• Title/Summary/Keyword: internet infrastructure

Search Result 915, Processing Time 0.028 seconds

A Design of the Certification System in a Instantant Messenger Using PKI (PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계)

  • Park Su-Young;Choi Gwang-Mi;Jung Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.142-147
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their nature of getting immediate reponses. However a instant messenger services have the exposure of data on internet but clients use them without recognizing their exposure. It's like phone tapping. The coding technology using Public Key Cryptosystem has developed the public key infrastructure to be able to do the services of Access-control, Authentication, Confidentiality, Integrity. and Non-repudiation with internet. It is a thesis that suggests the certification protocol in a instant messenger using PKI(Public Key Infrastructure) for secure communication.

Analysis of Information Security Issues and Classification through Metaverse Infringement Cases

  • Mi-Na, Shim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.13-22
    • /
    • 2023
  • In the age of Web 3.0, the metaverse is emerging as a new innovative element to replace the Internet. Leading major ICT companies, it is striving to become a metaverse platform or infrastructure-oriented company. Along with the expansion of the VR and AR market, governments of each country are investing large budgets in this field. However, security concerns about metaverse are also growing. In addition to potential damage to infrastructure, platform and services, personal information leakage and privacy damage are expected to increase further. In this study, we investigated and closely analyzed cases of infringement on the infrastructure, platform, and service of Metaverse. We have clearly identified the current state of metaverse security and the characteristics of the risks of greatest concern. The research procedure is composed of a method of determining the metaverse security area for case analysis first and deriving the type of threat by area through the type of infringement. In particular, the results were mapped into Domain, Case, and Threat, and the implications of the results were analyzed. Through these results, researchers want to contribute to finding the right direction of research by clearly understanding the latest metaverse security status.

Benefits and Spillover Effects of Infrastructure: A Spatial Econometric Approach

  • Kim, Kijin;Lee, Junkyu;Albis, Manuel Leonard;Ang, Ricardo III B.
    • East Asian Economic Review
    • /
    • v.25 no.1
    • /
    • pp.3-31
    • /
    • 2021
  • This paper estimates the effects of transport (road and rail) & energy and ICT infrastructure (telephone, mobile, and broadband) on GDP growths in neighboring countries as well as own countries. We confirm positive direct contributions of infrastructure, access to Internet, and human capital on economic growth. The spatial panel regression models indicate that there exist positive externalities of the broadband infrastructure and human capital, and these results are robust regardless of the choice of spatial weight matrices. Our findings on spillover effects of infrastructure suggest the key role of neighboring countries' infrastructure on own country's economic growth.

Video Compression Method Using SURF Feature and Block Shaping (SURF 특징과 블록 모양을 이용한 동영상 압축 방법)

  • Jun, Jae-Hyun;Kim, Min-Jun;Jang, Yong-Suk;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.161-167
    • /
    • 2015
  • Today, computer network infrastructure is commonplace and internet user increase. Transmission bandwidth for network traffic is increasing. The data amount of 2014 and 2015 year measured 47 and 62 exabyte, it shows a tremendous increase. Video traffic occupy 60 percent among internet traffic. Enormous growth of Internet traffic than the network infrastructure is not enough to support them, so mobile network occur side-effects such as fall of voice communication. In this paper, we proposed the video compression method using SURF feature and block shaping in order to avoid potential damage. Our proposed method can provide enough performance than previous method.

Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid

  • Jang, Ji Woong;Kwon, Sungmoon;Kim, SungJin;Seo, Jungtaek;Oh, Junhyoung;Lee, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2221-2235
    • /
    • 2020
  • Compared to the past infrastructure networks, the current smart grid network can improve productivity and management efficiency. However, as the Industrial Internet of Things (IIoT) and Internet-based standard communication protocol is used, external network contacts are created, which is accompanied by security vulnerabilities from various perspectives. Accordingly, it is necessary to develop an appropriate cybersecurity guideline that enables effective reactions to cybersecurity threats caused by the abuse of such defects. Unfortunately, it is not easy for each organization to develop an adequate cybersecurity guideline. Thus, the cybersecurity checklist proposed by a government organization is used. The checklist does not fully reflect the characteristics of each infrastructure network. In this study, we proposed a cybersecurity framework that reflects the characteristics of a microgrid network in the IIoT environment, and performed an analysis to validate the proposed framework.

A Review of Intelligent Self-Driving Vehicle Software Research

  • Gwak, Jeonghwan;Jung, Juho;Oh, RyumDuck;Park, Manbok;Rakhimov, Mukhammad Abdu Kayumbek;Ahn, Junho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5299-5320
    • /
    • 2019
  • Interest in self-driving vehicle research has been rapidly increasing, and related research has been continuously conducted. In such a fast-paced self-driving vehicle research area, the development of advanced technology for better convenience safety, and efficiency in road and transportation systems is expected. Here, we investigate research in self-driving vehicles and analyze the main technologies of driverless car software, including: technical aspects of autonomous vehicles, traffic infrastructure and its communications, research techniques with vision recognition, deep leaning algorithms, localization methods, existing problems, and future development directions. First, we introduce intelligent self-driving car and road infrastructure algorithms such as machine learning, image processing methods, and localizations. Second, we examine the intelligent technologies used in self-driving car projects, autonomous vehicles equipped with multiple sensors, and interactions with transport infrastructure. Finally, we highlight the future direction and challenges of self-driving vehicle transportation systems.

The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.

  • Lee, Kyung-bok;Lim, Jong-in
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.857-880
    • /
    • 2016
  • Due to an increasing number of cyberattacks globally, cybersecurity has become a crucial part of national security in many countries. In particular, the Digital Pearl Harbor has become a real and aggressive security threat, and is considered to be a global issue that can introduce instability to the dynamics of international security. Against this context, the cyberattacks that targeted nuclear power plants (NPPs) in the Republic of Korea triggered concerns regarding the potential effects of cyber terror on critical infrastructure protection (CIP), making it a new security threat to society. Thus, in an attempt to establish measures that strengthen CIP from a cybersecurity perspective, we perform a case study on the cyber-terror attacks that targeted the Korea Hydro & Nuclear Power Co., Ltd. In order to fully appreciate the actual effects of cyber threats on critical infrastructure (CI), and to determine the challenges faced when responding to these threats, we examine factual relationships between the cyberattacks and their responses, and we perform analyses of the characteristics of the cyberattack under consideration. Moreover, we examine the significance of the event considering international norms, while applying the Tallinn Manual. Based on our analyses, we discuss implications for the cybersecurity of CI in South Korea, after which we propose a framework for strengthening cybersecurity in order to protect CI. Then, we discuss the direction of national policies.

A Study on Disaster Evacuation System in Busan Urban Transit using LoRa Wireless Network (LoRa 무선네트워크 기반 부산도시철도 재난대피 시스템 적용에 관한 연구)

  • Lee, Moo-Hyun;Park, Hee-Chul;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.417-419
    • /
    • 2016
  • Internet of things(IoT) services should be available to provide unattended operation in a remote area, long battery life, low-cost infrastructure, two-way communication platform. Urban transit in Busan is made up of the wire-based infrastructure except for voice infrastructure of transmit/receive and new data infrastructure is required for Internet of things(IoT) services. Urban transit environments in Busan were analyzed in order to apply LoRa Wireless Network(the standard communication way of IoT) and proposes a building after a Disaster Evacuation System.

  • PDF

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Cultural Differences in Perceptions on the Convenience of Internet Shopping: Based on Transaction Process Model

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.19-33
    • /
    • 2005
  • Although the fast advancing information infrastructure makes the connectivity possible to reach almost anywhere, it does not ensure a successful development of e-commerce for every country. The challenge will not come only from the technology, but also from the people. To examine the effect of cultural differences on the perception for Internet shopping, shoppers from two different countries - the U.S. and Korea - were chosen, and the perception for Internet shopping from each is contrasted.

  • PDF