of the network is effectively improved on cascade architecture and residual scaling. Compared with the residual dense net (RDN), the PSNR / SSIM of the new method is improved by 2.24% / 1.44% respectively, and the L performance is improved by 3.64%. It shows that the cascade connection and residual scaling method can effectively realize feature reuse, improving the residual convergence speed and learning efficiency of our network. The L performance is improved by 11.09% with only a minimal loses of 1.14% / 0.60% on PSNR / SSIM performance after adopting the new loss function. That is to say, the L performance can be improved greatly on the new loss function with a minor loss of PSNR / SSIM performance, which is of great value in L error sensitive tasks.

Outcome and Enhancement of ISO 27001(ISMS) in National R&D Information Management Environment (국가R&D정보관리 환경에서 ISO 27001(ISMS) 성과 및 개선 방향)

  • Lee, Byeong-Hee;Yeo, Il-Yeon;Kim, Jae-Soo
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.823-825
    • /
    • 2011
  • R&D에 관한 주요 국가 및 산업기술의 정보 유출이 문제가 되고 있다. 2009년 11월 국가과학기술지식정보서비스(NTIS)는 영국표준협회(BSI)로부터 ISO 27001에 대한 11개 도메인, 133개 보안 통제항목의 정보보호관리체계((Information Security Management System) 인증을 획득하였고 이후 사후인증 심사를 받고 있다. 본 논문에서는 정보보호 국제 표준인증인 ISO 27001과 관련하여 NTIS의 정보보호관리체계에 대하여 국가R&D정보관리의 경영적 관점에서 실증적 현황 및 성과와 향후 개선 및 발전 방향에 대하여 검토한다. ISO 27001 도입 후 133개 통제항목 중에서 적용율이 증가하였고 중부적합/경부적합/개선권고 사항이 크게 감소하였으나 정보자산 및 개인정보 관리는 지속적인 관심과 개선이 필요함을 알 수 있었다.

Enhancement of WiBro PKMv2 EAP-AKA Authentication Security Against Rogue BS based Redirection Attacks (WiBro PKMv2 EAP-AKA 기반 인증 과정에서의 Redirection Attack 에 대한 보안 취약성 및 개선 방안)

  • Lee, Hyun-Chul;Eom, Sung-Hyun;Cho, Sung-Jae;Choi, Hyoung-Kee
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.1210-1213
    • /
    • 2007
  • WiBro는 무선랜과 3G 이동통신의 장점을 결합한 휴대 인터넷 기술로 최근 국내에서 상용화 되었다. WiBro의 장점인 이동성과 고속 무선 통신에 기인하여, 향후 지속적인 발전이 기대된다. 이러한 WiBro의 확산에 따라 개인 사용자에 대한 보안문제가 최근 크게 부각되고 있다. 현재 Wibro는 3G 이동통신 및 무선랜과 효율적인 연동을 위해 EAP-AKA 인증기법을 사용하고 있다. 하지만 EAP-AKA는 단말이 기지국을 인증하지 못하는 치명적인 취약점이 있다. 따라서 공격자는 임의로 rogue BS를 설치할 수 있고, 정상 사용자의 데이터를 이종 네트워크로 보내는 Redirection Attack을 시도할 수 있다. Redirection Attack은 전송 속도 저하, Denial-of-Service (DoS) 을 초래하며, 데이터가 redirection 되는 이종 네트워크에 따라 암호화된 데이터가 노출될 수 있다. 본 논문에서는 EAP-AKA와 Redirection Attack에 대해 분석하고, 그 해결책을 제시한다. 논문은 1) 프로토콜을 일부 수정하여 공격을 막는 방법과 2) traffic 분석을 통한 공격 탐지 방식을 다루고 있으며, 이러한 두 가지 방법을 통해 Redirection Attack에 대한 취약점을 근본적으로 제거할 수 있다.

Water/nutrient use efficiency and effect of fertigation: a review

  • Woojin Kim;Yejin Lee;Taek-Keun Oh;Jwakyung Sung
    • Korean Journal of Agricultural Science
    • /
    • v.49 no.4
    • /
    • pp.971-978
    • /
    • 2022
  • Fertigation, which has been introduced in agricultural fields since 1990, has been widely practiced in upland fields as well as in plastic film houses as part of the crop production system. In accordance with demands in the agricultural sector, a huge number of scientific studies on fertigation have been conducted worldwide. Moreover, with a combination of advanced technologies such as big-data, machine learning, etc., fertigation is positioned as an indispensable tool to achieve sustainable crop production and to enhance nutrient and water use efficiency. In this review, we focused on providing valuable information in terms of crop production and nutrient/water use efficiency. A variety of fertigation studies have described that enhancement of crop production did not differ relative to conventional method or slightly increased. In contrast, fertigation significantly improved nutrient/water use efficiency, with a reduction in use ranging from 20 to 50%. Water-soluble organic resources such as livestock manure and agricultural byproducts also have been identified as useful resources like chemical fertilizers. Furthermore, the initial irrigation point was generally recommended in a range of -10 - -40 kPa, although the point differed according to the crop and crop growth stage. From this review, we suggest that fertigation, which is closely integrated with advanced technology, could be a leading technology to attain not only food security but also carbon neutrality via improvement of nutrient/water use efficiency.

The Policing of the G20 Seoul Protests: A Case Analysis on the Death of Ian Tomlinson (G20 서울 정상회의 관련 집회시위 경비방안 : 이안 톰린슨(Ian Tomlinson) 사망사건 분석을 중심으로)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.125-146
    • /
    • 2010
  • The G20 summit is the premier forum for international economic cooperation and it will be held in Seoul in November 2010. However, protests are expected during the Seoul summit, as a part of the deepening global war against capitalism. The Korean Police need to deal with these protests effectively in order to provide security to the participating leaders and make the meeting run on wheel as planned. The current study attempts to analyze the death of Ian Tomlinson who died in the context of a heavily policed protest during 2009 G20 London summit. There are number of unique features regarding this incident, such as the public scrutiny of police conduct through video footage, the police use of excessive force, and the process to hold the police to account for misconduct. This incident caused serious damages to the public's faith in the British police. Based on the analysis, this study found that during the G20 London summit British police had the problems such as the lack of the clear standards on the use of force, improper training in the use of force, poor communications with the media and protesters, inappropriate use of the close containment tactic, and the failure to display police identification. Therefore, this study suggests the inducement of peaceful protests, the adoption of a set of standards on the use of force, public order training that is more directed and more relevant to the public order challenges facing the Korean police, improvement of the communication with the media and protesters, enhancement of individual officer's accountability as public order policing strategies for G20 Seoul summit meeting. However, the most fundamental principle is that Korean police must place a high value on tolerance and winning the consent of the public.

  • PDF

A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment (클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.397-406
    • /
    • 2017
  • In case of using the existing encrypted algorithm for massive data encryption service under the cloud environment, the problem that requires much time in data encryption come to the fore. To make up for this weakness, a partial encryption method is used generally. However, the existing partial encryption method has a disadvantage that the encrypted data can be inferred due to the remaining area that is not encrypted. This study proposes a partial encryption method of increasing the encryption speed and complying with the security standard in order to solve this demerit. The proposed method consists of 3 processes such as header formation, partial encryption and block shuffle. In step 1 Header formation process, header data necessary for the algorithm are generated. In step 2 Partial encryption process, a part of data is encrypted, using LEA (Lightweight Encryption Algorithm), and all data are transformed with XOR of data in the unencrypted part and the block generated in the encryption process. In step 3 Block shuffle process, the blocks are mixed, using the shuffle data stored with the random arrangement form in the header to carry out encryption by transforming the data into an unrecognizable form. As a result of the implementation of the proposed method, applying it to a mobile device, all the encrypted data were transformed into an unrecognizable form, so the data could not be inferred, and the data could not be restored without the encryption key. It was confirmed that the proposed method could make prompt treatment possible in encrypting mass data since the encryption speed is improved by approximately 273% or so compared to LEA which is Lightweight Encryption Algorithm.

A Study on National Cyber Capability Assessment Methodology (국가 사이버 역량 평가 방법론 연구)

  • Kang, JungMin;Hwang, HyunUk;Lee, JongMoon;Yun, YoungTae;Bae, ByungChul;Jung, SoonYoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1039-1055
    • /
    • 2012
  • It is required for us to enhance the national cyber capability as the worldwide countries have been doing effort to strengthen their cyber capabilities. However, we are encountering the difficulty in estimating national cyber capability due to the absence of any cyber capability assessment methodology. This paper presents the national cyber capability assessment methodology which is used for settle up national cyber policy. We also introduce the result of five major nations(US, China, Japan, Russia, Korea)' cyber capability assessment using the proposed methodology. The methodology is developed using open data and includes three areas; base capability, attack capability and defense capability. The assessment result shows the in the order of US, China, Korea, Russia, Japan. As the analysis of that result, in order to enhance the our cyber capability, we recommend that first, cyber budget and human resources for the base capability should be more invested, second, the strategy for attack capability enhancement is strongly required and lastly, the patch ratio and security monitoring level should be upgraded.