• Title/Summary/Keyword: Vulnerability Information Management

Search Result 304, Processing Time 0.024 seconds

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

A Feasibility Study on the Infrastructure Project of PCB Industrial Technology (PCB 산업기술 기반구축 사업의 타당성 분석 연구)

  • Kim, Dae Ho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.4
    • /
    • pp.57-66
    • /
    • 2013
  • Domestic PCB industry formed by orders of demand companies is extremely vulnerable in its innovation infrastructure including high value-added technology development and information exchange. The majority of PCB products produced in the country relies on the imports from abroad and it causes its vulnerability to external market changes. Due to the negative perceptions about the industry (e.g., 3D job), low treatment (especially SMEs) and expertise employment avoidance in PCB industry, the job market conditions of PCB industry is not so good. In these circumstances, the PCB industry is completely dependent on the demand market such as cellular phones, and tablet PC, and as a result the responsiveness of PCB industry to the changes in demand market is also vulnerable. In this PCB industry, Korean government is trying to build the research infrastructure for PCB industry that realizes the sharing of information among companiesthrough the operation of the PCB industry innovation forum (information innovation), builds SME suppot platform and supports quality improvement (technology innovation), and supports enterprise collaboration processes (material-process-equipment) utilizing PCM open laboratory. The PCB industry technology infratstructure project is going to be promoted by the government(1.3 billion won, each year) and the private investmen(434 million won each year) from 2013 to 2017(5 years project)(table 1). This study analyzes the feasibility of the project, by using the AHP analysis and the results shows that this project is considered feasible because the AHP overall score is evaluated as 0.841, the overall score is greater than or equal to 0.55.

  • PDF

Discussion on Formulation Process and Configuration of Fire-Fighting Vulnerable Zone Model (소방취약지 모델의 구성과 정립프로세스 논의)

  • Kim, Seong Gon;Chang, Eun Mi;Choi, Gap Yong;Kim, Hi Tae
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.71-77
    • /
    • 2014
  • There are numbers of unpredictable risk factors in the disaster scenes such as fire, explosion and fail to early life-saving or holding the flames which can lead to massive damage. In particular, fire-fighters who arrive on the scene within 5 minutes after dispatching, have a limitation to get aware to the situation of scene fully, because of immediate deploy to disaster scene with limited information. This situation may lead to disturbance that fire-fighters perform effective fire-fighting activities, to put fire-fighter's life at risk by misjudge the situation. Previous domestic and International studies focused vulnerability for spatial area or features which can damage to life and property in the event of anticipated. In this study, we have been developed fire-fighting vulnerable zone model that can analyze comprehensively hindrance factors for fire-fighting activities targeting whole life cycle of fire-fighting activities from dispatch to fire suppression or life-saving. In addition, we have been given shape to finality and applicability for our model by defining the new concept of fire-fighting vulnerable zone which can be distinguished from the concept of fire vulnerable area in previous studies. The results of this study can be used to analysis fire-fighting vulnerable zone type analysis, establish fire-fighting policies and improve the performance of decision-making process.

Susceptibility Mapping of Umyeonsan Using Logistic Regression (LR) Model and Post-validation through Field Investigation (로지스틱 회귀 모델을 이용한 우면산 산사태 취약성도 제작 및 현장조사를 통한 사후검증)

  • Lee, Sunmin;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.6_2
    • /
    • pp.1047-1060
    • /
    • 2017
  • In recent years, global warming has been continuing and abnormal weather phenomena are occurring frequently. Especially in the 21st century, the intensity and frequency of hydrological disasters are increasing due to the regional trend of water. Since the damage caused by disasters in urban areas is likely to be extreme, it is necessary to prepare a landslide susceptibility maps to predict and prepare the future damage. Therefore, in this study, we analyzed the landslide vulnerability using the logistic model and assessed the management plan after the landslide through the field survey. The landslide area was extracted from aerial photographs and interpretation of the field survey data at the time of the landslides by local government. Landslide-related factors were extracted topographical maps generated from aerial photographs and forest map. Logistic regression (LR) model has been used to identify areas where landslides are likely to occur in geographic information systems (GIS). A landslide susceptibility map was constructed by applying a LR model to a spatial database constructed through a total of 13 factors affecting landslides. The validation accuracy of 77.79% was derived by using the receiver operating characteristic (ROC) curve for the logistic model. In addition, a field investigation was performed to validate how landslides were managed after the landslide. The results of this study can provide a scientific basis for urban governments for policy recommendations on urban landslide management.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on the Analysis and Evaluation of Vulnerability Index for the Management of Nonpoint source in SoOak River Watershed (소옥천 유역 비점오염 관리를 위한 취약성 지수분석 및 평가에 관한 연구)

  • KAL, Byung-Seok;MUN, Hyun-Saing;HONG, Seon-Hwa;PARK, Chun-Dong;GIL, Han-nui;PARK, Jae-Beom
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.107-120
    • /
    • 2019
  • In this study, the characteristics of watershed and pollution source were investigated in SoOakcheon located in the upper stream of Daecheong Lake. The Dimension Index method was applied to index various watershed and pollution source data. The influence factors of each pollutant source were derived through correlation analysis between selected index and water quality monitoring data. BOD and COD were significantly influenced by population density and land area ratio, T-N by CN and rice area ratio, and T-P by population density and land area ratio, respectively. The discharge load is often used to establish non-point source countermeasures, but there is a difference between the water load and the water load in the lake or river. Therefore, in order to manage non-point pollution efficiently, it is necessary to analyze influential factors with high correlation with water quality and to manage the relevant factors with priority.

A Study and Analysis on Case Study of Security Evaluation Tool (보안성 평가 도구 사례 분석 연구)

  • Kim, Hyun-il;Park, Kyungyun;Seo, Changho;Moon, Daesung
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.347-356
    • /
    • 2019
  • Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.