• Title/Summary/Keyword: Security efficiency

Search Result 1,635, Processing Time 0.025 seconds

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.

Poverty Reduction Effectiveness and Efficiency of Social Security Benefits (사회보장급여의 빈곤완화 효과성 및 효율성)

  • Noh, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.237-247
    • /
    • 2021
  • The purpose of this study is to analyze the effectiveness and efficiency of social security benefits to poverty alleviation. To this end, this study analyzed the poverty alleviation effect of public pension, basic pension, child-rearing allowance, disability allowance, basic living security subsidy, EITC, and other government subsidies using 2019 Household Financial Welfare Survey. The analysis results are as follows. First, social security benefits lowered the poverty rate by 6.8%p. Second, in terms of the poverty gap reduction effect, the public pension for the elderly male households, the basic pension for the elderly female householder, and the basic guarantee for the working female householder contributed the most. Finally, in terms of poverty alleviation efficiency, about 33% of social security benefits contribute to narrowing the poverty gap. Social security benefits for female heads of households were found to serve as a function of alleviating poverty gap and for male heads of households to supplement household income. Based on these results, this study suggested the discovery of various poverty states, expansion of basic security for the female elderly, and the connection between the purpose of social security benefits and key targets.

A Study of Security QoS(Quality of Service) Measurement Methodology for Network Security Efficiency (네트워크 보안 효율성 제고를 위한 보안 QoS(Quality of Service) 측정방법론 연구)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.39-48
    • /
    • 2011
  • QoS(Quality of Service) is defined "The collective effect of service performance which determines the degree of satisfaction of a user of the service" by ITU-T Rec. E.800. The final goal of information system is to secure the performance efficiency within the required time. The security QoS framework is the modeling of the QoS measurement metrics, the measurement time schedule, instrument, method of measurement and the series of methodology about analysis of the result of measurement. This paper relates to implementing issue and performance measuring about blended mechanism between networking technology and security technology. We got more effectiveness in overall network security, when applying and composing amalgamated security mechanism between network technology and security technology. In this paper, we suggest techniques being used on infrastructure system and also offers a security QoS methodology as a model of more effective way. Methodology proposed in this research has proven that it is possible to measure response time through the scheduled method.

A Study on Unification of Legislation related to Private Security (한국 민간경비 관련법제 단일화 논의 - 경비업법과 청원경찰법을 중심으로)

  • Lee, Min hyung;Kang, Kyung soo;Kim, Jin hwan
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.1
    • /
    • pp.70-83
    • /
    • 2008
  • The basic legislations regulating the private security in Korea are Private Security Business Act and Private Policeman Act. But this dualistic system of private security causes difficulties in unity and efficiency of private security operation and makes it complicated to supervise each personnel with effect. Besides despite similar service and duty, there is all the difference between private security guard and private policeman in regard of social position, pay, authority, and so on. Therefore it is suggested that the two Acts should be unified and the united private security act should be enacted. Legislating new private security act will lead to considering the detail legislative definition on qualification of personnels and business range.

  • PDF

The Study on the Role of Private Security in International Events (국제적 행사 경비와 민간경비의 역할에 관한 고찰)

  • Seo, Jin-Seok
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.179-210
    • /
    • 2002
  • Recently, the industry of private security needs to cope with system for specialization improvement to security business. Especially, private security will very important in various international events such as 2002 World Cup soccer game and so on. The analyses of this study have led to the following conclusions: First, the industry of private security must advance to trait by oneself. Second, it is needed that both public and private security must know about role-sharing between them on the basis of efficiency, and try to cooperate with each other for the events security. Third, it will educate and train their officials in professional techniques to events security. In addition, it should be expand to reserve manpower and for the motivation to security officials establish as minimum pay scale.

  • PDF

Create a hybrid algorithm by combining Hill and Advanced Encryption Standard Algorithms to Enhance Efficiency of RGB Image Encryption

  • Rania A. Tabeidi;Hanaa F. Morse;Samia M. Masaad;Reem H. Al-shammari;Dalia M. Alsaffar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.129-134
    • /
    • 2023
  • The greatest challenge of this century is the protection of stored and transmitted data over the network. This paper provides a new hybrid algorithm designed based on combination algorithms, in the proposed algorithm combined with Hill and the Advanced Encryption Standard Algorithms, to increase the efficiency of color image encryption and increase the sensitivity of the key to protect the RGB image from Keyes attackers. The proposed algorithm has proven its efficiency in encryption of color images with high security and countering attacks. The strength and efficiency of combination the Hill Chipper and Advanced Encryption Standard Algorithms tested by statical analysis for RGB images histogram and correlation of RGB images before and after encryption using hill cipher and proposed algorithm and also analysis of the secret key and key space to protect the RGB image from Brute force attack. The result of combining Hill and Advanced Encryption Standard Algorithm achieved the ability to cope statistically

Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools (바이너리 분석도구 효율성 평가를 위한 Instrumentation 성능 측정기법)

  • Lee, Minsu;Lee, Jehyun;Kim, Hobin;Ryu, Chanho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1331-1345
    • /
    • 2017
  • Binary instrumentation has been developed for monitoring and debugging executables without their source codes. Previous efforts on the binary instrumentation are mainly focused on its capability and accuracy, but not on efficiency for practical application. In particular, criteria and measurement methodologies for evaluating and comparing the efficiency of binary investigation tools and algorithms do not estimated yet. In this paper, we propose the instrumentation primitives which are a unit functionality and measurement methodology. Through the empirical experiments by adopting the proposed methodology on DynamoRIO and Pin, we show the feasibility of the proposal.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Optimizing Intrusion Detection Pattern Model for Improving Network-based IDS Detection Efficiency

  • Kim, Jai-Myong;Lee, Kyu-Ho;Kim, Jong-Seob;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.37-45
    • /
    • 2001
  • In this paper, separated and optimized pattern database model is proposed. In order to improve efficiency of Network-based IDS, pattern database is classified by proper basis. Classification basis is decided by the specific Intrusions validity on specific target. Using this model, IDS searches only valid patterns in pattern database on each captured packets. In result, IDS can reduce system resources for searching pattern database. So, IDS can analyze more packets on the network. In this paper, proper classification basis is proposed and pattern database classified by that basis is formed. And its performance is verified by experimental results.

  • PDF

Clustering Algorithms for Reducing Energy Consumption - A Review

  • Kinza Mubasher;Rahat Mansha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.109-118
    • /
    • 2023
  • Energy awareness is an essential design flaw in wireless sensor network. Clustering is the most highly regarded energy-efficient technique that offers various benefits such as energy efficiency and network lifetime. Clusters create hierarchical WSNs that introduce the efficient use of limited sensor node resources and thus enhance the life of the network. The goal of this paper is to provide an analysis of the various energy efficient clustering algorithms. Analysis is based on the energy efficiency and network lifetime. This review paper provides an analysis of different energy-efficient clustering algorithms for WSNs.