• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.028 seconds

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Fulfilling the Export Potential of Agricultural Production in the Context of Aggravating Global Food Crisis

  • Hassan Ali Al-Ababneh;Ainur Osmonova;Ilona Dumanska;Petro Matkovskyi;Andriy Kalynovskyy
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.128-142
    • /
    • 2024
  • Creation and implementation of export-oriented strategy is an urgent issue of economic development of any country. In an export-oriented model of economic development, exports should be a means of promoting economic growth and a tool to strengthen existing and potential competitive advantages. Agricultural production is the key factor in exports and the source of foreign exchange earnings in many countries. However, the export potential of agricultural producers may be inefficiently fulfilled due to the heterogeneity of countries in terms of economic development, trade relations and border policy. The aim of the research is to study the nature, main trends and problematic aspects of fulfilling the export potential of agricultural production in the context of aggravating food crisis. The study involved general scientific methods (induction and deduction, description, analysis, synthesis, generalization) and special (statistical method, economic analysis, descriptive statistics and interstate comparisons, graphical method). The need to ensure food security by countries around the world urges the importance of the agricultural sector as a catalyst for economic development, sources of foreign exchange earnings, investment direction, etc. The study of agricultural specialization led to the conclusion that wheat and sugar are goods with the highest export potential. It is substantiated that the countries of South America, OECD, North America and Europe have the highest level of realization of export potential of agricultural production, and African countries are import-dependent. In addition, the low export orientation of Africa and Asia due to the peculiarities of their natural and climatic conditions is established based on the assessment of export-import operations in the regional context. The internal and external export potential of each of the regions is analysed. Economic and mathematical simulation of assessing the impact of the most important factors on the wheat exports volumes was applied, which allowed predicting wheat exports volume and making sound management decisions regarding the realization of the export potential of agricultural companies. The inverse correlation between the exports volume and wheat consumption per capita, and the direct correlation between the effective size and area of land used for wheat cultivation was established through the correlation and regression analysis.

A Methodology for the Establishment of CityGML Based 3D Drainage Facility Information Model for Runoff Analysis (강우우수 유출해석을 위한 CityGML 기반 3차원 도시 배수시설 정보모델 구축 방안)

  • Lee, Sang-Ho;Jang, Young-Hoon;Kim, Jong Myung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.77-86
    • /
    • 2016
  • In this study, we have created CityGML based 3D information model for drainage facility, manhole and terrain. It conducted analysis of the rainfall-runoff leak through the information model for obtaining interoperability for information integration between city models. The models have advantages to manage the infrastructure information in point of semantic meaning and geometric information by converting the original 2D GIS construction information into the 3D information model. The input values can be automatically generated through the 3D information model of this study, while the values should be entered manually in the conventional method. Also, it can be useful to check the flooding level and related locations by connecting the result of rainfall interpretation and information model.

A Study on Building a Well-organized, Open and Integrated Counter-terrorism System in South Korea (개방·통합형 한국 테러대응시스템 모델 구축 방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.213-240
    • /
    • 2014
  • How will South Korea design well-organized, open, and integrated counterterrorism system? Does this system work well in the emergent situation? These are very significant issues. It is likely that this system would give the solution. A legal basis needs to be established to have a well-organized, open, and integrated counterterrorism system. The core part of a well-organized, open, and integrated counterterrorism system is to minimize and eliminate damage caused by terror through preventiveness, preparation, action, and restoration. For having this system, they need to be divided into two section: an open one and an integration one. In this study, there will be a discussion on a new and appropriate counterterrorism system fit in South Korea a subordinate system: legal, organized, civil aspects need to be provided on the basis of an well-organized, open, and integrated counterterrorism system and an analysis on the current system of the States, England and the following implications.

  • PDF

Distribution Business Model and Protecting Management System of Contents for IPTV (IPTV를 위한 콘텐츠의 유통 비즈니스 모델 및 보호관리)

  • Ryu, Jee-Woong;Bang, Jin-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.845-850
    • /
    • 2011
  • In this paper, we proposed the digital contents distribution business model for the operation of integration between heterogeneous systems in order to use IPTV. Also, we designed and implemented the protection management system through this distribution business model. This proposed model maintains interoperability between the heterogeneous systems, creates rights protection document based on REL, and provides the new version of packaged digital contents to itself by packaging the digital contents. Overall, it ultimately offers an interoperable environment. Moreover, since we pre-defines the relations among REL data based on MPEG-21 standard, which creates the newly packaged digital contents, it is easy to edit data. We can expect to save expenses of digital contents distribution and rights protection technology. Additionally, we can further improve security by encapsulating the security technology of CAS and DRM system.

Construction of Financial Networks based on Virtual Private Networks (가상사설통신망 기반 금융전산망 구축 방안)

  • Seo, Moon-Seog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.41-48
    • /
    • 2009
  • As enactment and enforcement of capital markets integration law, investment banks are going to be appeared in our financial market and be able to provide payment services. To provide these kinds of services, investment banks need to be participated in the financial network. As the financial network enormously affect the economy, the operation of the network will require a variety of risk managements. In this paper we define operational risk management criteria for the financial network such as security, in-time response, economical efficiency and stability to be required for the healthy economy and propose the configuration of the financial network system based on virtual private networks for investment banks to provide payment services. Finally we analyze that the proposed VPN configuration for financial networks has high security and in-time response with the cost and operation effective.

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

A Secure Multiagent Engine Based on Public Key Infrastructure (공개키 기반 구조 기반의 보안 다중 에이전트 엔진)

  • 장혜진
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.313-318
    • /
    • 2002
  • The Integration of agent technology and security technology is needed to many application areas like electronic commerce. This paper suggests a model of extended multi-agent engine which supports privacy, integrity, authentication and non-repudiation on agent communication. Each agent which is developed with the agent engine is composed of agent engine layer and agent application layer. We describe and use the concepts self-to-self messages, secure communication channel, and distinction of KQML messages in agent application layer and messages in agent engine layer. The suggested agent engine provides an agent communication language which is extended to enable secure communication between agents without any modifications or restrictions to content layer and message layer of KQML. Also, in the model of our multi-agent engine, secure communication is expressed and processed transparently on the agent communication language.

  • PDF

Study on Agent based Internetworking Platform (에이전트 기반 인터네트워킹 플랫폼 연구)

  • 전준현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.314-324
    • /
    • 2004
  • Recently, high-speed internet subscribers have grown continuously, and reached up to 10 millions. But existing network management that is responsible only for user access is confronted with many difficulties, since user access network(xDSL, Cable, B-WILL, and so on) has diversified and value added wired/wireless contents service has developed. In this paper propose the Agent based Inter Networking platform as object-oriented hierarchical system that can provide various service such as access QoS(Quality of Service), customized application service and security service according to user on demand. This system has divided into two parts(user agent and agent management system & local and central management systems). Management system periodically receive status information such as bandwidth, download speed, delay, current service, and so on, and process them, then build a policy based on processed information. According to personal user profile that is generated by this policy, the customized service can be provided for users. And This system adopt the object-oriented modeling in case that system migration and integration, and implement a system that is robust and stable for security through hierarchical server system.

The NHPP Bayesian Software Reliability Model Using Latent Variables (잠재변수를 이용한 NHPP 베이지안 소프트웨어 신뢰성 모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.117-126
    • /
    • 2006
  • Bayesian inference and model selection method for software reliability growth models are studied. Software reliability growth models are used in testing stages of software development to model the error content and time intervals between software failures. In this paper, could avoid multiple integration using Gibbs sampling, which is a kind of Markov Chain Monte Carlo method to compute the posterior distribution. Bayesian inference for general order statistics models in software reliability with diffuse prior information and model selection method are studied. For model determination and selection, explored goodness of fit (the error sum of squares), trend tests. The methodology developed in this paper is exemplified with a software reliability random data set introduced by of Weibull distribution(shape 2 & scale 5) of Minitab (version 14) statistical package.

  • PDF