• Title/Summary/Keyword: Security network management

Search Result 1,366, Processing Time 0.029 seconds

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.

An Empirical Research on the IoT Basis Gas AMI Platform and Smart Metering Services (IoT 기반 가스 원격검침(AMI) 플랫폼과 서비스의 실증 연구)

  • Lee, Seungwoo;Lee, Sangshin;Song, Min-hwan;Kwon, Youngmin
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.3
    • /
    • pp.1-10
    • /
    • 2020
  • This paper describes the development of a smart advanced metering infrastructure(AMI) architecture and services for using smart metering in gas industry. A general gas AMI system is composed of a smart gas meter, IoT network, the AMI platform, and an operation management system with security functions. The proposed gas AMI platform supports two-way communication between smart metering devices and AMI services and is applied by oneM2M standard to support interoperability between various types of metering devices and heterogeneous IoT networks. To demonstrating AMI system with the proposed platform, we installed about 2,900 smart gas meters in real environments and operated AMI systems for one year. We verified that about 94% of gas meters are normally worked and AMI services are stably operated without error or malfunction.

Research on BYOD (Bring Your Own Device) policy guidelines with the extension of the "SMART Education" in Korea based on the analyses of the U.S. cases (스마트교육 확산에 따른 국내 BYOD 정책방안 연구 - 미국사례 분석을 중심으로 -)

  • Lim, Keol;Jang, Yoonho;Lee, Eunhwan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.21-36
    • /
    • 2014
  • The purposes of the study was to investigate BYOD (Bring Your Own Device) policy since it would be limited to distribute all of the digital devices required for the schools within the budget of the government. First, the concept and characteristics of BYOD were introduced. Then, the pros and cons of BYOD were analyzed according to the case studies of BYOD policies of the U.S. Based on the previous experiences, guidelines of domestic BYOD policies were established. Regarding the institutional aspect, technical issues, usage, damages, digital divide, information security, and resources were discussed. Additionally, conditions of technology, networks, filtering, software were also considered as essential infrastructure. In sum, as an alternative of distributing digital devices in schools, the importance of BYOD should be regarded as top priorities with systematic preparations in launching digital education. It would be expected that this study play a fundamental role in launching domestic BYOD policy by supporting specific strategies.

Evolving Internet Information & Technology as Enablers for Creating Shared Values

  • Song, In Kuk;Chun, Junchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.309-317
    • /
    • 2015
  • Recently many companies began to realize their visions for the sustainable growth with the advent of CSV(Creating Shared Values). Michael E. Porter, a Harvard Professor, claims that placing social value creation at the core of business strategy has the potential to uncover big opportunities for individual companies and that shared value can play a significant role in increasing competitive advantages while fostering social prosperity. In consequence, the various researches have illustrated how to get the opportunity for competitive advantages from building a social value proposition into corporate strategy, and considerable studies have been promoted heavily from the managerial perspective. However, due to the lack of capability converging information technology with business strategy, any research effort to identify technological or Internet-related issues and to link the issues to CSV does not exist. With Korean being a Internet leading country, the demands of researches analyzing core technology, information, and service utilizing Internet are rapidly growing. The study aims to find out Internet-related enablers for CSV. This paper describes the concepts and features of CSV, identifies emerging Internet-related issues toward the opportunity for competitive advantage, and then depicts the rigorous research endeavors in the areas of Internet information, technology, and services. As a result, 11 papers presented and selected as the outstanding papers at APIC-IST 2014 handle the issues to be brought together, which include: Wireless and Sensor Network, Image Processing and HCI, Big Data and Business Intelligence, Security & Privacy in Internet, SNS & Communication, Smart-Learning and e-Learning, and Internet Business Strategy. The study finally recommends indispensible terms for substantially vitalizing CSV.

Mutual Authentication Protocol based on the Effective Divided Session for the Secure Transmission of Medical Information in u-Health (유헬스에서 안전한 생체정보전송을 위한 동적인 유효세션기반의 상호인증 프로토콜)

  • Lee, Byung-Mun;Lim, Heon-Cheol;Kang, Un-Ku
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.142-151
    • /
    • 2011
  • All medical information over sensor networks need to transmit and process securely in the u-Health services. The reliability of transmission between u-Health medical sensor devices and gateway is very important issue. When the user moves to other place with u-Health devices, its signal strength is going down and is far from the coverage of gateway. In this case, Malicious user can be carried out an intrusion under the situation. And also rogue gateway can be tried to steal medical information. Therefore, it needs mutual authentication between sensor devices and gateway. In this paper, we design a mutual authentication protocol which divided sessions from an authenticated session are updated periodically. And in order to reduce the traffic overhead for session authentication, we also introduce dynamic session management according to sampling rate of medical sensor type. In order to verify this, we implemented the programs for the test-bed, and got an overall success from three types of experiment.

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

Analysis of Key Factors in Operational Control Transition Resolution using Analytic Hierarchy Process (AHP) (계층적 분석방법(AHP)을 적용한 전시작전통제권 전환의 주요 결정요인 분석)

  • Park, Sang-Jung;Koh, Chan
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.153-163
    • /
    • 2011
  • This study analyzes the military and political factors that influenced the Participatory Government's resolution in Wartime Operational Control (OPCON) Transition. The research on key factors in OPCON transition firstly implemented literature research and then increased feasibility through additional use of AHP. The analysis results showed that there was a negative effect for Korean Peninsular Defense in the 'ROK-US Alliance Asymmetry' area, a positive effect to increase ROK-led Capability of Theater Operation in the 'ROK and U.S. Alliance Interdependence' area and a positive effect for Invocation of ROK Self-Defense Power in the 'Interests of Participatory Government's Liberal Regime' area respectively. After applying AHP, "ROK exercise of Self-defense" in the 'Interests of Participatory Government's Liberal Regime' area received the highest assessment, while the "Increasement of North Korea's Threat" in the 'ROK-US Alliance Asymmetry' area received the lowest assessment. This study is meaningful in that it analyzed the key military and political factors in the Participatory Government's resolution of Wartime OPCON Transition using AHP.

Efficiency Analysis of Government Budget to HRD Program in the field of Information Technology : IT Research Center Case (정보통신분야 HRD사업에 대한 정부예산 지원의 효율성 분석 : 대학의 IT연구센터를 중심으로)

  • Lee, Jung-Mann;Cheon, Won-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.55-62
    • /
    • 2012
  • This paper analyze the DEA(Data Envelopment Analysis) efficiency of government budget to HRD program(ITRC) and correlation and regression between its inputs and outputs in the field of information technology. First, empirical results show that the relationship between the supporting period of government budget and scientific research & HRD outputs is respectively irrelevant. Second, another finding is that the relationship between government budget and HRD output is positive. Finally, DEA efficiency analysis implicates that SW/digital contents, digital TV, information security, intelligence robot, next generation PC, next generation mobile telecommunication, home network, mathematics, IT SoC are more efficient than any other technology fields.

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.