• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.027 seconds

Improved User Anonymity Authentication Scheme using Smart Card for Traceability (추적 가능성을 위한 스마트카드 기반의 개선된 사용자 익명성 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.83-91
    • /
    • 2012
  • Authentication schemes preserving user anonymity have first been proposed by Das et al, and most of user anonymity schemes provide user anonymity against outside attacks in the communication channel. In this paper, according to the increasing of personal information exposure incidents by server attack, we propose a new authentication scheme that provides user anonymity against server as well as one against outside attacks in the communication channel. Furthermore, the proposed authentication scheme provides traceability that remote server should be able to trace the malicious user and it also solves the problem of increasing computational load of remote server by solving weakness of wrong password input by mistake.

Performance of Double Binary Turbo Coding for LED-ID Systems (LED-ID 시스템을 위한 이중 이진 터보 코딩의 성능)

  • Hwang, Yu-Min;Kim, Kyung-Ho;Kim, Jin-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1078-1083
    • /
    • 2013
  • At the ubiquitous age, applications of Wireless Personal Area Network (WPAN) technology using LEDs are in progress. However, visible light communication using LED have weakness, which deteriorates performance of communication. To reduce information losses, which is caused by optical noise, such as incandescent lamps, fluorescent lamps, sunbeam etc., proposed channel coding scheme, double binary turbo codes. In this paper, encoding scheme of the proposed system is described and simulation results are analyzed. We had expected improved performance by using double binary turbo codes. Finally, performances of the proposed system came up to our expectations.

A Study on the Algorithm for Detection of Partial Discharge in GIS Using the Wavelet Transform

  • J.S. Kang;S.M. Yeo;Kim, C.H.;R.K. Aggarwal
    • KIEE International Transactions on Power Engineering
    • /
    • v.3A no.4
    • /
    • pp.214-221
    • /
    • 2003
  • In view of the fact that gas insulated switchgear (GIS) is an important piece of equipment in a substation, it is highly desirable to continuously monitor the state of equipment by measuring the partial discharge (PD) activity in a GIS, as PD is a symptom of an insulation weakness/breakdown. However, since the PD signal is relatively weak and the external noise makes detection of the PD signal difficult, it therefore requires careful attention in its detection. In this paper, the algorithm for detection of PD in the GIS using the wavelet transform (WT) is proposed. The WT provides a direct quantitative measure of the spectral content and dynamic spectrum in the time-frequency domain. The most appropriate mother wavelet for this application is the Daubechies 4 (db4) wavelet. 'db4', the most commonly applied mother wavelet in the power quality analysis, is very well suited to detecting high frequency signals of very short duration, such as those associated with the PD phenomenon. The proposed algorithm is based on utilizing the absolute sum value of coefficients, which are a combination of D1 (Detail 1) and D2 (Detail 2) in multiresolution signal decomposition (MSD) based on WT after noise elimination and normalization.

A study on marine geographic information system developmental direction from inflect case study (활용사례 분석을 통한 해양GIS 발전방향에 관한 연구)

  • 김동기;서상현
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.199-202
    • /
    • 2001
  • A case study classified applications which is marine systhesize, port construction, marine product and fishery, marine transportation, marine safety. And this each case investigated that GIS system, Database, system contents and the subjective management, system strong and weakness. And so analysis a current issues that marine GIS developmental policy establishment

  • PDF

A Finite field multiplying unit using Mastrovito's arhitecture

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.925-927
    • /
    • 2005
  • The study is about a finite field multiplying unit, which performs a calculation t-times as fast as the Mastrovito's multiplier architecture, suggesting and using the 2-times faster multiplier architecture. Former studies on finite field multiplication architecture includes the serial multiplication architecture, the array multiplication architecture, and the hybrid finite field multiplication architecture. Mastrovito's serial multiplication architecture has been regarded as the basic architecture for the finite field multiplication, and in order to exploit parallelism, as much resources were expensed to get as much speed in the finite field array multipliers. The array multiplication architecture has weakness in terms of area/performance ratio. In 1999, Parr has proposed the hybrid multipcliation architecture adopting benefits from both architectures. In the hybrid multiplication architecture, the main hardware frame is based on the Mastrovito's serial multiplication architecture with smaller 2-dimensional array multipliers as processing elements, so that its calculation speed is fairly fast costing intermediate resources. However, as the order of the finite field, complex integers instead of prime integers should be used, which means it cannot be used in the high-security applications. In this paper, we propose a different approach to devise a finite field multiplication architecture using Mastrovito's concepts.

  • PDF

Optical encryption of multiple images using amplitude mask and 2D chaos function (진폭 마스크와 2D 카오스 함수를 이용한 다중 이미지 광학 암호화)

  • Kim, Hwal;Jeon, Sungbin;Kim, Do-Hyung;Park, No-Cheol;Park, Young-Pil
    • Transactions of the Society of Information Storage Systems
    • /
    • v.10 no.2
    • /
    • pp.50-54
    • /
    • 2014
  • Object image using DRPE(Double Random Phase Encryption) in 4f system is encrypted by space-division method using amplitude mask. However, this method has the weakness for the case of having partial data of amplitude mask which can access the original image. To improve the security, we propose the method using the 2-dimension logistic chaos function which shuffles the encrypted data. It is shown in simulation results that the proposed method is highly sensitive to chaos function parameters. To properly decrypt from shuffled encryption data, below 1e-5 % errors of each parameter should be required. Thus compared with conventional method the proposed shows the higher security level.

Secure Remote User Authentication Scheme for Password Guessing Attack (패스워드 추측공격에 안전한 원격 사용자 인증 스킴)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5895-5901
    • /
    • 2011
  • This paper shows that a scheme provided by An[7] is not enough to satisfy security requirements for a user certification using a password-based smart card. In order to compensate this weakness, this study provides an improved user scheme with a hash function and ElGamal signature. This new scheme has some advantages protecting password guessing attack, masquerade, and replay attack as well as providing forward secrecy. Compared to An's certification scheme, this scheme suggests that the effect of computational complexity is similar but the efficiency of safety is better.

Evaluating the Official Websites of SAARC Countries on their Web Information on Food Tourism

  • Ashish, Dahiya;Shelley, Duggal
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.143-161
    • /
    • 2015
  • The South Asian Association for Regional Cooperation (SAARC) nations are a potpourri of diverse religions, races and cultures with rich natural and cultural heritage but yet to tap the full potential of tourism. An investigation into the glorifying heritage of these eight SAARC nations pinpoints towards their rich food and culinary heritage that is yet to be explored to carve them as food destinations that would definitely help ameliorating tourism too. The Global Report on Food Tourism of the United Nations World Tourism Organization (UNWTO) reveals results from a survey on food tourism marketing promotion, from which internet marketing tools, such as websites have been effectively utilized to promote food tourism in a particular destination. (UNWTO, 2012). Sensing the importance of the websites in the promotion of food tourism for any destination, the present study aims at the comparative content analysis of the official tourism websites of SAARC nations to evaluate their performance from the perspective of promotion of culinary heritage on world -wide web. The modified Balanced ScoreCard (BSC) approach is incorporated into the evaluation by taking into consideration four perspectives: technical, user friendliness and site attractiveness, tourism effectiveness and food tourism effectiveness. A set of 88 critical success factors representing these four perspectives is then used to examine the websites. The study reflects on the relative strength and weakness of the tourism websites of SAARC nations in promoting food tourism and as well help suggesting the remedial measures catalyzing the food tourism promotion through websites.

A Workflow Scheduling Technique Using Genetic Algorithm in Spot Instance-Based Cloud

  • Jung, Daeyong;Suh, Taeweon;Yu, Heonchang;Gil, JoonMin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3126-3145
    • /
    • 2014
  • Cloud computing is a computing paradigm in which users can rent computing resources from service providers according to their requirements. A spot instance in cloud computing helps a user to obtain resources at a lower cost. However, a crucial weakness of spot instances is that the resources can be unreliable anytime due to the fluctuation of instance prices, resulting in increasing the failure time of users' job. In this paper, we propose a Genetic Algorithm (GA)-based workflow scheduling scheme that can find the optimal task size of each instance in a spot instance-based cloud computing environment without increasing users' budgets. Our scheme reduces total task execution time even if an out-of-bid situation occurs in an instance. The simulation results, based on a before-and-after GA comparison, reveal that our scheme achieves performance improvements in terms of reducing the task execution time on average by 7.06%. Additionally, the cost in our scheme is similar to that when GA is not applied. Therefore, our scheme can achieve better performance than the existing scheme, by optimizing the task size allocated to each available instance throughout the evolutionary process of GA.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.