• Title/Summary/Keyword: The Private Security

Search Result 1,401, Processing Time 0.037 seconds

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

Authentication using AAA for the Mobility Support of Mobile IPv6 Nodes in VPN Environments (VPN 환경에서 Mobile IPv6 노드의 이동성 제공을 위한 AAA 기반의 인증)

  • Kim Mi-Young;Mun Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.218-230
    • /
    • 2006
  • The enterprise service network is composed of internet, intranet and DMZ. The design rationale of Mobile IP is providing of seamless mobility transparency without regarding to the type of network topology and services. However, Mobile IP specification does not include the mobility support in case of using VPN environment and define the access scenarios to get into the VPN intranet without disturbing existing security policy. In this paper, we propose an authentication method using AAA infrastructure and keying material exchange to enable an user in internet to be able to access the intranet through the VPN gateway. Finally, performance analysis for the proposed scheme is provided.

Field Survey on Construction and Utilization of Home Network - Focusing on Pangyo New Town - (홈네트워크 구축현황 및 이용실태 조사연구 - 판교신도시를 중심으로 -)

  • Yim, Mi-Sook
    • Journal of the Korean housing association
    • /
    • v.27 no.5
    • /
    • pp.25-35
    • /
    • 2016
  • he objective of this study was to investigate home network systems presently applied in multi-housing complexes and resident's usage to improve the utilization of these systems and services as well as maintenance methods. Subjects were 27 housing complexes equipped with home network systems in west Pangyo area. The investigation methods of communal network systems were observed and photographed. Unit systems were investigated through photography, interviews, and observation focusing on the utilization of Wall-Pads by visiting one unit of each housing complex. The results are as follows: (1) Most housing complexes that we investigated were built with high-grade IT infrastructure. Also, remote meter reading, electronic security, vehicle access, and building access systems were established. Wall-Pads with similar functions were installed in 23 housing complexes, excluding private rental housing complexes. (2) Even though people were well aware of the need for common systems within their housing complexes, only 10~20% of Wall-Pad menus were used. (3) Low utilization rates of home network stem from Wall-Pad menus which were user-unfriendly, and a lack of user training for the complex's common system and unit system. Therefore, to promote active use of home network systems, the systems must be diversified in accordance with user characteristics. In addition, the Wall-Pad menus should be reorganized to be user-friendly.

A Study on Keylogger Information Sniffing by Using Hooking Techniques (Hooking기술을 이용한 Keylogger 정보 Sniffing연구)

  • Park, In-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.119-122
    • /
    • 2012
  • Keylogger by using Hooking techniques will lead and the keyboard when inputting, private data it uses Sniffing techniques and it meat the fact that it is seized. This program the classified document where the password or the counterpart of specific program draw up or even E-mail contents or great disaster original contents confirmation it is possible it is a technique which is simple but at the slightest slip fatal one is in the use person. It considered the security book about hereupon and it studied and it made it was made to advance and with subject of character dissertation.

  • PDF

A Study on Risk and Safety measures of the Improved Explosive Device (사제폭발물의 위험성 및 안전대책에 관한 연구)

  • Han, Jae-Hoon;Choi, Min-Ki;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.193-202
    • /
    • 2014
  • Crimes with explosives is one of the mass-destructive crimes that involves the most victims. It is heavily punished under the Korean laws. Mid-eastern area is one of the leading places that are home to improvised explosive device attacks, in the form of religious or political terrorism because of its convenience of use, production and disguise. Improvised bombs are permeating into domestic crimes in Korea as their tools. Use of explosive substances are strictly restricted in this country, but it is not impossible to find its information online and to create private explosives with a bit of interest. And they are being traded in the grey market. For this reason, this thesis offers the method of an efficient safety control of explosive substances, which can be used as raw materials for improvised explosive devices, in order to protect citizens' lives and properties and to promote national security down the road.

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Analysis of Consulting Reports on Defect Disputes in Apartment Building

  • Seo, Deok-Seok;Park, Jun-Mo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.13 no.5
    • /
    • pp.498-505
    • /
    • 2013
  • The main processes involved in a defect dispute are consulting, reviewing, and finally judging as an arbiter. This process of defect consulting produces a defect consulting report, but business practices and standards of judgment will differ among consultants, and have many problems. This study reviews the structure of a defect consulting report and considers the structure's problem, which is that it is not standardized. To achieve this, data of sixteen defect consulting report were collected involving defect lawsuit cases before or after 2010. The structure and index of the defect consulting reports were then reviewed, and the results are as follows. As for a structure based on fourteen index, there are suitable that judge a outline, a cost estimate data and a consulting work item by a consulting standard. Furthermore, analysis by each common parts and private parts is considered as appropriate about consulting items and estimate by standard. However, consulting item in construction progress and responsibility period for security that related on a cause and a responsibility of defect need to complement. Meanwhile, the first thing of issues are connected a defect consulting is urgent a standardization for a defect type.

A Study on Economy of Agricultural Investment Business to the Ukraine (우크라이나 농업투자사업의 경제성에 관한 연구)

  • Yoon, Jun Sang;Lee, Eun-Kyu;Park, Young Soon;Kim, Sung Rok
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.117-142
    • /
    • 2014
  • This study aims to analyzing economy of agricultural investment to the Ukraine based on survey and analysis of environment of agricultural investment to the Ukraine. The Ukraine had been used as a grain belt for Russia for some 60 years among CIS nations so that agricultural environment is excellent and capital investment on agricultural field is on the rise every year. Accordingly, agricultural investment to the Ukraine should be approached not only in economy but also in the dimension of diversification of foreign agricultural investment area and food security. And it is necessary to seek measures for both government and private body to make inroads into the country together.

A Study of Hacking Attack Analysis for IP-PBX (IP-PBX에 대한 해킹 공격 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo;Yoon, Kyung-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.273-276
    • /
    • 2011
  • Voice over Internet Protocol(VoIP) compared to the traditional PSTN communications costs and because of the ease of use has been widespread use of VoIP. Broadband Convergence Network (BCN) as part of building with private Internet service provider since 2010, all government agencies are turning to the telephone network and VoIP. In this paper, we used the Internet on your phone in the IETF SIP-based IP-PBX is a hacking attack analysis studies. VoIP systems are built the same way as a test bed for IP-PBX hacking attacks and vulnerabilities by analyzing the results yielded. Proposes measures to improve security vulnerabilities to secure VoIP.

  • PDF

Blockchain Technology and Network Structure for Real-time Intelligence Transport System (실시간 지능형 교통 시스템에 적합한 블록체인 기술 및 네트워크 구조)

  • Kim, Moonseong;Na, Eunchan;Lee, Janghoon;Lee, Woochan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.17-26
    • /
    • 2018
  • Connected car plays an important role on Intelligent Transport System (ITS). ITS is able to secure drivers' convenience and safety, however, the overall system can be threatened by hacking attempt. Blockchain is one strong candidate of the remedy to promote the security of the ITS network. However, there will be many challenges to adopt previously proposed blockchain technologies to ITS. This work presents a new ITS structure based on blockchain technology. Proposed scheme includes three major layers. The first layer is central manager which is initiated once to register a certain connected car. The third layer is RSU (Road Side Unit) layer which exploits PoS (Proof of Stake) for consortium blockchains and retains real-time information. In addition, this layer performs block expiration based on timers to maintain manageable block length. In the second layer, the generated blocks of the third layer without expiration are housed as private blockchains. We finally demonstrate possible merits of newly proposed scheme.