• 제목/요약/키워드: Sense of security

검색결과 260건 처리시간 0.029초

A Resource-Optimal Key Pre-distribution Scheme for Secure Wireless Sensor Networks

  • Dai Tran Thanh;Hieu Cao Trong;Hong Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2006년도 춘계학술발표대회
    • /
    • pp.1113-1116
    • /
    • 2006
  • Security in wireless sensor networks is very pressing especially when sensor nodes are deployed in hostile environments. To obtain security purposes, it is essential to be able to encrypt and authenticate messages sent amongst sensor nodes. Keys for encryption and authentication must be agreed upon by communicating nodes. Due to resource limitations and other unique features, obtaining such key agreement in wireless sensor network is extremely complex. Many key agreement schemes used in general networks, such as trusted server, Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks [1], [2], [5], [7], [8]. In that situation, key pre-distribution scheme has been emerged and considered as the most appropriate scheme [2], [5], [7]. Based on that sense, we propose a new resource-optimal key pre-distribution scheme utilizing merits of the two existing key pre-distribution schemes [3], [4]. Our scheme exhibits the fascinating properties: substantial improvement in sensors' resource usage, rigorous guarantee of successfully deriving pairwise keys between any pair of nodes, greatly improved network resiliency against node capture attack. We also present a detailed analysis in terms of security and resource usage of the scheme.

  • PDF

An empirical study on the relationship of personal optimistic bias and information security awareness and behavior in the activity of information ethics (정보윤리 활동에서 개인의 낙관적 편견과 정보보안 인식 및 정보보안 행위와의 관련성에 관한 실증 연구)

  • Choi, Jong-Geun;Che, Myung-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제17권5호
    • /
    • pp.538-547
    • /
    • 2016
  • With respect to the factors affecting information security awareness and behavior, the study of the relevance of the concept of optimistic bias is actively used in psychology. In other words, this study examines whether the optimistic bias of individuals affects information security in the field. In this sense, this study attempted to demonstrate the relevance of optimistic bias in information security behavior and awareness. A questionnaire survey was conducted targeting 111 people engaged in domestic private enterprises. The survey results showed that this personalized optimistic bias exists because of empirical factors related to personal security. Optimistic bias affects the security awareness information. The greater the optimistic bias, the lower the awareness and recognition of information security. In other words, optimistic bias affects information security awareness. Reducing the effects of optimistic bias is expected to reduce information security incidents, such as information leakages. However, the variety of information related ethical activities of a company did not have any effect on the information security awareness. Most previous studies have only examined the effect optimistic bias in the field of health. Therefore, this study fills an important gap in research in IT.

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

A study on Activation Measures of Local Mobile Easy-to-use Payment (국내 모바일 간편결제 활성화 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • 제15권4호
    • /
    • pp.73-82
    • /
    • 2015
  • Thanks to popularization of smart phone, mobile payment market is growing rapidly. As the obligatory use of digital certificate is abolished, easy-to-use payment that can settle with only password is being launched one after another. But its spreading speed is not fast highly. Because of concern about personal information leakage and security, unchangeability of payment habit, insufficiency of consumer protection, inadequacy of payment infrastructure and all sorts of regulations, easy-to-use payment is not activated. Recently global IT companys are entering mobile payment market competitively. It is because the sense of crisis that their survival can be dangerous from now on if they get left behind Fintech innovation and the mentality that they try to take the leadership of mobile payment market process. In this situation, the thorough preparation and a lot of effort are required to promote our autonomous easy-to-use payment growth without dependance on foreign country's. In this paper, the problems of local mobile easy-to-use payment are addressed in depth and the activation measures such as flexible and discriminative security, construction of customer protection system, law system maintenance, service differentiation are proposed.

Research on Military SNS Protection Profile for National defense (국방정보보호를 위한 군(軍) SNS 보호프로파일(PP) 개발에 관한 연구)

  • Yu, DeokHoon;Kim, SeungJoo
    • Journal of Internet Computing and Services
    • /
    • 제14권1호
    • /
    • pp.41-52
    • /
    • 2013
  • Social Network Service(SNS) have become very popular during the past few years. Also SNS, an current communication platform, greatly contributes to transmit the information rapidly and strengthen a sense of community and fellowship in military service. however it has vulnerable factors. For example, invasion of privacy, exposure of personal information and military data. In this particular case, it is a deathblow to the military service. Military Social Network Service require to protect the military security threats and disclosure of defense secrets. For such reasons we need the secure SNS that protects from any attacks or vulnerable factors. We present classification of functional type and analysis the SNS architecture. The goal of this work is propose military SNS security functional requirements for practical use safely.

Design and Implementation of Container Security Device(CSD) based on IEEE standards 802.15.4b (IEEE 표준 802.15.4b 기반컨테이너 보안장치(CSD) 시스템 구현 및 검증)

  • Lee, Eun-Kyu;Shon, Jung-Rock;Choi, Sung-Pill;Moon, Young-Sik;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제15권7호
    • /
    • pp.1613-1620
    • /
    • 2011
  • CSD is IEEE Stan없rd 802.15.4b based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 2.4GHz 10 correspond actively to the radio regulations used by different countries. This. paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and Japan.

A Study on The Development of Container Security Device(CSD) based on Active RFID (능동형 RFID 기반 컨테이너 보안 장치(CSD)의 개발에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shin, Joong-Jo;Shon, Jung-Rock;Moon, Young-Sik;Lee, Eun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제35권2B호
    • /
    • pp.244-251
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the radio regulations used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.

A Study on Intensifying Efficiency of Presidential Security Service Organization through the Analysis of Press Media (언론매체 분석을 통한 대통령경호조직의 효율성 제고에 관한 연구)

  • Kim, Il Gon;Ahn, Young Kyu
    • Convergence Security Journal
    • /
    • 제14권1호
    • /
    • pp.23-32
    • /
    • 2014
  • Quantitative rise and This study carried out qualitative research by utilizing NVivo 10 focusing on the contents of mass media such as newspaper or internet on the presidential security service up to the Park Geun-hye government from the 3rd Republic of Korea, which was established the presidential security service. The aim is to present opinion so that the presidential security organization can strengthen capability and function within the governmental organization down the road based on the contents of categories, which were elicited through this. First, there is a need of solidifying the internal stability with the expansion in the activity sphere of organization and of externally approaching the public with removing sense of difference caused by offering personal protection only to some of the privileged class in the meantime. Second, it is the foundation of a reason related to crime in a cause for Discharge by Authority pertinent to "law on security for president and others" in Article 10 in order to prevent a criminal act of having abused the task characteristic and the position superiority or an external pressure act related to intervention in rights. Third, there is a need of making it recognized as very important organization with putting differentiation from other organizations of the government by providing the disciplinary level more strictly than "disciplinary order on public officials" based on particularity and importance dubbed presidential security service along with correspondingly applying "disciplinary order on public officials" in Article 31 in accordance with "enforcement ordinance of law on security for president and others" in terms of service negligence and false-information report in relation to task performance.

The Education of Henry Adams: The Theme of Aura and Tradition in the Context of Modernity

  • Kim, Hongki
    • Journal of English Language & Literature
    • /
    • 제55권6호
    • /
    • pp.961-973
    • /
    • 2009
  • Walter Benjamin expresses his concern that the new technologies of mechanical reproduction robs the artwork of its own uniqueness, its "aura." Benjamin uses the word "aura" to refer to the sense of awe or reverence one presumably experiences in the presence of works of art. This aura does not merely inhere in the works of art themselves, because Benjamin extends his notion of aura to the level of how he both understands and positions the modern subject in the world of uncertainty and transitoriness. The theoretical framework of Benjaminian aura becomes a crucial and efficient strategic apparatus to read The Education of Henry Adams. As for Benjamin the modern implies a sense of alienation, a historical discontinuity, and a decisive break with tradition, Adams observes that modern civilization has wiped out "tradition," a mythic home in which man can experience order and unity. Adams claims that the growth of science, reason, and multiplicity at the expense of religion, feeling, and unity has been accompanied by a parallel growth in individualism at the expense of community and tradition. To Adams the collapse of traditional values such as maternity, fecundity, and security in America is a waking nightmare of the moral dilemmas of a capitalist society, in which the cruel force of the modern Dynamo is becoming a prime governing principle.

A Study on the Eco-friendly Kitchen Detergent Container Design (조선조 경상의 다리형태를 적용한 친환경 주방세제 용기디자인 연구)

  • Kim, Chung Ho
    • Journal of the Korea Furniture Society
    • /
    • 제25권4호
    • /
    • pp.353-363
    • /
    • 2014
  • Design of the container was designed to be able to have a sense of security by emphasizing the points and easy to use sophisticated in order to match the image of the company in an environmentally friendly form of the whole. The design of the natural detergent container, because the container itself is to prevent related bar closely with water, a slip, with an emphasis on the form of fish swim, looks the handle of the oval for the harmony of the entire container I was used to the point. The image extraction in the ordinary, you can design by applying the curve of streamlined feet of thin in order to emphasize the image of honest companies, oval fuselage top, easily without slipping and harmony of the image of the entire container in view of the functional aspects can grab to, which is designed to enter the interior. The design of the natural environment detergent container industry, it was incorporated as much as possible to the vessel and corporate image and sense of stability and the proportion of the overall shape, the basic concepts, the form on the productivity and functionality in the field of design, through the change and simplicity, with an emphasis on merchantability.

  • PDF