• Title/Summary/Keyword: Security Issues

Search Result 1,613, Processing Time 0.034 seconds

Clustered Tributaries-Deltas Architecture for Energy Efficient and Secure Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율성과 보안성을 제공하기 위한 클러스터 기반의 Tributaries-Deltas)

  • Kim, Eun-Kyung;Seo, Jae-Won;Chae, Ki-Joon;Choi, Doo-Ho;Oh, Kyung-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.329-342
    • /
    • 2008
  • The Sensor Networks have limitations in utilizing energies, developing energy-efficient routing protocol and secure routing protocol are important issues in Sensor Network. In the field of data management, Tributaries and Deltas(TD) which incorporates tree topology and multi-path topology effectively have been suggested to provide efficiency and robustness in data aggregation. And our research rendered hierarchical property to TD and proposed Clustering-based Tributaries-Deltas. Through this new structure, we integrated efficiency and robustness of TD structure and advantages of hierarchical Sensor Network. Clustering-based Tributaries-Deltas was proven to perform better than TD in two situations through our research. The first is when a Base Station (BS) notices received information as wrong and requests the network's sensing data retransmission and aggregation. And the second is when the BS is mobile agent with mobility. In addition, we proposed key establishment mechanism proper for the newly proposed structure which resulted in new Sensor Network structure with improved security and energy efficiency as well. We demonstrated that the new mechanism is more energy-efficient than previous one by analyzing consumed amount of energy, and realized the mechanism on TmoteSKY sensor board using TinyOS 2.0. Through this we proved that the new mechanism could be actually utilized in network design.

A Comparative Study on the Maritime Administration System of Marine Advanced Countries (주요해운선진국의 해사행정체계에 대한 고찰 - IMO 연구체계를 중심으로 -)

  • Lee Yun-Cheol;Kim Jin-Kwon
    • Journal of Navigation and Port Research
    • /
    • v.29 no.3 s.99
    • /
    • pp.203-213
    • /
    • 2005
  • The International Maritime Organization(IMO) which is responsible for measures to improve the safety and security of international shipping and to prevent marine pollution from ships is a specialized agency of the United Nations. It is involved in legal matters, including liability and compensation issues and the facilitation of international maritime traffic as well. But the ROK has not been actively coping with the environment of the shipping industry because of the absence of the organization or researching bodies that specialized in the field related to IMO. Therefore this paper investigates the maritime administration system of the major countries such as the USA, japan and the UK. And particularly by conducting IMO research and responding system, this study gathers relevant materials from those countries for the comparison and analysis with the purpose of providing the ROK with the assistance in forming the responding measures in the shipping and shipbuilding industries.

Research on the Access Control Methodology for Dualised Hierarchical Personal Information Life-Cycle (이원화된 계층적 개인정보 Life-Cycle 접근제어 방법론에 관한 연구)

  • Seo, Woo-Seok;Kim, Kye-Soon;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1161-1170
    • /
    • 2013
  • Currently in 2013, a law that was drawn as a result of social agreement for personal information protection was enacted, and through several amendments, definite policy of written law and guideline were presented for definitive information protection in various fields of social business including IT field. Based on a series of social issues about the importance of personal information, a new access paradigm to personal information appeared. And from macroscopic access method called information protection, the necessity of technical access method came to the fore. Of course, it seems somewhat irrational to restrict all data in the form of personal information to a certain category of information until now. But in the deluge of information based on IT field, it is true that the part of checking the flow of personal information and selecting as security target has been standardized. But still there are cases in which it is difficult to routinely apply the five standardized flows of personal information Life-Cycle-collect, process, provide, store, and destroy-to information that all companies and organizations have. Therefore, the researcher proposes the standardized methodology by proposing the access control methodology for dualised hierarchical personal information Life-Cycle. The results of this research aim to provide practical data which makes optimal access control to personal information Life-Cycle possible.

Performance Evaluation Plan of Maritime VHF Digital Communications System (해상용 VHF 디지털통신 시스템의 성능평가 방안)

  • Ju, Yang-Ro;Kim, Kab-Ki;Choi, Jo-Cheon;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.582-588
    • /
    • 2014
  • IMO and IALA have undertaken projects that GMDSS Modernization and E-navigation, which refer to "Future digital communications systems" for a more efficient transmission of voice and data communications in the VHF maritime mobile service. ITU has also resolved in WRC-07 Resolution 357 to study the use of spectrum-efficient technologies in order to provide for the operation of ship and port security and maritime safety systems. IALA and ITU WP5B have coordinated for the technical developments and the spectrum issues. Recommendation ITU-R M.1842-1 has approved by WP5B meeting. This revision provides a wideband data service both 50kHz and 100kHz in the VHF maritime mobile service. This paper has studied E-navigation, its needs for data exchange that includes explanations of the current methods for transmitting data by VHF that based in land mobile radio service. A further technologies trend is estimated for Recommendation ITU-R M.1842-1, that is based on the land mobile radio standards with some tailored to fit the needs of the maritime mobile service.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Development of Chinese Maritime Related Laws and Status and Interpretation in Legislation System (중국 해양관련 법령의 발전과 입법체계에서의 지위 및 해석)

  • Yang, Hee-Cheol;Lee, Moon-Suk;Park, Seong-Wook;Kang, Ryang
    • Ocean and Polar Research
    • /
    • v.30 no.4
    • /
    • pp.427-444
    • /
    • 2008
  • The most important bases of maritime laws in China are laws enacted by Constitution, a legislative institution of National People's Congress and Legislation of NPC Standing Committee. However, in reality, the institution, which become the basis of Chinese marine policy and leads overall maritime affairs, is a State Council of the Chinese central government and many objects of our researches on Chinese marine policy and laws are composed centering on this administration law. Therefore, in understanding Chinese maritime laws, it becomes an important prerequisite to understand relevant laws (statutes), administration law, statutes of local province, mutual authority relationships of these legislative institutions, and interpretation authority regarding laws (statutes). In May 2003, Chinese State Council ratified and declared ${\ll}$Guideline of the national maritime economic development plan${\gg}$ and this is the first macroinstructive document enacted by the Chinese government for promoting maritime economy in integration development. This plan guideline shows very well a new policy and deployment direction of maritime policy in China. China is already striving to lead its maintenance stage of domestic legislation into a new stage under the UN maritime laws agreement system and this is an expression of intention to take national policy regarding the ocean as a new milestone for the national economy through concurrent developments in various fields such as national territory, economy, science technology, national defense, and maritime biology. In this point, Chinese maritime policy and maritime legislation provide lots of indexes of lessons in many parts. In particular, regarding Korea, which has to solve many issues with China in Yellow Sea, East China Sea, and Balhae, we have to realize that we can maximize national interest only with a systematic approach to research on changes of domestic policies and maritime legislation within China. In addition, in understanding Chinese maritime related laws, we have to realize it is an important task to not only understand legislative subjects for mutual creation of order within the entire frame of law orders of China but also to predict and react to direction of policy of Chinese domestic legislation through dynamics of these subjects.

Non-linear Preferences on Bioethanol in South Korea (국내 바이오에탄올에 대한 비선형적 선호에 관한 연구)

  • Bae, Jeong Hwan
    • Environmental and Resource Economics Review
    • /
    • v.23 no.3
    • /
    • pp.515-551
    • /
    • 2014
  • Recently, there has been a debate as to whether bioethanol should replace some portion of gasoline for fuels in South Korea, as energy security as well as climate change issues are rising as a significant national agenda. However, a considerable amount of subsidy will be required to compensate for the higher price of bioethanol-blended gasoline. In this context, government subsidy will obtain justification only when the positive social gains from consuming bioethanol for fuels can exceed the negative social costs. Through a nation-wide choice experimental survey, we examine if South Koreans have a positive value as well as non-linear preferences on substituting bioethanol for gasoline. The results reveal that the willingness to pay for purely domestic bioethanol-blended gasoline within 10% is about 52 KRW; Koreans have concave preferences on the blending ratio of bioethanol to gasoline. The turning point of the blending ratio of bioethanol was 6.5%. Also, we found inverse U-shaped curve between income and bioethanol choice probability and the turning point of the income was calculated as 250~299million KRW. Politically conservative propensity advocates uses of bioethanol blended gasoline, but awareness on bioethanol or more weights on environmental conservation have significantly negative effects on the choice of bioethanol. However, the design of the survey questionnaire is incompatible with the RFS of Korea and assumes orthogonality among the following four interrelated attributes: (i) domestic or offshore procurement of feedstocks in the case of domestic production, (ii) domestic production or import of bioethanol, (iii) the blending ratios, and (iv) the retail price increases. In addition, the results of model estimation and of model selection test are not definite. Hence, the results in this study should not be directly applied to the design of the specifics of the Korean RFS. Hence, the results in this study require cautions in applying to the design of the Korean RFS policy.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.

A Study on the Fire Prevention Activities and Suppression Measures of Utility-Pipe Conduit (지하공동구 화재예방활동 및 진압대책에 관한 연구)

  • Lee, Jung-Il
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.63-68
    • /
    • 2010
  • Utility-Pipe Conduit is, Housing and city effectively accommodate what they absolutely need power, communications, gas, pipeline, water supply, drainage, energy facilities etc, according to expansion of urban infrastructure are derived, several ways to solve problems in, collection facilities in place are maintained and managed facility. If Utility-Pipe Conduit is damaged, as well as national security, because their impact on society as a whole, by introducing large vulnerability in the fire prevention activities and suppression measures and disaster for our situation by introducing measures, comprehensive analysis of the fire risk, it shall establish fire prevention activities and suppression through analysis of Utility-Pipe Conduit design, institutional issues, the problem of fire protection facilities, fire spread phenomenon etc. Because of Utility-Pipe Conduit is an enclosed place, so incomplete combustion due to lack of oxygen supply that there are problem such dark smoke, carbon monoxide etc, toxic combustion products and heat generation and visual impairment is an issue difficult to enter. As well as fire prevention activities, the fire In light of the particularity of the under ground than above ground fire, so this phenomenon is weak fire fighting that fire to become effective fire fighting tactics, basically it is necessary difficulty softening, non-burn softening and prevent combustion expansion of the cable is installed on the Utility-Pipe Conduit, having to considering the specificity of the response command system and relevant organizations to establish an on-site, Structural identification and other information gathering required to record of Response agencies, keep air conditioning system 24 hours and strengthening Virtual Total Training of Response agen

Review of Consultation Requirements Under Military Air Base Law (군용 항공기지법상의 협의제도에 대한 법적고찰)

  • Lee, Kwan-Hyoung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.385-444
    • /
    • 2003
  • Current Military Airbase Law, in an effort to promote safety of military aircraft and security of military airbase, requires an administrative agency or its empowered branch to consult with the Secretary of Defense or the commander of the airbase before they issue a certain administrative approval or decision related to the installation. Although this consultation process purports itself in simplifying what can be an protracted administrative procedure, and in unifying objectives of the military and the administrative services, such procedural requirement is vulnerable inevitability of various legal problems whenever there is a conflict of interests among civil, military, government services. Nor is there sufficient studies done by academian in the area of bureaucratic issues of administrative resolution, and certainly not in the area of the military consultation procedure. This article, with such reality in mind attempts to constructively examine 1) when a consultation application is submitted, whether the discretionary power of the commander of the affected airbase is acknowledged at the outset; 2) if the content of the consultation is deemed unlawful, whether a civilian can institute an administrative lawsuit against it; 3) problems about the subject matters of the consultation requirement within the framework of military airbase law; 4) whether the issuing administrative agency must abide by and issue approval or decision in accordance with the opinion proposed by the said commander; 5) the legal problems of the remedial measure such as an order of removal, appellate review, notion to challenge authority, and etc. in cases such as administrative agency ignoring the commanders proposal or issuing final approval or decision that is inconsistent with what was consulted and agreed upon between both parties.

  • PDF