• 제목/요약/키워드: information Protection

Search Result 4,475, Processing Time 0.1 seconds

Analysis of DDoS Prevention Algorithm in Mobile Ad-hoc Network (MANET 환경에서의 DDoS 공격방지 알고리즘 분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.11-17
    • /
    • 2013
  • In this paper, the information security requirements in the mobile ad-hoc network(MANET) are presented, and the algorithm to establish the protection node(gateway) is proposed to prevent the distributed denial of service(DDoS). The information security technology and security threats in the MANET are presented, and protection node is decided to minimize the total cost through the sending nodes and receiving nodes by way of protection node. To set up the protection node, the minimization algorithms of maximum cost and the average cost between the protection node and receiving nodes are compared with the optimal solutions, in which optimal solution is found out by all enumeration method. From the results, the total cost between the sending and receiving nodes is minimized under the average cost minimization algorithm rather than the using of the maximum cost.

Research on the Trend of Digital Contents Protection Techniques (디지털 컨텐츠의 보호기술에 관한 기술동향 분석)

  • Park, Jin;Na, Cheol-Hun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1094-1097
    • /
    • 2005
  • It is issued that protecting and managing a copyright are very important to a digitization of multimedia contents. We analyze the trend of a multimedia service, IPMP(Intellectual Property Management and Protection), DMP(Digital Media Project), ENTHRONE(End-to-end Qos through Integrated Management of Content, Networks and Terminals), and DRM(Digital Rights Management). All of these techniques are for developing solution about protection and management of the copyright and media service. These have been at the head of the growth of the whole media service, but cause problems such as a illegal copy and distribution. To solve these problems, researchers are performing many projects.

  • PDF

New Thyristor Based ESD Protection Devices with High Holding Voltages for On-Chip ESD Protection Circuits

  • Hwang, Suen-Ki;Cheong, Ha-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.150-154
    • /
    • 2019
  • In the design of semiconductor integrated circuits, ESD is one of the important issues related to product quality improvement and reliability. In particular, as the process progresses and the thickness of the gate oxide film decreases, ESD is recognized as an important problem of integrated circuit design. Many ESD protection circuits have been studied to solve such ESD problems. In addition, the proposed device can modify the existing SCR structure without adding external circuit to effectively protect the gate oxide of the internal circuit by low trigger voltage, and prevent the undesired latch-up phenomenon in the steady state with high holding voltage. In this paper, SCR-based novel ESD(Electro-Static Discharge) device with the high holding voltage has been proposed. The proposed device has the lower triggering voltage without an external trigger circuitry and the high holding voltage to prevent latch-up phenomenon during the normal condition. Using TCAD simulation results, not only the design factors that influence the holding voltage, but also comparison of conventional ESD protection device(ggNMOS, SCR), are explained. The proposed device was fabricated using 0.35um BCD process and was measured electrical characteristic and robustness. In the result, the proposed device has triggering voltage of 13.1V and holding voltage of 11.4V and HBM 5kV, MM 250V ESD robustness.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

Current Status of the Ecosystem at the Nakdong River Estuary and Management Plan (낙동강하구의 생태계 현황과 관리방안)

  • Sangwook Han;Kwangjin Cho;Pyoungbeom Kim;Haeseon Shin
    • Journal of Environmental Science International
    • /
    • v.32 no.12
    • /
    • pp.943-953
    • /
    • 2023
  • This study analyzed the ecological characteristics of the wetland protection area at tthe Nakdong River through vegetation and biota surveys, which showed that brackish water meets fresh water, a unique ecological environment has been created, biodiversity is high, and diverse habitats are distributed. Eleven plant communities, including four woody communities and seven grass communities, are distributed along the coast, and a total of 514 species, including 11 endangered wildlife species, were identified in terms of species diversity. Among them, the species diversity of the Eulsuk-do area was found to be relatively higher than that of other Barreir Islands areas. The presence of a population of Sterna albifrons on Sinja-do and a population of Eremias argus on Jinwo-do, an area outside the boundaries of the wetland protection area, confirmed the conservation value of the wetlands and the need to expand the boundaries of the wetland protection area. It is judged that this information can be used as basic information for a systematic conservation and management plan for the wetland protection area at the Nakdong River Estuary and as basic data to support the establishment of a policy.

The Design of Active Storage Virtualization System for Information Protection (정보보호를 위한 능동적 스토리지 가상화 시스템 설계)

  • Cho, Kyoung-Ok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.2040-2048
    • /
    • 2010
  • In contemporary society, though convenience and efficiency of work using information system is growing high, adverse effect problems of malignant code, system hacking, information leak by insiders due to the development of the network are raising their head daily. Because of this, enormous work forces and expenses for the recovery and management of system is needed. The existing system can be divided into two aspects: security solution which surveils and treats virus and malignant codes, and network management solution which observes the system of computer, and practices maintenance and repair such as management, recovery, backup. This treatise applied Active Write Filter mechanism and the technology based on NFS and complemented the maintenance problems of user data of the existing system and designed the system which enables solving problems of intellectual property right such as information protection and illegal work.

A method for the protection of the message in social network service(SNS) using access control and hash-chain (SNS에서 접근제어 및 해시체인을 이용한 메시지 보호 기법)

  • Jeong, Hanjae;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • As social network service(SNS) has grown rapidly, the variety information being shared through SNS. However, the privacy of individuals can be violated due to the shared information through a SNS or the post written in the past at the SNS. Although, many researches concerned about it, they did not suggest key management and access control especially. In this paper, we propose the method for the protection of the message in SNS using access control and hash-chain.

An Analysis on Fault Response Characteristics in Low Voltage DC Distribution System (저압직류 배전계통의 고장응답 특성 분석)

  • Noh, Chul-Ho;Gwon, Gi-Hyeon;Song, Jong-Il;Han, Joon;Oh, Yun-Sik;Kim, Chul-Hwan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.6
    • /
    • pp.911-917
    • /
    • 2016
  • DC-based power system is paid attention as interests in energy efficiency and power quality are increased. However, standardization and researches for commercializing Low Voltage DC(LVDC) distribution system are still insufficient. Protection system, which is closely related with reliability, power quality, safety, and life expectancy of components in power system, is also included. This paper therefore analyzes fault response characteristics in LVDC distribution system as a preliminary study on protection schemes. A stepwise analysis on fault current from both AC/DC converter and DC/DC converter is performed and related expressions are derived. And then, modeling and simulation with various conditions are conducted by using ElectroMagnetic Transients Program (EMTP) to verify analysis results. Based on research results in the paper, direction for development of protection schemes for LVDC distribution system is suggested.

A Study on Developing Guidelines for Personal Information Protection in Library (도서관 개인정보보호 가이드라인 개발에 관한 연구)

  • Noh, Younghee;Kim, Tae-Kyung
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.2
    • /
    • pp.25-61
    • /
    • 2015
  • This study was designed to propose library privacy guidelines to be applicable in any library without distinguishing library types. Individual libraries can refine, modify, and use them to fit their situation, using the guidelines as a base. The library privacy protection guidelines developed in this study are composed of purposes, definitions, scope of privacy, law and policy, general information, the library's job performance on the handling of personal information, and library subcontractors. The development objectives and utilization direction of the library privacy guidelines developed in this study are meant to provide a guide for change according to the amended provision of library "Privacy Act" implementation, optimization of library Privacy Directive, a reflection of the relevant laws and regulations, and the standardization-oriented library privacy guidelines.

FFT Based Information Concealing Method for Video Copyright Protection (동영상 저작권보호를 위한 FFT 기반 정보 은닉 기법)

  • Choi, Il-Mok;Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.4
    • /
    • pp.204-209
    • /
    • 2013
  • FFT based fingerprinting to conceal more information has developed for video copyright protection. More complex information of video is necessary to prove an ownership and legal distributions in invisible form. This paper describes a method to insert more information and to detect them. $3{\times}3$ points structure is used to present information. The possible ways to show are 8bit, $2^8$ = 256 where one point of 9 is always turn on. The points are marked in frequency domain that both real and imaginary party numbers are modified. The five successive frames of same scenes are used to mark because the same scene has very similar shape in FFT result. However, the detail values of coefficients are totally different each other to recognize the marked points. This paper also describes a method to detect the marked points by averaging and correlation algorithm. The PSNRs of marked images by our method had 51.138[dB] to 51.143[dB]. And we could get the correlation values from 0.79 to 0.87.