• Title/Summary/Keyword: Security mechanisms

Search Result 400, Processing Time 0.022 seconds

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System (혼합형 침입 탐지 시스템에서 데이터 및 정책 전달 통신 모델과 성능 평가)

  • Jang, Jung-Sook;Jeon, Yong-Hee;Jang, Jong-Soo;Sohn, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.727-738
    • /
    • 2003
  • Much research efforts are being exerted for the study of intrusion detection system(IDS). However little work has been for the communication medels and performance eveluation of the IDS. Here we present a communication framework for doing hybrid intrusion detection in which agents are used for local intrusion detections with a centralized data anaysis componenta for a global intrusion detection at multiple domains environment. We also assume the combination of host-based and network-based intrusion detection systems in the oberall framework. From the local domain, a set of information such as alert, and / or log data are reported to the upper level. At the root of the hierarchy, there is a global manager where data coalescing is performed. The global manager delivers a security policy to its lower levels as the result of aggregation and correlation of intrusion detection alerts. In this paper, we model the communication mechanisms for the hybrid IDS and develop a simular using OPNET modeller for the performance evaluation of transmission capabillities for the delivery of data and policy. We present and compare simulation results based on several scenarios focuding on communication delay.

Design and Implementation of Facial Biometric Data based User Authentication System using One-Time Password Generation Mechanism (얼굴 정보 기반 일회용 패스워드 생성 메커니즘을 이용한 사용자 인증 시스템 설계 및 구현)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1911-1918
    • /
    • 2011
  • Internet banking, electronic financial services and internet telephony service can be available on smart phone recently. In this case, more robust authentication mechanisms should be provided for enhancing security on it. In this study, a facial biometric ID based one-time password generation mechanism is designed and implemented for enhancing user authentication on smart phone. After capturing a facial biometric data using camera module on smart phone, it is sent to server to generate one-time biometric ID. Finally one-time password will be generated by client module after receiving the one time biometric ID based challenge token from the server. Using proposed biometric ID based one-time password mechanism, it is possible for us to provide more secure user authentication service on smart phone for SIP protocol.

Development of Tree Structures and Algorithms for the Efficient Group Key Management in Multicast Environment (멀티캐스트 환경에서 효율적인 그룹키 관리를 위한 트리구조 및 알고리즘 개발)

  • Han, Keun-Hee
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.587-598
    • /
    • 2002
  • In multicast environment, the main objective of group key management is to provide security services to group communications by sharing a single group key among all the members of the group and subsequently encrypting and decrypting all the communication messages exchanged among the members of the group. Up to now, there has been no effort to develop group key management mechanism that considers the rate of users' join/leave operations. Hence, in this research, we propose group key management mechanisms that consider the rate of user's join/leave operations. We also define a new tree structure called variable tree which is much more flexible than full regular trees and show that variable trees are more efficient than full regular trees for group key management. Especially, we propose an algorithm that minimizes the necessary number of rekey messages according to the rate of join and leave operations. We also shows that if the rate of leave operation is greater than 50%, then the tree structure with degrees 2 or 3 are the optimal structures.

A Study on the Consumer Disputes and Protection Measures of the Digital Healthcare Market and O2O Service (디지털헬스케어 시장과 O2O서비스 소비자분쟁 및 보호방안)

  • Byeon, Seung Hyeok
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.121-138
    • /
    • 2020
  • The O2O services in the healthcare sector have only been in full swing for about three years, and unlike existing O2O consumer goods, the scale and scope of the dispute are more complicated due to restrictions on medical treatment. In this study, O2O service platform operators and medical institutions' roles and responsibilities were redefined as a countermeasure for resolving disputes in healthcare O2O services and the laws for changing the transaction environment. A change in institutional mechanisms was proposed. This study looked at the types of consumer disputes related to healthcare O2O services as insufficient information problems, problems in the course of medical service implementation, problems with immunity provisions for platform operators, cancellations, and non-compliance with refunds. All the information generated during transactions in the healthcare sector was extensive in scale and included the most sensitive information among personal information, stressing the importance of ensuring security. The area that started in the O2O range before the medical institution visit also proposed a plan to establish a system for the delivery of proven information as a pre-medical person. The scale and growth will grow faster, given that consumers can experience the information they want anytime, anywhere they want. However, the platform broker's role, a link player, will become more important because consumers who use the service will have their first meeting with non-face-to-face product providers. On the other hand, service providers may have side effects of misleading consumers by providing false information or misleading consumers through exaggerated advertisements. The O2O service market is expected to expand beyond distribution and dining out to the entire industry. However, since it is challenging to check accurate statistics on the detailed market, various disputes and consumer protection measures will be required for each detailed market, and comprehensive leading solutions will be essential in the future.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

The Effect of Alliance on Maritime Territorial Disputes: A Case of the Aegean Sea Dispute Between Greece and Türkiye (해양영토분쟁에서 동맹의 영향: 그리스와 튀르키예 에게해 분쟁 사례)

  • Hwang, Won-June
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.137-161
    • /
    • 2023
  • This paper explores the limited role of alliances in preventing maritime territorial disputes among member states, using the ongoing conflict between Greece and Türkiye, two NATO allies, as a case study. Drawing on Institutionalist theory, we seek to explain the mechanisms that have contributed to the failure of the alliance to prevent this dispute, despite constant cooperation and transparency. Unlike land disputes, maritime territorial disputes are complex and multi-layered, with fluid boundaries that can change with climate or natural resource availability. Moreover, the lack of constant surveillance creates ambiguity about territorial encroachment thresholds. These factors have exacerbated the dispute between Greece and Türkiye, drawing other NATO members into the conflict and undermining the strength of the alliance. This paper concludes by providing policy implications for the Republic of Korea in its own potential maritime disputes, and contributes to the broader literature on the role of alliances in preventing territorial disputes.

  • PDF

A Study on China's Intention to Switching to Shared Bike Platforms: Mechanisms of Trust and Distrust

  • Wenlong Lu;Yung Ho Suh;Sae Bom Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.179-187
    • /
    • 2023
  • Consumer trust plays a crucial role in the development of the sharing economy. This study primarily focuses on the factors influencing consumer trust and examines the case of ofo, a former leader in China's bike-sharing industry. This paper analyzes the decline in consumer trust in ofo, which can be attributed to internal management issues and the near-bankruptcy situation. The "difficulty in refunds" issue faced by ofo since December 2018 has been growing continuously, and this study explores the factors influencing trust and distrust in this context. By considering product factors (quality), platform factors (payment security, privacy protection, reputation), and social factors (social norms, government regulation) as independent variables, the study analyzes the factors affecting consumer trust. The analysis results revealed that as consumers' distrust towards shared bikes increases, their switching intention also increases. The company's reputation and social norms were found to influence both trust and distrust, while government regulation was found to influence trust. The research findings provide insights relevant to sharing economy platforms and offer guidance for future studies.

Integrating physics-based fragility for hierarchical spectral clustering for resilience assessment of power distribution systems under extreme winds

  • Jintao Zhang;Wei Zhang;William Hughes;Amvrossios C. Bagtzoglou
    • Wind and Structures
    • /
    • v.39 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • Widespread damages from extreme winds have attracted lots of attentions of the resilience assessment of power distribution systems. With many related environmental parameters as well as numerous power infrastructure components, such as poles and wires, the increased challenge of power asset management before, during and after extreme events have to be addressed to prevent possible cascading failures in the power distribution system. Many extreme winds from weather events, such as hurricanes, generate widespread damages in multiple areas such as the economy, social security, and infrastructure management. The livelihoods of residents in the impaired areas are devastated largely due to the paucity of vital utilities, such as electricity. To address the challenge of power grid asset management, power system clustering is needed to partition a complex power system into several stable clusters to prevent the cascading failure from happening. Traditionally, system clustering uses the Binary Decision Diagram (BDD) to derive the clustering result, which is time-consuming and inefficient. Meanwhile, the previous studies considering the weather hazards did not include any detailed weather-related meteorologic parameters which is not appropriate as the heterogeneity of the parameters could largely affect the system performance. Therefore, a fragility-based network hierarchical spectral clustering method is proposed. In the present paper, the fragility curve and surfaces for a power distribution subsystem are obtained first. The fragility of the subsystem under typical failure mechanisms is calculated as a function of wind speed and pole characteristic dimension (diameter or span length). Secondly, the proposed fragility-based hierarchical spectral clustering method (F-HSC) integrates the physics-based fragility analysis into Hierarchical Spectral Clustering (HSC) technique from graph theory to achieve the clustering result for the power distribution system under extreme weather events. From the results of vulnerability analysis, it could be seen that the system performance after clustering is better than before clustering. With the F-HSC method, the impact of the extreme weather events could be considered with topology to cluster different power distribution systems to prevent the system from experiencing power blackouts.

A Research Survey on the Characteristics of Burglaries: Focused on How to Utilize Private Security (침입절도 특성에 관한 조사연구: 민간경비 활용방안을 중심으로)

  • Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.15-35
    • /
    • 2010
  • A larceny means stealing others' properties, as one of crime types most closely connected with common people. Along with fraud, it is the mostly common property crime; in particular, the largest number of people are exposed to a burglary. This study aims to find the schemes to utilize private guards according to the characteristics of burglary. To do so, a questionnaire survey was conducted into an actual condition of official statistics of burglary and into the criminals of burglary, with a view to understanding the behavioral characteristics of burglary and suggesting defense mechanisms to prevent the crime. Burglary is not just a major crime to be dealt with by public guards like the police but also one to be handled increasingly more by private guards. It is why this study intends to identify how to utilize private guards in preventing the crime. Investigations were made into 208 burglars, who were inmates of 10 correctional institutions (prisons or detention houses) across the country. It is found that only about 24% of burglars committed the crime through rational choice, about 60.7% were feared of their arrest at the time of their crime, and a very high percentage (69.9%) of them were assured of their successful crime. Burglaries usually happened at night, mostly in a summer day when everybody goes away from home for vacation. Primarily, the crimes took place in a private house of urban residential quarters. What burglars considered mostly for target selection includes 'profitability,' followed by 'surveillance' and 'risk.' Most (42%) of them committed the crime for the first time ever. Generally, they were not inclined to commit the crime while under the influence of alcohol or drug, which might prevent them from making reasonable decisions. 73.9% of the criminals said that they committed the crime singly without any accomplices.

  • PDF