• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.042 seconds

Efficient Multicasting Mechanism for Mobile Computing Environment (물류트랙킹 장비에 활용되는 WCDMA/GSM 이중 대역 안테나 설계 및 성능 검증)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Jeon, Mi-Jin;Jo, Jae-Hui;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.896-897
    • /
    • 2013
  • In recent years, logistics tracking Device using GSM & WCDMA to improve logistics efficiency are being extensively researched. The purpose of this paper is to examine the performance development antenna usable cargo container security transport. Antenna developed by study were optimized to match logistics environment apply to GSM & WCDMA dual frequency for monitering system. The measure of antenna have confirmation VSWR is 3:1 measured in return loss -10dB. Reliability of this antenna has been verified about GSM & WCDMA through test-operation between the south korea and Russia.

  • PDF

Technical Suggestions for Smart Airport Realization - Viewpoint of Passenger Convenience (스마트공항 실현을 위한 기술적 제언 - 여객 편의성 관점)

  • Hong, Jin Woo;Oh, Jeong Hoon;Lee, Han Kyu;Kim, Moon Ku;Song, Ho Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.268-271
    • /
    • 2018
  • Smart Airport which applies the new ICT technologies to the airport is a future airport to provide convenient and safe services for passengers who are airport users, and promote the efficient management of the airport system in point of airport operator's view. The ranges of smart airport include the overall area of the airport like land side, terminal, and air side. In this paper, we propose a technical solution for airport process of terminal providing passenger convenience in various ranges for smart airport realization. Self-service such as web or mobile check-in, self check-in/tagging/back drop/boarding etc. should be strengthened to smartize the airport process and technologies such as automatic immigration, smart security search and automatic AI-based baggage search should be applied. In this paper, we explain the concept of smart airport and smart process, and then propose technical considerations.

  • PDF

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

Promoting Resources Efficiency in the Life-cycle of Resource for Sustainable Resource Management (지속 가능한 자원관리를 위한 자원 전과정에서의 효율적 자원이용 촉진)

  • Lee, Il-Seuk;Kang, Hong-Yoon
    • Resources Recycling
    • /
    • v.24 no.2
    • /
    • pp.69-78
    • /
    • 2015
  • Recently, the importance of efficient resource management has been highlighted due to the uncertainty of its security. Developed countries promote the legislative provision and transition of industrial structure to maximize the efficiency of resource use through supporting the sustainable resource management at national level. Meanwhile Korea has very sensitive industrial structure along with the international resource supply and demand conditions. It is acutely necessary to improve the resource productivity with the various action plans such as the increase of recycling rate and the establishment of methodical resource management system. Especially, the study on the direction of each flow stage and the concrete action plans for using resource efficiently in the life-cycle of resource will be required. Therefore, this study suggests the future direction of each flow stage(production stage and circulatory stage), and the concrete action plans to improve the present problems of resource management in Korea.

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.

The Comparative Study of Software Optimal Release Time of Finite NHPP Model Considering Property of Nonlinear Intensity Function (비선형 강도함수 특성을 이용한 유한고장 NHPP모형에 근거한 소프트웨어 최적방출시기 비교 연구)

  • Kim, Kyung-Soo;Kim, Hee-Cheul
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.159-166
    • /
    • 2013
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, finite failure non-homogeneous Poisson process model, presented and propose release policies of the life distribution, half-logistic property model which used to an area of reliability because of various shape and scale parameter. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, the parameters estimation using maximum likelihood estimation of failure time data, make out estimating software optimal release time. Software release time is used as prior information, potential security damages should be reduced.

Estimating social and economic costs for outpatient injuries by using Korea medical panel data (한국의료패널데이타를 이용한 외래 환자 손상의 사회경제적 비용 추계)

  • Choi, Eun-Mi;Yoo, In-Sook
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.4
    • /
    • pp.55-65
    • /
    • 2015
  • An increase in patients' medical expenses for their injury. accident and intoxication is a major challenge to improve the sustain-ability of a national health security system, and increasing medical expenses need be suppressed through improving relevant systems and/or efficiently operating and managing the health insurance. At this juncture, in Korea which has a high rate of injury incidence and mortality, it is necessary to estimate social and/or economic costs for injuries with a focus on their social effects. This research has examined the results of a Korea medical panel investigation conducted in 2008, which largely surveyed of the actual conditions of outpatients' medical use for their injury, accident and/or intoxication and investigated relevant medical expenses, with a view to estimating the directly incurred costs when the patients use medical services and the production loss costs caused by an production decline and others, so that social and/or economic costs for injuries may be ultimately aggregated.

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.