• Title/Summary/Keyword: blockchain networks

Search Result 64, Processing Time 0.024 seconds

Design and Implementation of Blockchain Network Based on Domain Name System (블록체인 네트워크 기반의 도메인 네임 시스템 설계 및 구현)

  • Heo, Jae-Wook;Kim, Jeong-Ho;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.36-46
    • /
    • 2019
  • The number of hosts connected to the Internet has increased dramatically, introducing the Domain Name System(DNS) in 1984. DNS is now an important key point for all users of the Internet by allowing them to use a convenient character address without memorizing a series of numbers of complex IP address. However, relative to the importance of DNS, there still exist many problems such as the authorization allocation issue, the disputes over public registration, security vulnerability such as DNS cache poisoning, DNS spoofing, man-in-the-middle attack, DNS amplification attack, and the need for many domain names in the age of hyper-connected networks. In this paper, to effectively improve these problems of existing DNS, we proposed a method of implementing DNS using distributed ledger technology, blockchain, and implemented using a Ethereum-based platform. In addition, the qualitative analysis performance comparative evaluation of the existing domain name registration and domain name server was conducted, and conducted security assessments on the proposed system to improve security problem of existing DNS. In conclusion, it was shown that DNS services could be provided high security and high efficiently using blockchain.

Joint resource optimization for nonorthogonal multiple access-enhanced scalable video coding multicast in unmanned aerial vehicle-assisted radio-access networks

  • Ziyuan Tong;Hang Shen;Ning Shi;Tianjing Wang;Guangwei Bai
    • ETRI Journal
    • /
    • v.45 no.5
    • /
    • pp.874-886
    • /
    • 2023
  • A joint resource-optimization scheme is investigated for nonorthogonal multiple access (NOMA)-enhanced scalable video coding (SVC) multicast in unmanned aerial vehicle (UAV)-assisted radio-access networks (RANs). This scheme allows a ground base station and UAVs to simultaneously multicast successive video layers in SVC with successive interference cancellation in NOMA. A video quality-maximization problem is formulated as a mixed-integer nonlinear programming problem to determine the UAV deployment and association, RAN spectrum allocation for multicast groups, and UAV transmit power. The optimization problem is decoupled into the UAV deployment-association, spectrum-partition, and UAV transmit-power-control subproblems. A heuristic strategy is designed to determine the UAV deployment and association patterns. An upgraded knapsack algorithm is developed to solve spectrum partition, followed by fast UAV power fine-tuning to further boost the performance. The simulation results confirm that the proposed scheme improves the average peak signal-to-noise ratio, aggregate videoreception rate, and spectrum utilization over various baselines.

Advanced in Algorithms, Security, and Systems for ICT Convergence

  • Park, Ji Su;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.523-529
    • /
    • 2020
  • Future information and communication technology (ICT) is constantly evolving and converging in diverse fields depending on the wireless environment, and the trend is being further developed to increase the speed of wireless networks. Future ICT is needed in many areas such as active senior & solo-economy, hyper-connected society, intelligent machine, industrial boundary collapse, secured self, and the sharing economy. However, a lot of research is needed to solve problems such as machine learning, security, prediction, unmanned technology, etc. Therefore, this paper describes some technologies developed in the areas of blockchain, fault diagnosis, security, agricultural ICT, cloud, life safety and care, and climate monitoring in order to provide insights into the future paradigm.

Trends in Blockchain-based Privacy Preserving Technology for Artificial Neural Networks (인공신경망에서의 블록체인 기반 개인정보보호 기술 동향)

  • Kang, Yea-Jun;Kim, Hyun-Ji;Lim, Se-Jin;Kim, Won-Woong;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.564-567
    • /
    • 2022
  • 최근 딥러닝이 다양한 분야에서 활용됨에 따라 중앙 집중식 서버, 적대적 공격 그리고 데이터 부족 및 독점화와 같은 다양한 문제점이 발생하고 있다. 또한 연합학습을 수행할 경우, 클라이언트가 잘못된 기울기를 서버에 제공하거나 서버가 악의적인 행동을 할 경우 심각한 문제로 이어질 수 있다. 이와 같은 보안 취약점을 해결하기 위해 딥러닝에 블록체인을 결합하여 중앙 집중식 서버를 분산화하고 각 참여자 노드에게 인센티브를 줌으로써 신뢰할 수 있는 데이터를 수집하는 기법이 연구되고 있다. 본 논문에서는 위와 같이 딥러닝의 문제점을 해결하기 위해 블록체인이 어떻게 적용되었는지 살펴본다.

A Study on the API Gateway for human resources management modules extensions in ERP

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.79-88
    • /
    • 2021
  • In this paper, we propose a API Gateway technique for the expansion of human resource management module, one of the ERP functions. The institution has introduced ERP (Enterprise Resource Planning) based on its efforts to transform all human and physical resources into business competitiveness and its response to the digital knowledge informatization environment, and listed it as multiple success factors. Human resource management is one of the factors that have been dealt with. However, ERP's Human Resources Management Module remains in the role of functional personnel management. How to utilize human resources begins with navigating and recognizing human resources. The proposed API Gateway technique leverages blockchain networks to design and implement APIs for human resource sharing and navigation, including the possibility of extending ERP's human resource management module. Secondly, it was designed and implemented using a smart contract that behaves like an API for preventing information forgery. The proposed method will not only be used as a tool that can actively utilize human resources, but will also be a complete resource for utilizing big data technology.

Ethereum Phishing Scam Detection based on Graph Embedding and Semi-Supervised Learning (그래프 임베딩 및 준지도 기반의 이더리움 피싱 스캠 탐지)

  • Yoo-Young Cheong;Gyoung-Tae Kim;Dong-Hyuk Im
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.165-170
    • /
    • 2023
  • With the recent rise of blockchain technology, cryptocurrency platforms using it are increasing, and currency transactions are being actively conducted. However, crimes that abuse the characteristics of cryptocurrency are also increasing, which is a problem. In particular, phishing scams account for more than a majority of Ethereum cybercrime and are considered a major security threat. Therefore, effective phishing scams detection methods are urgently needed. However, it is difficult to provide sufficient data for supervised learning due to the problem of data imbalance caused by the lack of phishing addresses labeled in the Ethereum participating account address. To address this, this paper proposes a phishing scams detection method that uses both Trans2vec, an effective graph embedding techique considering Ethereum transaction networks, and semi-supervised learning model Tri-training to make the most of not only labeled data but also unlabeled data.

A Study on Light Weight Authentication Method of Distributed Cluster-based IoT Devices (분산 클러스터 기반 IoT 디바이스 경량 인증 방법에 대한 연구)

  • Kim, Sung-hwan;Kim, Young-gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.103-109
    • /
    • 2019
  • Due to the development of ICT technology, the IoT environment for connecting objects in the vicinity to networks and utilizing information about objects in various fields is getting attention, and security threats are also increasing. In order to solve the increasing security problem in IoT environment, we are studying methods that use certificate, encryption, hash calculation and block chain in the private sector. However, the security authentication method which overcomes the performance gap between devices and has compatibility with various devices It has not been proposed yet. In this paper, we propose an authentication method that can achieve wide compatibility by minimizing the influence of IoT device environment.

Accounting Education in the Era of Information and Technology : Suggestions for Adopting IT Related Curriculum (기술정보화(IT) 시대의 회계 교육 : IT교과와의 융합교육의 제안)

  • Yoon, Sora
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.91-109
    • /
    • 2021
  • Recently, social and economic environment has been rapidly changed. In particular, the development of IT technology accelerated the introduction of databases, communication networks, information processing and analyzing systems, making the use of such information and communication technology an essential factor for corporate management innovation. This change also affected the accounting areas. The purpose of this study is to document changes in accounting areas due to the adoption of IT technologies in the era of technology and information, to define the required accounting professions in this era, and to present the efficient educational methodologies for training such accounting experts. An accounting expert suitable for the era of technology and information means an accounting profession not only with basic accounting knowledge, competence, independency, reliability, communication skills, and flexible interpersonal skills, but also with IT skills, data utilization and analysis skills, the understanding big data and artificial intelligence, and blockchain-based accounting information systems. In order to educate future accounting experts, the accounting curriculum should be reorganized to strengthen the IT capabilities, and it should provide a wide variety of learning opportunities. It is also important to provide a practical level of education through industry and academic cooperation. Distance learning, web-based learning, discussion-type classes, TBL, PBL, and flipped-learnings will be suitable for accounting education methodologies to foster future accounting experts. This study is meaningful because it can motivate to consider accounting educational system and curriculum to enhance IT capabilities.

Relations between Reputation and Social Media Marketing Communication in Cryptocurrency Markets: Visual Analytics using Tableau

  • Park, Sejung;Park, Han Woo
    • International Journal of Contents
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 2021
  • Visual analytics is an emerging research field that combines the strength of electronic data processing and human intuition-based social background knowledge. This study demonstrates useful visual analytics with Tableau in conjunction with semantic network analysis using examples of sentiment flow and strategic communication strategies via Twitter in a blockchain domain. We comparatively investigated the sentiment flow over time and language usage patterns between companies with a good reputation and firms with a poor reputation. In addition, this study explored the relations between reputation and marketing communication strategies. We found that cryptocurrency firms more actively produced information when there was an increased public demand and increased transactions and when the coins' prices were high. Emotional language strategies on social media did not affect cryptocurrencies' reputations. The pattern in semantic representations of keywords was similar between companies with a good reputation and firms with a poor reputation. However, the reputable firms communicated on a wide range of topics and used more culturally focused strategies, and took more advantages of social media marketing by expanding their outreach to other social media networks. The visual big data analytics provides insights into business intelligence that helps informed policies.

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.