• 제목/요약/키워드: Security network management

Search Result 1,366, Processing Time 0.033 seconds

Digital Signature Mechanism by Mobile Agent Security model of JAVA base (JAVA 기반의 이동 에이전트 보안 모델에 의한 전자서명 메카니즘)

  • Choi, Kil-Hwan;Shin, Min-Hwa;Lee, Dae-Young;Bae, Sang-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2177-2180
    • /
    • 2003
  • 현재 이동 에이전트 및 이의 전송과 실행을 위한 이동 에이전트 시스템의 구현에 Java가 많이 사용되고 있지만 Java의 기본적인 보안 모델은 이동 로드의 기능 확장성에 제한을 주는 문제점이 있다. 본 논문에서는 전자서명을 Java 기반의 이동 에이전트에 적용함으로써 시스템의 보안을 유지하면서 이동 에이전트의 기능 확장성을 보장할 수 있음을 보였다. 또한 이동 에이전트의 전자서명과 이의 망 관리로의 적응을 위해서는 망 관리국(NMS:Network Management Station)에서의 서명자 관리나 공개키 관리 등 전자서명과 관련된 기능 외에 망 관리 이동 에이전트의 등록과 전송, 실행 및 실행 관리를 위한 구성이 필요하다. 따라서 이를 위해 작성한 망 관리국과 관리 대상 시스템의 구성 모델을 보였으며, 제안한 구성방식의 동작을 검증하기 위해 망 관리 응용 예를 작성하고 평가하였다. 제안한 구성 방식을 사용하면 전자서명 처리로 인한 속도 저하의 문제가 있지만, 이동 에이전트의 사용으로 인해 얻어지는 부하 분산과 실시간 관리, 망 확장성 증대의 장점 이외에도 관리 기능 및 서비스 추가가 용이한 장점이 있다.

  • PDF

Analysis of Propensity for Conflict Resolution According to the Types of SNS Users, Usages and Conflicts (SNS 사용자 유형 및 이용방식과 갈등유형에 따른 갈등해결 성향 분석)

  • Lee, Eun Ju;Park, Dae-Ha
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.149-159
    • /
    • 2015
  • This paper proposes a making study model using Ajzen's Theory of planned behavior (TPB) and established hypothesis and then analysed propensity of conflict resolution according to the types of SNS users, usages and conflicts. The results of study, active users of SNS have propensity of resolution for their own conflicts through SNS. The users having conflicts between person and person are same with active users. The results of this study could be referenced to other researches for resolving conflicts in or between people in the future.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Web-based Automated Network Service Security Vulnerability Analysts & Management System (웹 기반의 자동화된 네트워크 서비스 보안 취약성 분석 및 관리 시스템)

  • Lim, Mun-Hee;Yang, Jin-Suck;Kim, Hyun-Ku;Chang, Beom-Hwan;Chung, Tai-Myung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.853-856
    • /
    • 2002
  • 인터넷이라는 거대한 네트워크에 연결되어 있는 시스템의 보안 상태를 주기적으로 점검하여 외부로부터의 공격에 취약한 부분을 보완하여 주는 일은 공격에 대한 방어를 위하여 가장 기본적인 일이다. 그러나 수많은 호스트가 상호 연결된 네트워크 관리 시스템에서 관리자가 각 시스템의 보안상 취약점을 전부 인지하고 이에 대한 보완을 수행하는 것은 상당히 어려운 일이다. 따라서 관리자의 수작업에 의한 취약점 분석 작업보다는 자동화된 관리 도구에 의한 취약점 분석이 효율적이다. 이에 본 논문에서는 네트워크 서비스인 HTTP, SMTP의 취약점을 원격에서 분석하는 시스템을 설계 및 구현하였다. WAVAMS는 에이전트와 독립된 mobile 코드의 이동에 의한 동적 분석 모듈의 추가로 가장 최근의 취약점을 신속하게 분석 할 수 있으며 확장성이 높다. 또한 웹 기반으로 설계되어 관리자가 용이하게 관리할 수 있다.

  • PDF

Scrambling Technology in MPEG Video Environment (MPEG비디오 부호화기 내의 scrambling 기술)

  • Kwon, Goo-Rak;Youn, Joo-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1279-1284
    • /
    • 2009
  • With the advance of multimedia technology, multimedia sharing among multiple devices has become the main issue. This allows users to expect the peer-to-peer distribution of unprotected and protected contents over public network. Inevitably, this situation has caused an incredible piracy activity and Web sites have begun to provide copyrighted A/V data for free. In order to, protect the contents from illegal attacks and distribution, digital right management (DRM) is required. In this paper, we present the minimal cost scrambling scheme for securing the copyrighted multimedia using the data encryption standard (DES) encryption technique. Experimental results indicate that the proposed scrambling techniques achieve a very good compromise between several desirable properties such as speed, security, and file size.

The Design of Remote Monitoring and Warning System for Dangerous Chemicals Based on CPS

  • Kan, Zhe;Wang, Xiaolei
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.632-644
    • /
    • 2019
  • The remote monitoring and warning system for dangerous chemicals is designed with the concept of the Cyber-Physical System (CPS) in this paper. The real-time perception, dynamic control, and information service of major hazards chemicals are realized in this CPS system. The CPS system architecture, the physical layer and the applacation layer, are designed in this paper. The terminal node is mainly composed of the field collectors which complete the data acquisition of sensors and video in the physical layers, and the use of application layer makes CPS system safer and more reliable to monitor the hazardous chemicals. The cloud application layer completes the risk identification and the prediction of the major hazard sources. The early intelligent warning of the major dangerous chemicals is realized and the security risk images are given in the cloud application layer. With the CPS technology, the remote network of hazardous chemicals has been completed, and a major hazard monitoring and accident warning online system is formed. Through the experiment of the terminal node, it can be proved that the terminal node can complete the mass data collection and classify. With this experiment it can be obtained the CPS system is safe and effective. In order to verify feasible, the multi-risk warning based on CPS is simulated, and results show that the system solves the problem of hazardous chemicals enterprises safety management.

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Improved Trilateration Method on USN for reducing the Error of a Moving Node Position Measurement (무선센서네트워크에서 삼변측량법 기반 이동노드 위치 오차를 줄이는 탐색기법)

  • Mun, Hyung-Jin;Jeong, Hee-Young;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.301-307
    • /
    • 2016
  • The location measurement technique of moving worker in dangerous areas, is necessary for safety in the mines, basements, warehouses, etc. There are various measurement techniques about moving node of position in a restricted environment. Trigonometric Method, one of measurement techniques, is commonly used because of its easiness. However, errors occur frequently when measuring distance and position due to radio interference and physical disability with measuring instruments. This paper proposed a method which is more accurate and shows reduced margin of error than existing trigonometric method by recalculating distance between Anchor and moving node with various measuring instruments. By adding Anchor when calculating distance and position of moving node's estimated point, suggested technique obtains at least 41% efficiency compared to existing method.

A Study on Distributed Gateway for The Bio-signal Management in U-Healthcare (유 헬스케어에서 생체신호관리를 위한 분산형 게이트웨이에 관한 연구)

  • Lee, Seok-Hee;Woo, Sung-Hee;Ryu, Geun-Taek
    • 전자공학회논문지 IE
    • /
    • v.49 no.2
    • /
    • pp.58-64
    • /
    • 2012
  • In this paper, we proposed a distributed gateway for ubiquitous healthcare system. We also designed and implemented protocol conversion and processing algorithms to exchange a seamless information, the bio signals between the databases and the receiving devices from ZigBee to gateway and from the gateway to database and network. The distributed gateway system consists of the bio signal acquisition, ZigBee modules, distributed databases, and gateways. The bio signals detected by the ZigBee module are sent to the gateway. The distributed gateway analyzes the data being transferred, sends those to the receiving devices, and lets the authorized personnel access. The proposed system can be utilized in various fields including activity analysis for the elderly, security systems, home network service, and so on.