• Title/Summary/Keyword: Security control system

Search Result 1,741, Processing Time 0.03 seconds

The Improved-Scheme of Two Factor Authentication using SMS (SMS를 이용하는 개선된 이중 인증 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.25-30
    • /
    • 2012
  • Passwords are a common method of identifying and authenticating a user who wishes to log on to a secure system. Password-based authentication techniques, however, do not provide strong security and recognized as being an poor form of protection. It is not all the responsibility of the user to control password and to protect its confidentiality. In this paper, confirm an appropriate response time and I propose a new and improved method of implementing two factor authentication using SMS via receiving apparatus(mobile and email).

A Study on the Reform Direction for Fisheries Administration Organization (수산행정조직의 개혁방안에 관한 연구)

    • Journal of Korean Port Research
    • /
    • v.13 no.2
    • /
    • pp.233-244
    • /
    • 1999
  • The world views the sea newly for the supplementation of the limited land resources and extension of the national territory especially the sea is changing from the period of the free availability to that of the sea control y the coastal nations in step with the announcement of the marine laws in November 16.1994. Therefore Korea is changing strang fisheries nation the fact is that korea cannot effectively cope with changing fisheries situation and various fisheries difficulties because the fisheries policy system is dispersed to each parts of the government. Therefore I tried to present a theoretical basis by studying in the fisheries administration organization. The vision of Ministry of Maritime Affairs and Fisheries is as follow: a coastal fishery must be able to reproduction change of fishery structure must be able to raising fishery consumption of fishery must be able to improvement live of fishing village must be able to betterment overseas fishing grounds must have to security. The results of this study is as follow: fisheries administration organization must be reform of organization for changing under the all situation fisheries administration organization must be reform of entrepreneurial organization fisheries administration organization must be reform of customer driven organization fisheries administration organization must be reform of competitive organization.

  • PDF

Lightweight Home Network Middleware Security Mechanism supporting Mobility Management (이동성 관리를 지원하는 경량 홈 네트워크 미들웨어 보안 기술)

  • Koh Kwang-Man;Hyun Ho-Jae;Hong Ju-Hee;Han Sun-Young
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.375-382
    • /
    • 2006
  • As various kinds of embedded systems (or devices) become widely available, research on home network middleware which can access and control embedded home appliances are actively being progressed. However, there is a significant problem in applying the home network technology to embedded systems because of their limited storage space and low computing power. In this paper, we present a lightweight middleware for home network on embedded systems. Also, we propose a mechanism for mobility management which adopts the anycast technology.

Proposal and Implementation on Non-Repudiation of Origin for DNP3 (DNP3에 적합한 발신 부인 방지 기법 제안과 그 구현)

  • Yu, Ki-Soon;Song, Kyoung-Young;Jang, Min-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.815-825
    • /
    • 2015
  • DNP3(Distributed Network Protocol) is one of the most representative protocols which is used in SCADA(Supervisory Control and Data Acquisition) system. IEC 62351 is listing the integrity, confidentiality, availability and non-repudiation or accountability as the security requirement. However, IEEE Std. 1815 that is DNP3 standards does not define a mechanism for non-repudiation or accountability. In this paper, we propose a non-repudiation of origin technique about the sender of critical ASDU and implement the proposed scheme using software such as OpenSSL and SCADA source code library.

Re-classifying Method for Face Recognition (얼굴 인식 성능 향상을 위한 재분류 방법)

  • Bae Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.105-114
    • /
    • 2004
  • In the past year, the increasing concern about the biometric recognition makes the great activities on the security fields, such as the entrance control or user authentication. In particular, although the features of face recognition, such as user friendly and non-contact made it to be used widely, unhappily it has some disadvantages of low accuracy or low Re-attempts Rates. For this reason, I suggest the new approach to re-classify the classified data of recognition result data to solve the problems. For this study, I will use the typical appearance-based, PCA(Principal Component Analysis) algorithm and verify the performance improvement by adopting the re-classification approach using 200 peoples (10 pictures per one person).

  • PDF

Use of the Moving Average of the Current Weather Data for the Solar Power Generation Amount Prediction (현재 기상 정보의 이동 평균을 사용한 태양광 발전량 예측)

  • Lee, Hyunjin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1530-1537
    • /
    • 2016
  • Recently, solar power generation shows the significant growth in the renewable energy field. Using the short-term prediction, it is possible to control the electric power demand and the power generation plan of the auxiliary device. However, a short-term prediction can be used when you know the weather forecast. If it is not possible to use the weather forecast information because of disconnection of network at the island and the mountains or for security reasons, the accuracy of prediction is not good. Therefore, in this paper, we proposed a system capable of short-term prediction of solar power generation amount by using only the weather information that has been collected by oneself. We used temperature, humidity and insolation as weather information. We have applied a moving average to each information because they had a characteristic of time series. It was composed of min, max and average of each information, differences of mutual information and gradient of it. An artificial neural network, SVM and RBF Network model was used for the prediction algorithm and they were combined by Ensemble method. The results of this suggest that using a moving average during pre-processing and ensemble prediction models will maximize prediction accuracy.

A Study on Cyber Security Evaluation Method of the Digital Instrument and Control System using the Construction of a Test-bed (테스트베드 구축을 통한 디지털계측제어계통 사이버보안 평가 방법에 관한 연구)

  • Cha, Ki-Jong;Shin, Yo-Soon;Seo, Dal-Mi;Sohn, Chang-Ho;Kim, Young-Mi;Jeong, Choong-Heui
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.368-371
    • /
    • 2014
  • 최근 디지털계측제어시스템은 사이버위협에 매우 취약하여 사이버공격에 의해 발전소 안전에 부정적인 영향을 받을 수 있는 실정이다. 따라서 디지털계측제어시스템에 대해 주기적인 사이버보안 위험 평가가 필요하다. 이에 따라 본 논문에서는 테스트베드 구축을 통해 특정 시점에서의 사이버 위협의 침해 가능성 분석, 또는 자체적으로 사이버보안성을 평가할 수 있는 방법에 대해 제안한다. 동 연구에서 제안하는 사이버보안 위험 평가는 자산분석, 테스트베드 구축, 취약점 분석, 위협평가, 위험도분석 및 평가 총 5단계로 구성되며 각 단계의 사이버보안 활동 수행을 통해 디지털계측제어계통의 사이버보안수준이 향상될 것으로 사료된다.

Research Trends and Considerations of Security Technology of Industrial Control System (산업제어시스템의 보안 기술 연구 동향 및 고찰)

  • Lee, Young Hun;Ryu, Jung Hyun;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.149-152
    • /
    • 2018
  • 최근 국가기반시설을 제어하고 관리하는 산업제어시스템에 대한 사이버보안 위협이 증가함에 따라 보안의 중요성이 증가하고 있다. 산업제어시스템에서의 보안 기술은 일반적인 IT 시스템의 보안 기술과는 많은 차이가 있다. 산업제어시스템과 IT 시스템은 인간이 컴퓨터 시스템을 통해 정보를 처리하는 것은 같지만 IT 시스템은 정보 처리의 효율성을 위해 시스템을 사용하는 반면, 산업제어 시스템은 시스템의 효율성을 위해 정보를 처리하는 부분으로 이에 알맞은 새로운 보안 체계 구성이 필요하다. 초기에는 폐쇄망 위주로 구성되었던 산업제어시스템에서 ICT(Information & Communication Technology) 발전으로 외부로부터의 사이버 위협이 가중되었다. 편리성과 효율성이 증대된 만큼 ICT의 취약점 또한 산업제어시스템에서 문제가 발생하고 있지만, 현재 산업제어시스템의 보안 기술에 대해서는 국내에 널리 알려지지 않고 있다. 본 논문에서는 산업제어시스템 및 보안정책에 대해 논의한다. 관련 보안사고의 사례 및 보안 기술을 살펴봄으로써 미래 산업제어시스템의 발전과 보안 공격에 대한 충분한 보안체계를 구축하여 종합적이고, 적합한 보안 대책을 마련하는 것에 도움이 될 것이다.

Boosting the Face Recognition Performance of Ensemble Based LDA for Pose, Non-uniform Illuminations, and Low-Resolution Images

  • Haq, Mahmood Ul;Shahzad, Aamir;Mahmood, Zahid;Shah, Ayaz Ali;Muhammad, Nazeer;Akram, Tallha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3144-3164
    • /
    • 2019
  • Face recognition systems have several potential applications, such as security and biometric access control. Ongoing research is focused to develop a robust face recognition algorithm that can mimic the human vision system. Face pose, non-uniform illuminations, and low-resolution are main factors that influence the performance of face recognition algorithms. This paper proposes a novel method to handle the aforementioned aspects. Proposed face recognition algorithm initially uses 68 points to locate a face in the input image and later partially uses the PCA to extract mean image. Meanwhile, the AdaBoost and the LDA are used to extract face features. In final stage, classic nearest centre classifier is used for face classification. Proposed method outperforms recent state-of-the-art face recognition algorithms by producing high recognition rate and yields much lower error rate for a very challenging situation, such as when only frontal ($0^{\circ}$) face sample is available in gallery and seven poses ($0^{\circ}$, ${\pm}30^{\circ}$, ${\pm}35^{\circ}$, and ${\pm}45^{\circ}$) as a probe on the LFW and the CMU Multi-PIE databases.

Investigating the Relationship Between Accessibility of Green Space and Adult Obesity Rates: A Secondary Data Analysis in the United States

  • Kim, Junhyoung;Lee, Sujung;Ramos, William
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.3
    • /
    • pp.208-217
    • /
    • 2021
  • Objectives: In spite of the importance of green space for reducing obesity-related problems, there has been little exploration of whether access to green space (e.g., parks and recreational facilities) influences the obesity rate of adults in the United States. The purpose of the study was to investigate the relationships among accessibility of green space, obesity rates, and socioeconomic and demographic variables among adults living in the State of Indiana, United States. Methods: We conducted a secondary data analysis to investigate the relationships among accessibility to green space, obesity rates, and socio-demographic variables with employing Geographic Information System in order to measure the accessibility of green space. Results: This study found that accessibility of green space served as a strong predictor of reduced obesity rates among adults (β=-2.478; p<0.10). In addition, adults with higher education levels, as well as better access to green space, were found to have even lower obesity rates (β=-0.188; p<0.05). Other control variables such as unemployment rates, food security, and physical inactivity are additional factors that influence obesity rates among adults. Conclusions: Accessibility of green space may play an important role in facilitating physical activity participation and reducing obesity rates.