• Title/Summary/Keyword: Security-channel

Search Result 611, Processing Time 0.028 seconds

Interoperability Strategy Performance Evaluation of the Event Service of CORBA (CORBA 이벤트 서비스의 연동 방법 및 성능 평가)

  • Na, Gil-Seong;Lee, Sang-Ho
    • Journal of KIISE:Databases
    • /
    • v.27 no.1
    • /
    • pp.33-41
    • /
    • 2000
  • Since simple and convenient user interface, the Web is diffused widely. For integrating Web as a view of user interface and CORBA, CORBA object is made in applet, which is sent to Web browser in Client and executes by Web browser. To use CORBA Event Service in Web without violating a security constrains of applet, we need a interoperability of Event Service. This paper investigates interoperability of event channels of the event service of CORBA. We present three different methods that make one event channel. Pros and cons of each method are described. All mentioned approaches have been implemented in Java. An experimental performance evaluation has been carried out and evaluation results are also given.

  • PDF

Performance Improvement of DCF through Transmission Control (전송제어를 통한 DCF의 성능 향상)

  • Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1811-1813
    • /
    • 2016
  • DCF (Distributed Coordination Function) resolves the channel contention problem in a distributed manner by forcing nodes to randomly choose a waiting time in a contention window. However, since the size of a contention is limited, the collision probability increases with the number of sending nodes. To resolve the problem, in this paper, we propose a transmission control method based on the minority game (MG). Each node can determine autonomously whether to send or not without message exchanges with other nodes to maximize its profit. Through simulation studies, we verify that the proposed method can improves the performance of DCF in terms of collision probability in a congestion situation.

A Study on the DDoS Defense Algorithm using CFC based on Attack Pattern Analysis of TCP/IP Layers (TCP/IP Layer별 공격패턴 분석에 기반한 CFC를 이용한 DDoS 방어 알고리즘 연구)

  • Seo, Woo Seok;Park, Dea Woo;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.117-130
    • /
    • 2010
  • Paper is on defense for so-called internet crisis, the attack of DDoS (Distributed Denial of Service) which was targeted to the central government ministries, financial sector, and portal sites of chief counties including Korea on June 7th, 2009 as its start. By conducting attack with various DDoS attacking methods in the lab environment and dividing networks targeted by the attack by layers, this paper records and analyzes the chief information for attack, destination information of packets, defense policy setting, and the flow of packet attack with the subjects of the networks separated. This study suggests CFC system using multiple firewalls applying defense policy corresponding to the target layer for ultimate attack and tests it according to the result of analyzing the attack packet information and its amount, log analysis, access recording port, and MAC and IT information, etc. by layers. This article is meaningful in that it analyzes the attack by layers, establishes firewall policy for protecting each layer, and secures accurate mechanism for detect and defense.

Hydroacoustic Survey of Fish Distribution and Aggregation Characteristics in the Yongdam Reservoir, Korea (수중음향기법을 이용한 용담호의 어류 분포특성 연구)

  • Lee, Hyungbeen;Lee, Kyounghoon;Kim, Seonghun;Kim, In-Ok;Kang, Donhyug
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.47 no.6
    • /
    • pp.1055-1062
    • /
    • 2014
  • Hydroacoustic surveys were conducted for spatio-temporal distribution and size estimation of fish in the Yongdam reservoir, Korea, from April to July 2014. Acoustic data were collected along acoustic transects using a 120 kHz scientific echosounder. The received acoustic data were the in situ acoustic target strength (dB) and nautical area scattering coefficient ($m^2/mile^2$). Data on fish behavioral patterns and size were collected using a DIDSON acoustic camera at stationary stations. Fish were mainly distributed in the center channel and close to the outer Yongdam reservoir. Acoustic density of fish in the summer season were higher than in the spring season. The seasonal vertical distribution pattern of fish aggregations may be strongly related to the vertical temperature structure. The size distribution of fish obtained from an acoustic camera correlated well with the acoustic size of fish from an echosounder.

Implementation of Secure VoIP System based on H.235 (H.235 기반 VoIP 보안 시스템 구현)

  • 임범진;홍기훈;정수환;유현경;김도영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1238-1244
    • /
    • 2002
  • In this paper, H.235-based security mechanism for H.323 multimedia applications was implemented. H.235 covers authentication using HMAC, Diffie-Hellman key exchange, session key management for voice channel, and encryption functions such as DES, 3DES, RC2. Extra encryption algorithms such as SEED, and AES were also included for possible use in the future. And, we also analyzed the quality of service (QoS), the requirement of implementation, and interoperability to the result in this study. The results could be applied to secure simple IP phone terminals, gateways, or gatekeepers.

TT&C security algorithm of satellite based on CBC-MAC (CBC-MAC 기반의 위성 관제 신호 보호 알고리즘)

  • 곽원숙;조정훈;홍진근;박종욱;김성조;윤장홍;이상학;황찬식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6B
    • /
    • pp.616-624
    • /
    • 2002
  • In satellite communication, which use the satellite, the protection of TT&C channel which controls the position, performance, and operation is required. In this thesis, we analyzed the weakness of authentication algorithm which is used for protection of TT&C generation and operation. Also, we proposed the authentication algorithm which complements key recovery attack structurely without increasing additional computational amount and verified its performance. The proposed authentication algorithm can satisfy Rivest's recommendation by increasing the computational complexity from $2^{55}$ operations to $2^{111}$ operations. In addition, it can be applied to the existing satellite system because the length of TT&C data and message authentication codes used for the input of authentication algorithm are unchanged.

The Relationship between Work Values and Entrepreneurial Attitudes: Implications for the Distribution Industry

  • Wang, Haikun;Moon, Jaeseung
    • Journal of Distribution Science
    • /
    • v.17 no.3
    • /
    • pp.57-67
    • /
    • 2019
  • Purpose - This study aims to examine the impact of work values on entrepreneurial attitudes, and test the moderating effect of entrepreneurial opportunity identification on the above mentioned relationship as well. Research design, data, and methodology - A questionnaire survey was conducted to 258 employees who comes from 8 different types of the enterprises in northwestern of China, and the corresponding research model was verified. Results - The results show that "comfort and security" (one dimension of work values) has a significant negative impact on entrepreneurial attitudes. Another two dimensions of work values, such as "competence and growth" and "status and independence" have a significant positive impact on entrepreneurial attitudes. In addition, entrepreneurial opportunity identification has a significant moderating effect on the relations between work values and entrepreneurial attitudes. Specifically, only the entrepreneurship opportunity identification positively moderates the relationship between status & independence and entrepreneurial attitudes. Conclusions - This research further enriches the relevant theories of organizational behavior and entrepreneurships. This study also has guiding significance and value for management practice, especially for this research results implies, that is, individual's ability to entrepreneurial opportunity identification (e.g., identify feasible distribution channel for potential new venture) is important in entrepreneurship.

A Study on Framework Development of Weather Information Services on New-Media (뉴-미디어 기상정보 서비스 프레임워크 개발 연구)

  • Kim, Jin-Tae;Yun, Yong-In;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.201-208
    • /
    • 2011
  • The aim of this paper is to develop a framework of weather information services which is for processing contents and providing proper contents to new-media such as outdoor electronic display, DID (digital information display), and terrestrial multi-channel broadcasting, etc. By introducing the analysis of media use and perception science of human intelligence, the contents producing method to improve recognizing rate for weather information is provide and the layered framework of weather information services for new-media is designed. It integrates many different services to the framework. It can prevent duplicate investment for services and serve a major momentum to technical progress.

On Recovering Erased RSA Private Key Bits

  • Baek, Yoo-Jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.11-25
    • /
    • 2018
  • While being believed that decrypting any RSA ciphertext is as hard as factorizing the RSA modulus, it was also shown that, if additional information is available, breaking the RSA cryptosystem may be much easier than factoring. For example, Coppersmith showed that, given the 1/2 fraction of the least or the most significant bits of one of two RSA primes, one can factorize the RSA modulus very efficiently, using the lattice-based technique. More recently, introducing the so called cold boot attack, Halderman et al. showed that one can recover cryptographic keys from a decayed DRAM image. And, following up this result, Heninger and Shacham presented a polynomial-time attack which, given 0.27-fraction of the RSA private key of the form (p, q, d, $d_p$, $d_q$), can recover the whole key, provided that the given bits are uniformly distributed. And, based on the work of Heninger and Shacham, this paper presents a different approach for recovering RSA private key bits from decayed key information, under the assumption that some random portion of the private key bits is known. More precisely, we present the algorithm of recovering RSA private key bits from erased key material and elaborate the formula of describing the number of partially-recovered RSA private key candidates in terms of the given erasure rate. Then, the result is justified by some extensive experiments.

Efficient Post-Processing for Quantum Communication Systems (양자 통신 시스템의 효율적 후처리 방식)

  • Lee, Sun Yui;Jung, Kuk Hyun;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • Quantum cryptography is one of the most feasible fields using quantum mechanics. Therefore, quantum cryptography has consistently been researched, and a variety of cryptographic exchange method has been developed, such as BB84, etc. This paper explains a basic concept of quantum communications and quantum key distribution systems using quantum mechanics. Also, it introduces a reason of the development of quantum cryptography and attack scenarios which threaten the security of QKD. Finally, the experiment of this paper simulates quantum key attack by estimating qubit phases through a modeled quantum channel, and discusses needs of post-processing methods for overcoming eavesdropping.