• Title/Summary/Keyword: Vulnerability analysis

Search Result 1,274, Processing Time 0.029 seconds

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Dehydration Risk from Age, BMI, and Disease Exposure (연령, BMI, 질병노출로 인한 탈수 위험)

  • Kim, Sun-Hee;Chun, Sung-Soo;Choi, Myung-Sup;Yun, Mi-Eun
    • Korean Public Health Research
    • /
    • v.44 no.4
    • /
    • pp.35-49
    • /
    • 2018
  • Objective : The purpose of this study was to investigate the risk factors of dehydration from the subjects who underwent anthropometric and blood parameters testing during a comprehensive health screening. Methods : For the study analysis, 5,391 samples with valid data of the levels of Sodium($Na^+$), BUN (Blood Urea Nitrogen) and FBS(Fasting Blood Sugar) were selected to calculate a dehydration indicator of plasma osmolality. The study data was collected from the health screening examinees who visited Sahmyook Medical Center Seoul Adventist Hospital Comprehensive Health Check-up Center from 2014.01.01 to 2015.12.31. The relationship between dehydration and age group, BMI, disease exposures(hypertension, diabetes mellitus, dyslipidemia, kidney disorder) were analyzed by gender. Results : The odds ratio of dehydration showed statistical significance from age ${\geq}50$ in both male and female, respectively. The female obese group was vulnerable to dehydration while the male study group showed no statistical significance in the BMI difference. The disease exposed groups(hypertension, diabetes mellitus, dyslipidemia, kidney disorder) were vulnerable to dehydration. Also, the more types of disease carried by the exposed patients, the higher odds ratio and susceptibility to dehydration. Conclusions : Aging, increasing BMI, and exposed to diseases were found to be the risk factors for vulnerability to dehydration. To prevent dehydration, special caution to be taken for those in the ${\geq}50s$ group, along with controlling BMI and chronic diseases. Further studies are suggested to investigate the risk factors of dehydration that may affect increasing plasma osmolality as a potential stimulus mechanism in disease outbreaks.

Elicitation of drought alternatives based on Water Policy Council and the role of Shared Vision Model (협의체 기반 가뭄 대응 대안 도출과 비전공유모형의 역할)

  • Kim, Gi Joo;Seo, Seung Beom;Kim, Young-Oh
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.6
    • /
    • pp.429-440
    • /
    • 2019
  • The numbers of multi-year droughts due to climate change are increasing worldwide. Boryeong Dam, located in Chungcheongnam-do, South Korea, was also affected by a 4-year drought from 2014 to 2017. Since traditional unilateral decision making processes to alleviate drought damage have, until now, resulted in conflicts between many of the involved groups, the need for active participation from both stakeholders and policymakers is greater than before. This study introduced Shared Vision Planning, a collaborative decision making process that involves participation from various groups of stakeholders, by organizing Water Policy Council for Climate Change Adaptation in Chungcheongnam-do. A Shared Vision Planning Model was then developed with a system dynamics software by working together with relevant stakeholders to actively reflect their requests through three council meetings. Multiple simulations that included various future climate change scenarios were conducted, and future drought vulnerability analysis results of Boryeong Dam and districts, in terms of frequency, length, and magnitude, were arrived at. It was concluded that Boryeong Dam was more vulnerable to future droughts than the eight districts. While the total water deficit in the eight districts was not so significant, their water deficit in terms of spatial discordance was proved to be more problematic. In the future, possible alternatives to the model will be implemented so that stakeholders can use it to agree on a policy for possible conflict resolutions.

An experimental investigation of flow characteristics in the tangential and the multi-stage spiral inlets (접선식 및 다단식 나선 유입구 흐름 특성의 실험적 연구)

  • Seong, Hoje;Rhee, Dong Sop;Park, Inhwan
    • Journal of Korea Water Resources Association
    • /
    • v.52 no.3
    • /
    • pp.227-234
    • /
    • 2019
  • The vulnerability of urban disasters is increased with the rapid urbanization and industrialization, and the extreme rainfall event is increased due to the global climate change. Urban inundation is also increased due to the extreme rainfall event beyond the capacity limit of facility for the damage prevention. The underground detention vault and the underground drain tunnel are rapidly being utilized to prevent urban inundation. Therefore, the hydraulic review and design analysis of the inlet of the underground facility are important. In this study, the water level of the approach flow according to the inflow discharge is measured and the flow characteristic of the inlet (tangential and spiral) is analyzed. For the spiral inlet, the multi-stage is introduced at the bottom of the inlet to improve the inducing vortex flow at low discharge conditions. In case of the tangential inlet, the discharging efficiency is decreased rapidly with hydraulic jump in the high flow discharge. The rising ratio of the water level in the multi-stage spiral inlet is higher than the tangential inlet, but the stable discharging efficiency is maintained at low and high discharge conditions. And the empirical formula of water level-flow discharge is derived in order to utilize inlets used in this study.

A System for Measuring the Similarity and Redundancy of R&D Project (R&D 과제의 유사도 및 중복도 측정 시스템에 관한 연구)

  • Choi, Kook-Hyun;Kang, Yong-Suk;Kim, Jong-Hee;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.329-331
    • /
    • 2014
  • The analysis of the similarities and redundancies among R&D projects is important for the efficient investment of government budgets. When government R&D projects are planned, the redundancies of research tasks are examined by institutions specializing in research management, relevant offices and departments, and the government to prevent redundant funding. However, as existing similarity analyses depend on methods wherein new task proposals and existing R&D project proposals are compared and looked up based on keywords. This results in vulnerability wherein similarity cannot be accurately measured in the event of partial modifications of the task name or technical substitutions. This study aims to use patent information as characteristics by which R&D project documents can be identified. The patent data used is based on materials officially published by the government's R&D patent trend survey project (http://ipas.rndip.re.kr). The study aims to propose a method by which patent information can be used to analyze the similarity and redundancy among R&D projects when new projects are entered. For this purpose, a similarity measurement model based on set theory and probability theory is presented. The presented measurement model is implemented into an actual system to identify redundant documents, and calculate and show their similarity.

  • PDF

A Study on Backup PNT Service for Korean Maritime Using NDGNSS (NDGNSS 인프라를 활용한 국내 해상 백업 PNT 서비스 연구)

  • Han, Young-Hoon;Lee, Sang-Heon;Park, Sul-Gee;Fang, Tae-Hyun;Park, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.43 no.1
    • /
    • pp.42-48
    • /
    • 2019
  • The significance of PNT information in the fourth industrial revolution is viewed differently in relation to the past. Autonomous vehicles, autonomous vessels, smart grids, and national infrastructure require sustainable and reliable services in addition to their high precision service. Satellite navigation system, which is the most representative system for providing PNT information, receive signals from satellites outside the earth so signal reception power is low and signal structures for civilian use are open to the public. Therefore, it is vulnerable to intentional and unintentional interference or hacking. Satellite navigation systems, which can easily acquire high performance of PNT information at low cost, require alternatives due to its vulnerability to the hacking. This paper proposed R-Mode (Ranging Mode) technology that utilizes currently operated navigation and communication infrastructure in terms of Signals of OPportunity (SoOP). For this, the Nationwide Differential Global Navigation Satellite System (NDGNSS), which currently gives a service of Medium Frequency (MF) navigation signal broadcasting, was used to validate the feasibility of a backup infrastructure in domestic maritime areas through simulation analysis.

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Effect of Maximum Aggregate, Porosity, and Temperature on Crack Resistance and Moisture Susceptibility of Porous Asphalt Mixtures (최대입경, 공극률, 온도가 다공성 아스팔트 혼합물의 균열저항성 및 수분민감성에 미치는 영향)

  • Yoo, In-Kyoon;Lee, Su-Hyung;Park, Ki-Soo;Yoon, Kang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.611-619
    • /
    • 2021
  • Porous asphalt pavement (PAP) has many functions, such as reducing accidents and decreasing noise. On the other hand, vulnerability is inevitable because PAP contains approximately 20% porosity. This study evaluated the effects of the maximum aggregate size (MAS), temperature, and porosity on the PAP durability. The indirect tensile strength measures durability. This study tested the samples that stayed dry and were moisturized by freezing and thawing for mixtures having the same porosity of 20% and MAS of 13mm, 10mm, and 8mm. The same test was performed on a mixture of 20% and 22% voids made of the same material with a MAS of 10mm. As a result, for 20% porosity, significant differences in the changes in MAS and temperature were found. A clear difference was observed between 8mm and 13mm under dry conditions, but there were no other significant differences in the MAS change. Furthermore, there was a clear difference in temperature for the change in porosity and temperature, but the gap in 2% porosity at 20% did not show a clear difference. Therefore, it is necessary to develop a more durable PAP through quantitative evaluations of the factors affecting the PAP durability.

Investigating Drivers of Housing Vacancy in Old Town Incheon using Multi-level Analysis (다층모형을 활용한 인천광역시 원도심 빈집 발생의 영향요인 분석)

  • Lee, Da-Ye
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.237-254
    • /
    • 2020
  • Housing vacancies have become a major issue in urban areas, there have been many efforts to address this issue at the national and local levels. The purpose of this paper is to investigate the factors contributing to housing vacancies in old town Incheon in South Korea. In particular, the research focuses on examining the effects of multiple levels of factors on housing vacancies in a comprehensive way; the three levels of factors were identified with a literature review including housing (Level 1), Neighborhood (Level 2), and Region (Level 3). A multi-level logistic regression model was used to examine the relationship between 13 factors in three spatial levels and housing vacancies. As a result, the factors in all three levels were able to explain housing vacancies including site area and shape, proximity to major roads (Level 1), ratio of houses in designated urban renewal area and slope (Level 2), and ratio of the elderly living alone, land price, changes in land price and ratio of new houses (Level 3). These results show that the combination of the physical inferiority of the housing site and the neighborhood environment and the economic and social vulnerability of the region is likely to increases the number of vacant houses. This study also suggested that a multi-dimensional policy strategy is needed to solve the problem of housing vacancies, and urban policies, such as supplying new housing or urban renewal area designation, should be carefully implemented in a way not to create housing vacancies.

Security Analysis of KS X 4600-1 / ISO IEC 12139-1 (원격 검첨용 PLC 기술(KS X 4600-1 / ISO IEC 12139-1) 보안성 분석)

  • Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.65-75
    • /
    • 2011
  • Power Line Communication (PLC) is a system for carrying data on a conductor used for electric power transmission. Recently, PLC has received much attention due to connection efficiency and possibility of extension. It can be used for not only alternative communication, in which communication line is not sufficient, but also for communication between home appliances. Korea Electronic Power Cooperation (KEPCO) is constructing the system, which automatically collects values of power consumption of every household. Due to the randomness and complicated physical characteristics of PLC protocol (KS X4600-1), it has been believed that the current PLC is secure in the sense that it is hard that an attacker guesses or modifies the value of power consumption. However, we show that the randomness of the protocol is closely related to state of the communication line and thus anyone can easily guess the randomness by checking the state of the communication line. In order to analyze the security of PLC, we study the protocol in detail and show some vulnerability. In addition, we suggest that PLC needs more secure protocol on higher layers. We expect that the study of PLC help in designing more secure protocol as well.