• Title/Summary/Keyword: global networks

Search Result 881, Processing Time 0.029 seconds

Analyses of Security Consideration and Vulnerability based on Internet of Things (사물인터넷 기반의 시스템을 위한 보안 취약성 및 고려사항 분석)

  • Jang, Chang-hwan;Jo, Sung-ho;Lee, Jin-hyup;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.491-494
    • /
    • 2017
  • Recently, IoT has been supported by ICT technology with a variety of ICT powers. In May 2014, Information and Communication Strategy Committee announced the 'Basic plan for Internet of Things'. Also on Febuary 24 this SAME year, KISA(Korea Internet&Security Agency) provides many projects related to IoT, such as announcement of 'K-Global Project' for start-up and venture support related to IoT and ICT companies. In contrast to the various services of Internet of Things, when a connection is made between object-to-object or person-to-object wired and wireless networks, security threats have occurred in the process of communication. We analyzed these kinds of security threats related to Internet of things, and gave a consideration for requirement.

  • PDF

A Global-Local Approach for Estimating the Internet's Threat Level

  • Kollias, Spyridon;Vlachos, Vasileios;Papanikolaou, Alexandros;Chatzimisios, Periklis;Ilioudis, Christos;Metaxiotis, Kostas
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.407-414
    • /
    • 2014
  • The Internet is a highly distributed and complex system consisting of billion devices and has become the field of various kinds of conflicts during the last two decades. As a matter of fact, various actors utilise the Internet for illicit purposes, such as for performing distributed denial of service attacks (DDoS) and for spreading various types of aggressive malware. Despite the fact that numerous services provide information regarding the threat level of the Internet, they are mostly based on information acquired by their sensors or on offline statistical sampling of various security applications (antivirus software, intrusion detection systems, etc.). This paper introduces proactive threat observatory system (PROTOS), an open-source early warning system that does not require a commercial license and is capable of estimating the threat level across the Internet. The proposed system utilises both a global and a local approach, and is thus able to determine whether a specific host is under an imminent threat, as well as to provide an estimation of the malicious activity across the Internet. Apart from these obvious advantages, PROTOS supports a large-scale installation and can be extended even further to improve the effectiveness by incorporating prediction and forecasting techniques.

Performance Analysis of Cost-Effective Handoff Scheme in PMIPv6 Networks with DNS Supporting (PMIPv6 네트워크에서 DNS기반의 비용효과적인 핸드오프 기법의 성능분석)

  • Kim, Jae-Hoon;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.131-140
    • /
    • 2011
  • Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme based on Domain Name System (DNS) for PMIPv6. In this proposed scheme, DNS as a location manager provides PMIPv6 for global mobility. In addition, a paging extension scheme is introduced to PMIPv6 in order to support large numbers of mobile terminals and enhance network scalability. To evaluate the proposed location management scheme, we establish an analytical model, formulate the location update and the paging cost, and analyse the influence of the different factors on the total signalling cost. The performance results show how the total signal cost changes under various parameters.

A Study on Simultaneous Adjustment of GNSS Baseline Vectors and Terrestrial Measurements

  • Nguyen, Dinh Huy;Lee, Hungkyu;Yun, Seonghyeon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.5
    • /
    • pp.415-423
    • /
    • 2020
  • GNSS (Global Navigation Satellite System) is mostly used for high-precise surveys due to its accuracy and efficiency. But this technique does not always fulfill the demanding accuracy in harsh operational environments such as urban canyon and forest. One of the remedies for overcoming this barrier is to compose a heterogeneous surveying network by adopting terrestrial measurements (i.e., distances and angles). Hence, this study dealt with the adjustment of heterogeneous surveying networks consisted of GNSS baseline vectors, distances, horizontal and vertical angles with a view to enhancing their accuracy and so as to derive an appropriate scheme of the measurement combination. Reviewing some technical issues of the network adjustments, the simulation, and experimental studies have been carried out, showing that the inclusion of the terrestrial measurements in the GNSS standalone overall increased the accuracy of the adjusted coordinates. Especially, if the distances, the horizontal angles, or both of them were simultaneously adjusted with GNSS baselines, the accuracy of the GNSS horizontal component was improved. Comparing the inclusion of the horizontal angles with those of the distances, the former has been more influential on accuracy than the latter even though the same number of measurements were employed in the network. On the other hand, results of the GNSS network adjustment together with the vertical angles demonstrated the enhancement of the vertical accuracy. As conclusion, this paper proposes a simultaneous adjustment of GNSS baselines and the terrestrial measurements for an effective scheme that overcomes the limitation of GNSS control surveys.

A Machine-to-machine based Intelligent Walking Assistance System for Visually Impaired Person (시각장애인을 위한 M2M 기반의 지능형 보행보조시스템)

  • Kang, Chang-Soon;Jo, Hwa-Seop;Kim, Byung-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.287-296
    • /
    • 2011
  • The white stick mainly used for visually impaired person has difficulty in providing location information and effective countermeasures for emergency situations encountered during walking as well as detecting floating obstacles on the ground. In this paper, we propose a machine-to-machine based intelligent walking assistance system for safe and convenient walking of the visually impaired. The proposed system consists of a walking assistance stick used by the visually impaired and a server supporting multiple stick users in remote places through mobile communication networks. The stick equipped with ultrasonic sensors, GPS(global positioning system) receiver and vibrator not only detects floating obstacles, but also offers stick users with present location identification utilizing a text-to-voice conversion technology. Besides providing geographic information, the server notifies the emergency locations of users to guardian and aid agency, and it provides log information during walking such as the place, time and the number of accidents. Test results with a developed prototype system have shown that the system properly performs the functions and satisfies overall system performance.

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots

  • Nurmaini, Siti;Zarkasi, Ahmad
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.370-388
    • /
    • 2015
  • The localization of multi-agents, such as people, animals, or robots, is a requirement to accomplish several tasks. Especially in the case of multi-robotic applications, localization is the process for determining the positions of robots and targets in an unknown environment. Many sensors like GPS, lasers, and cameras are utilized in the localization process. However, these sensors produce a large amount of computational resources to process complex algorithms, because the process requires environmental mapping. Currently, combination multi-robots or swarm robots and sensor networks, as mobile sensor nodes have been widely available in indoor and outdoor environments. They allow for a type of efficient global localization that demands a relatively low amount of computational resources and for the independence of specific environmental features. However, the inherent instability in the wireless signal does not allow for it to be directly used for very accurate position estimations and making difficulty associated with conducting the localization processes of swarm robotics system. Furthermore, these swarm systems are usually highly decentralized, which makes it hard to synthesize and access global maps, it can be decrease its flexibility. In this paper, a simple pyramid RAM-based Neural Network architecture is proposed to improve the localization process of mobile sensor nodes in indoor environments. Our approach uses the capabilities of learning and generalization to reduce the effect of incorrect information and increases the accuracy of the agent's position. The results show that by using simple pyramid RAM-base Neural Network approach, produces low computational resources, a fast response for processing every changing in environmental situation and mobile sensor nodes have the ability to finish several tasks especially in localization processes in real time.

Global Positioning System and Strengthening of Geodetic Network of Nepal

  • Adhikary, Krishna Raj;Mahara, Shree Prakash
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.955-958
    • /
    • 2003
  • Nepal is a country of mountains The higher order geodetic points were mostly established on the top of mountains and these points were used for the geodetic network extension. Lower order geodetic control networks were established at different times and used for the surveying and mapping activities of the country.. It has been found that the rate of convergence between north and south borders of Nepal to be 21${\pm}$2 mm each year and the rate translation of Kathmandu to 55${\pm}$3 mm/year to the plates. The most intense deformation in Nepal occurs along the belt of high mountains along its northern border res ulting in a strain contraction rate normal to the Himalayan Arc. This belt is approximately 40 km wide and extends into southern Tibet.( 13). Recently Survey Department of Nepal has lunched a program of strengthening the existing geodetic network of Nepal and re-observed the position of higher order geodetic points by using geodetic GPS receivers to evaluate their position and thus to define the precision of the control points once again. This paper describes the observation procedure and the adjustment results of the existing higher order control network of Nepal established in different time using different types of equipment and techniques; and highlights the observation procedure and the result obtained after the post processing of the GPS observation results. Attempt has been made to give the procedure and identify the methodology for the re observation of existing higher order geodetic points by using GPS receiver and post processing the observed data so that the existing higher order geodetic points are within the given accuracy standard.

  • PDF

Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART (ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구)

  • Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1063-1075
    • /
    • 2019
  • In recent years, industrial automation has been established and WISN (Wireless Industrial Sensor Network) has been introduced for efficient system management. By introducing WISN, many engineering costs have been reduced and process processors have been optimized. And communication flow using wireless is increasing. An empirical study on industrial wireless sensor networks is actively conducted, but there are few security studies on them and they are exposed to such threats. If there is a problem with the standard of the wireless communication protocol itself, the device that is certified according to the standard may also be subject to security threats including problems. We analyze security functions and threats of ISA 100.11a and WirelessHART protocol stack based on standards. Procedures for distributing the security key are not provided or it is vulnerable using the Global Data Link key when the device enters the network. This paper presents the problems of the standard itself and presents the security requirements accordingly.

Reverting Gene Expression Pattern of Cancer into Normal-Like Using Cycle-Consistent Adversarial Network

  • Lee, Chan-hee;Ahn, TaeJin
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.275-283
    • /
    • 2018
  • Cancer show distinct pattern of gene expression when it is compared to normal. This difference results malignant characteristic of cancer. Many cancer drugs are targeting this difference so that it can selectively kill cancer cells. One of the recent demand for personalized treating cancer is retrieving normal tissue from a patient so that the gene expression difference between cancer and normal be assessed. However, in most clinical situation it is hard to retrieve normal tissue from a patient. This is because biopsy of normal tissues may cause damage to the organ function or a risk of infection or side effect what a patient to take. Thus, there is a challenge to estimate normal cell's gene expression where cancers are originated from without taking additional biopsy. In this paper, we propose in-silico based prediction of normal cell's gene expression from gene expression data of a tumor sample. We call this challenge as reverting the cancer into normal. We divided this challenge into two parts. The first part is making a generator that is able to fool a pretrained discriminator. Pretrained discriminator is from the training of public data (9,601 cancers, 7,240 normals) which shows 0.997 of accuracy to discriminate if a given gene expression pattern is cancer or normal. Deceiving this pretrained discriminator means our method is capable of generating very normal-like gene expression data. The second part of the challenge is to address whether generated normal is similar to true reverse form of the input cancer data. We used, cycle-consistent adversarial networks to approach our challenges, since this network is capable of translating one domain to the other while maintaining original domain's feature and at the same time adding the new domain's feature. We evaluated that, if we put cancer data into a cycle-consistent adversarial network, it could retain most of the information from the input (cancer) and at the same time change the data into normal. We also evaluated if this generated gene expression of normal tissue would be the biological reverse form of the gene expression of cancer used as an input.

A Residual Ionospheric Error Model for Single Frequency GNSS Users in the Korean Region (한국지역에서의 단일주파수 GNSS 사용자를 위한 전리층 잔류 오차 모델 개발)

  • Yoon, Moonseok;Ahn, Jongsun;Joo, Jung -Min
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.3
    • /
    • pp.194-202
    • /
    • 2021
  • Ionosphere, one of the largest error sources, can pose potentially harmful threat to single-frequency GNSS (global navigation satellite system) user even after applying ionospheric corrections to their GNSS measurements. To quantitatively assess ionospheric impacts on the satellite navigation-based applications using simulation, the standard deviation of residual ionospheric errors is needed. Thus, in this paper, we determine conservative statistical quantity that covers typical residual ionospheric errors for nominal days. Extensive data-processing computes TEC (total electron content) estimates from GNSS measurements collected from the Korean reference station networks. We use Klobuchar model as a correction to calculate residual ionospheric errors from TEC (total electron content) estimate. Finally, an exponential delay model for residual ionospheric errors is presented as a function of local time and satellite elevation angle.