• 제목/요약/키워드: Security mechanisms

검색결과 401건 처리시간 0.025초

Enzyme Based Biosensors for Detection of Environmental Pollutants-A Review

  • Nigam, Vinod Kumar;Shukla, Pratyoosh
    • Journal of Microbiology and Biotechnology
    • /
    • 제25권11호
    • /
    • pp.1773-1781
    • /
    • 2015
  • Environmental security is one of the major concerns for the safety of living organisms from a number of harmful pollutants in the atmosphere. Different initiatives, legislative actions, as well as scientific and social concerns have been discussed and adopted to control and regulate the threats of environmental pollution, but it still remains a worldwide challenge. Therefore, there is a need for developing certain sensitive, rapid, and selective techniques that can detect and screen the pollutants for effective bioremediation processes. In this perspective, isolated enzymes or biological systems producing enzymes, as whole cells or in immobilized state, can be used as a source for detection, quantification, and degradation or transformation of pollutants to non-polluting compounds to restore the ecological balance. Biosensors are ideal for the detection and measurement of environmental pollution in a reliable, specific, and sensitive way. In this review, the current status of different types of microbial biosensors and mechanisms of detection of various environmental toxicants are discussed.

Autonomous, Scalable, and Resilient Overlay Infrastructure

  • Shami, Khaldoon;Magoni, Damien;Lorenz, Pascal
    • Journal of Communications and Networks
    • /
    • 제8권4호
    • /
    • pp.378-390
    • /
    • 2006
  • Many distributed applications build overlays on top of the Internet. Several unsolved issues at the network layer can explain this trend to implement network services such as multicast, mobility, and security at the application layer. On one hand, overlays creating basic topologies are usually limited in flexibility and scalability. On the other hand, overlays creating complex topologies require some form of application level addressing, routing, and naming mechanisms. Our aim is to design an efficient and robust addressing, routing, and naming infrastructure for these complex overlays. Our only assumption is that they are deployed over the Internet topology. Applications that use our middleware will be relieved from managing their own overlay topologies. Our infrastructure is based on the separation of the naming and the addressing planes and provides a convergence plane for the current heterogeneous Internet environment. To implement this property, we have designed a scalable distributed k-resilient name to address binding system. This paper describes the design of our overlay infrastructure and presents performance results concerning its routing scalability, its path inflation efficiency and its resilience to network dynamics.

Towards Robust Key Extraction from Multipath Wireless Channels

  • Shehadeh, Youssef El Hajj;Alfandi, Omar;Hogrefe, Dieter
    • Journal of Communications and Networks
    • /
    • 제14권4호
    • /
    • pp.385-395
    • /
    • 2012
  • This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and mobility on the performance and we enhance the key generation mechanism accordingly. As a result, this paper presents a framework towards robust key generation from multipath wireless channels.

그리드 포탈에서 Myproxy 이용시 동일 ID 중복문제 해결방안 (A solution of ID-overlapping in using Myproxy Server in GRID Portal)

  • 이관옥;안동언;정성종;장행진
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 컴퓨터소사이어티 추계학술대회논문집
    • /
    • pp.219-222
    • /
    • 2003
  • Increasingly, Grid technics are developed and demonstrated widely. These days, a point to be considered is that clients use Grid resources more easily. Grid Portals, based on standard Web technologies, are increasingly used to provide user interfaces for using Grid resources. But, due to lack of delegation capabilities in using Grid resources through Grid Portals, it is requested of the security mechanisms. That solution is to using Myproxy Server. Myproxy Server allows Grid user to use Grid resources being interact with Grid Portals. But, while users log in Grid Portals, we are faced with over the overlap of users credentials. This paper describes relationship between Portals and Myproxy, and proposes the way to solve the problem of the overlap of users credentials.

  • PDF

RUPI기반 로봇 환경에 적합한 키 관리 기술 (Key Management Technology for RUPI-based Robot Environment)

  • 김건우;한종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 추계종합학술대회 B
    • /
    • pp.712-715
    • /
    • 2008
  • RUPI 기반 로봇 서비스는 다양한 성능을 지원하는 로봇과 서버간의 연동을 통해서 융통성과 확장성을 보장하는 로봇 기반 서비스를 제공한다. 이러한 로봇 서비스를 제공하는데 있어서 안전성 보장은 필수 요소이다. 하지만 로봇 서비스에 적용되는 각 노드의 다양한 성능을 보장하기 위해서는 각 서비스에 맞는 보안 메커니즘이 적용되어야 하며, 이를 위해서 효율적인 키 관리 구조가 선행되어야 한다. 따라서 본 논문에서는, RUPI 기반 로봇 환경에 적합한 키 관리 구조를 제안한다.

  • PDF

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives

  • Zhang, Junsong;He, Lei;Zhang, Qikun;Gan, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5654-5673
    • /
    • 2016
  • Participatory sensing applications rely on recruiting appropriate participants to share their surrounding conditions with others, and have been widely used in many areas like environmental monitoring, health care, and traffic congestion monitoring, etc. In such applications, how to ensure the privacy of a participant is important, since incentive mechanisms are used to maintain their enthusiasm for sustainable participation by offering certain amount of reward. In this paper, we propose a pseudonym-based privacy protection scheme, that takes both privacy protection and user incentives into consideration. The proposed scheme uses the pseudonym mechanism and one-way hash function to achieve user incentives, while protecting their identity. We also show extensive analysis of the proposed scheme to demonstrate that it can meet the security and performance the requirement of a participatory sensing application.

SybilBF: Defending against Sybil Attacks via Bloom Filters

  • Wu, Hengkui;Yang, Dong;Zhang, Hongke
    • ETRI Journal
    • /
    • 제33권5호
    • /
    • pp.826-829
    • /
    • 2011
  • Distributed systems particularly suffer from Sybil attacks, where a malicious user creates numerous bogus nodes to influence the functions of the system. In this letter, we propose a Bloom filter-based scheme, SybilBF, to fight against Sybil attacks. A Bloom filter presents a set of Sybil nodes according to historical behavior, which can be disseminated to at least n (e-1)/e honest nodes. Our evaluation shows that SybilBF outperforms state of the art mechanisms improving SybilLimit by a factor of (1/e)${\gamma}$ at least.

센서네트워크 통신을 위한 안전한 데이터 전송 기법 (A Secure Data Transmission Mechanism for Sensor Network Communication)

  • 도인실;채기준
    • 정보처리학회논문지C
    • /
    • 제14C권5호
    • /
    • pp.403-410
    • /
    • 2007
  • 효율적인 센서 네트워크 통신이 가능하기 위해서는 보안을 제공하는 라우팅 메커니즘이 필수적이다. 본 연구에서는 안전한 데이터 통신이 가능하도록 하기위해 센서 네트워크 필드를 육각형의 클러스터로 사전에 나누고 가우시안 분포에 따라 각 클러스터에 노드를 배치한 다음 각 클러스터의 클러스터헤드와 게이트웨이 노드를 통해 센서 노드가 감지한 정보를 클러스터헤드론 통해 모아서 보안 정보와 함께 베이스 스테이션에 전달하는 메커니즘을 제안한다. 제안 메커니즘은 전체적인 오버헤드를 효과적으로 줄이면서 효율성을 보장할 뿐 아니라 다양한 라우팅 공격에 대한 저항성을 갖는다.

안전한 직무 기반 접근 제어에 대한 연구 (A Study on Secure Role-Based Access Control)

  • 이호
    • 한국컴퓨터정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.119-124
    • /
    • 2001
  • 본 논문에서는 실제적인 접근 제어 시스템에 적용이 가능하도록 기존의 검증된 접근 제어 메커니즘을 적용하여 보안성, 무결성 및 흐름제어 보안 기능을 제공하며 직무 중심조직의 접근 제어 요구를 용이하게 수용할 수 있는 안전한 직무 기반 접근 제어 모델을 제안한다. 제안한 모델은 주로 인터넷 상에서 웹을 기반으로 하는 응용 시스템에 적용할 수 있는 간단하면서도 안전한 접근 제어 모델이다.

  • PDF

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network

  • Chen, Tieming;Mao, Qingyu;Lv, Mingqi;Cheng, Hongbing;Li, Yinglong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.2180-2197
    • /
    • 2019
  • With the proliferation of the Android malicious applications, malware becomes more capable of hiding or confusing its malicious intent through the use of code obfuscation, which has significantly weaken the effectiveness of the conventional defense mechanisms. Therefore, in order to effectively detect unknown malicious applications on the Android platform, we propose DroidVecDeep, an Android malware detection method using deep learning technique. First, we extract various features and rank them using Mean Decrease Impurity. Second, we transform the features into compact vectors based on word2vec. Finally, we train the classifier based on deep learning model. A comprehensive experimental study on a real sample collection was performed to compare various malware detection approaches. Experimental results demonstrate that the proposed method outperforms other Android malware detection techniques.