• Title/Summary/Keyword: information communication infrastructure

Search Result 1,016, Processing Time 0.025 seconds

Building an Overseas Infrastructure Offices of the Information Security Industry (정보보호 산업 해외 거점 인프라 생성 연구)

  • Cho, Chang-Duk;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.103-109
    • /
    • 2016
  • The information security industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. For the export of high value-added enterprise information security products and services, it is necessary the establishment of the domestic IT information security infrastructure of the industrial promotion is based overseas. Come to analyze the domestic information security industry, capital of this small, market reclamation of overseas expansion, information, manpower shortage was a problem. This fact, combined losses caused by cost-free period AS. Therefore, the study on information security in the infrastructure industry overseas bases is necessary. How to select and analyze the causes of infrastructure in selected overseas offices. By utilizing the infrastructure of overseas bases, can raise the added value of the products and services of the Information Security company, we can enable the export of small and medium Information Security company from overseas offices.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Information communication technology impact on the exhibition convention effect and satisfaction (정보통신기술이 전시컨벤션 효과만족에 미치는 영향)

  • Son, Gwon-Ryon;Jeon, In-Oh
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.61-73
    • /
    • 2012
  • In this study, the information and communication technology ICT companies, 312 companies, in order to analyze the impact of the effect of satisfaction on the Exhibition and Convention on the impact of Information and Communication Technology Exhibition and Convention satisfaction effects analysis by information and communication technology Convention e-Portal affect the infrastructure system, exhibition and Convention, Convention Industry competitiveness, Convention, Convention Tour Program components to satisfy Convention effect empirically the effect on information and Communications Technology exhibition and Convention industry Convention and satisfaction effects on were analyzed. A result was able to find that information and communication technology goods and technology, tourism technology infrastructure technologies program, e-portal system, industrial competitiveness and technology Exhibition and Convention of Effects. Exhibition and Convention ensure the effect of the base material and environmental factors, these factors determine the product development laid the foundation. Product type defined, you can see that affecting economic ripple effects and satisfaction. Exhibition and Convention can achieve the effect of information and communication technologies to reduce your operating costs.

A study and analysis of WiBro for infrastructure-vehicle communication technology (인프라-차량단말간 통신기술을 위한 WiBro 기술 분석 및 연구)

  • Lim, Il-kwon;Choi, Sang-wook;Kim, Young-hyuk;Choi, Jeong-Dan;Lee, Jea-kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.120-123
    • /
    • 2009
  • The WiBro to start June 2006 is mobile internet service with 60km/h, 3Mbps. And current WiBro service is used in Seoul, the metropolitan area and the local major cities. This study suggests WiBro technology and analyzes wireless communication technology to vehicle-to-infrastructure communications for the unmanned vehicle control. We were driving vehicle with two laptop computer's WiBro unit for V2I communication environment. So each RAS(Radio Access Station) on center is tested coverage area, transmission rate, latency rate, lost rate and transmission rate to parking area environment.

  • PDF

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

A Study on Disaster Evacuation System in Busan Urban Transit using LoRa Wireless Network (LoRa 무선네트워크 기반 부산도시철도 재난대피 시스템 적용에 관한 연구)

  • Lee, Moo-Hyun;Park, Hee-Chul;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.417-419
    • /
    • 2016
  • Internet of things(IoT) services should be available to provide unattended operation in a remote area, long battery life, low-cost infrastructure, two-way communication platform. Urban transit in Busan is made up of the wire-based infrastructure except for voice infrastructure of transmit/receive and new data infrastructure is required for Internet of things(IoT) services. Urban transit environments in Busan were analyzed in order to apply LoRa Wireless Network(the standard communication way of IoT) and proposes a building after a Disaster Evacuation System.

  • PDF

A Study on Security of AMI(Advanced Metering Infrastructure) in SMARTGRID (스마트 그리드에서의 AMI 보안에 관한연구)

  • Kim, Yeoun-Soo;Kim, Jin-Cheol;Ko, Jong-Bin;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.6
    • /
    • pp.1014-1023
    • /
    • 2012
  • Recently with improvement of SMART Grid, AMI network security has been affecting the environment for Electric information and communication. The system and communication protection consists of steps taken to protect the AMI components and the communication links between system components from cyber intrusions. The addition of two way communications between SUN and HAN introduces additional risk for unauthorized access to the AMI system. In this paper, we propose new AMI device authentication infrastructure, key establishment and security algorithm based on public key encryption to solve AMI network security problems.

A Design of the Certification System in a Instantant Messenger Using PKI (PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계)

  • Park Su-Young;Choi Gwang-Mi;Jung Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.142-147
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their nature of getting immediate reponses. However a instant messenger services have the exposure of data on internet but clients use them without recognizing their exposure. It's like phone tapping. The coding technology using Public Key Cryptosystem has developed the public key infrastructure to be able to do the services of Access-control, Authentication, Confidentiality, Integrity. and Non-repudiation with internet. It is a thesis that suggests the certification protocol in a instant messenger using PKI(Public Key Infrastructure) for secure communication.