• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.03 seconds

Robust Acknowledgement Transmission for Long Range Internet of Things (장거리 사물 인터넷 기기를 위한 간섭에 강인한 ACK 기술)

  • Lee, Il-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.47-52
    • /
    • 2018
  • Wi-Fi enabled Internet of Things (IoTs) had a substantial impact on society, economy and industry. However wireless connectivity technologies in unlicensed band such as Wi-Fi are vulnerable to interferences. They also face difficulty providing wireless connectivity over long range in dense networks due to the dynamically changed interference effect and asymmetric interference conditions. In this paper, robust acknowledgement transmission scheme is proposed for long range IoTs. According to the proposed scheme, it is possible to control the transmission rate of the transmission success rate of the response frame by adjusting the transmission rate of the response frame when the interference is present asymmetrically. It is also possible to use higher data rate when high quality link is guaranteed. The evaluation results demonstrated the proposed scheme improves the aggregate throughput by at most 9 Mbps when 20 MHz bandwidth transmission mode was adopted.

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

A Study on 2D/3D Map Navigation System Based on Virtual Reality (VR 기반 2D/3D Map Navigation 시스템에 관한 연구)

  • Kwon Oh-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.928-933
    • /
    • 2006
  • This paper aims to build a 2D/3D map navigation that the user can efficiently operate in terms of feeding attribute information after securing 2D/3D space data. This system provides 2D/3D screen navigation that supports variety of operational visual effects and displays the location that the user is retrieving. Also it presents picture information of buildings with higher resolution and URL, name of store, phone number, other related information. Effectiveness of this system is as follows: first, development and distribution of a new technology of 2D/3D spatial database that changes the previous 2D/3D based system concept to the 2D/3D based one. Second, increase of developmental productivity by utilizing the integrated 2D/3D spatial database for developing various interfaces. Finally, it provides security of the preemptive technological position with world class domestic 2D/3D spatial database technologies.

Technical analysis of Cloud storage for Cloud Computing (클라우드 컴퓨팅을 위한 클라우드 스토리지 기술 분석)

  • Park, Jeong-Su;Jung, Sung-Jae;Bae, Yu-Mi;Kyung, Ji-Hun;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.757-760
    • /
    • 2012
  • Cloud storage system that cloud computing providers provides large amounts of data storage and processing of cloud computing is a key component. Large vendors (such as Facebook, YouTube, Google) in the mass sending of data through the network quickly and easily share photos, videos, documents, etc. from heterogeneous devices, such as tablets, smartphones, and the data that is stored in the cloud storage using was approached. At time, growth and development of the globally data, the cloud storage business model emerging is getting. Analysis new network storage cloud storage services concepts and technologies, including data manipulation, storage virtualization, data replication and duplication, security, cloud computing core.

  • PDF

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

Design of Web-based Parallel Computing Environment Using Aglet (Aglet을 이용한 웹 기반 병렬컴퓨팅 환경설계)

  • 김윤호
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.2
    • /
    • pp.209-216
    • /
    • 2002
  • World Wide Web has potential possibility of infrastructure for parallel computing environment connecting massive computing resources, not just platform to provide and share information via browser. The approach of Web-based parallel computing has many advantages of the ease of accessibility, scalability, cost-effectiveness, and utilization of existing networks. Applet has the possibility of decomposing the independent/parallel task, moving over network, and executing in computers connected in Web, but it lacks in the flexibility due to strict security semantic model. Therefore, in this paper, Web-based parallel computing environment using mobile agent, Aglet (Agile applet) was designed and possible implementation technologies and architecture were analyzed. And simple simulation and analysis was done compared with applet-based approach.

  • PDF

Information and Communication Management Systems (ICMS) in India -Connecting the Resource Poor Farmers to Knowledge and Institutions

  • Mudda, Suresh K;Ravikumar, NK;Giddi, Chitti B
    • Agribusiness and Information Management
    • /
    • v.8 no.1
    • /
    • pp.1-10
    • /
    • 2016
  • Information and communication technologies (ICTs) have always mattered in agriculture too. In day-to-day practices of agriculture and allied sectors, the farmers often share their information. Changing weather patterns, soil conditions, pests and diseases always throw challenges to small and marginal farmers. So, the farmer needs up-dated information to cope with and even benefit from these changes. In the developing countries like India, where agriculture still plays a crucial role (over 58% of the rural households depend on agriculture as their livelihood) and the rising population from 1027 million to 1419 million during 2001-16 (a total rise of 38 percent or 1.3 percent per year) pose a lot of pressure on land and other resources to meet the food security needs on one hand and to meet the challenges of globalization on the other. Understanding and addressing these challenges are very crucial, in which ICT can play a major role. With the booming mobile, wireless, and Internet industries, ICT has found a foothold even in poor marginal and smallholder farms and in their activities. The survey conducted among the 120 farmers in Srikakulam district in India revealed that, ICT has revolutionized the agriculture in the modern days. Production and marketing information is accessed by 91% of the sample farmers through mobile in 2015, where it was only 5% in 2005. The extent of use of mobile phones by the farmers varied with the decision to be taken by them like Harvesting, packing, and storing (94%), Selling Decision (91%), Seed purchase (89%), Application of fertilizers and pesticides (88%) and Land preparation and planting (84%), other package of practices (77%). The farmers further opined that, 'Voice' was the dominating source of communication (96%) compared to Short Message Service (SMS) (only 27%) and Internet access (10%), as majority are illiterate. The use of camera (71%), Bluetooth (33%), Radio (61%) TV (41%) are the other means of sharing the information. In this context of importance of ICTs in Indian agriculture, greater attention justifies about the applications of ICT's to alleviate poverty and promote economic growth of the farming population.

A Border Line-Based Pruning Scheme for Shortest Path Computations

  • Park, Jin-Kyu;Moon, Dae-Jin;Hwang, Een-Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.939-955
    • /
    • 2010
  • With the progress of IT and mobile positioning technologies, various types of location-based services (LBS) have been proposed and implemented. Finding a shortest path between two nodes is one of the most fundamental tasks in many LBS related applications. So far, there have been many research efforts on the shortest path finding problem. For instance, $A^*$ algorithm estimates neighboring nodes using a heuristic function and selects minimum cost node as the closest one to the destination. Pruning method, which is known to outperform the A* algorithm, improves its routing performance by avoiding unnecessary exploration in the search space. For pruning, shortest paths for all node pairs in a map need to be pre-computed, from which a shortest path container is generated for each edge. The container for an edge consists of all the destination nodes whose shortest path passes through the edge and possibly some unnecessary nodes. These containers are used during routing to prune unnecessary node visits. However, this method shows poor performance as the number of unnecessary nodes included in the container increases. In this paper, we focus on this problem and propose a new border line-based pruning scheme for path routing which can reduce the number of unnecessary node visits significantly. Through extensive experiments on randomly-generated, various complexity of maps, we empirically find out optimal number of border lines for clipping containers and compare its performance with other methods.