• Title/Summary/Keyword: network security

Search Result 6,093, Processing Time 0.033 seconds

Site Monitoring of Crews and Passengers on Board by the BLE and PLM Combination (BLE와 PLM 조합의 승선자 위치 모니터링)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.463-467
    • /
    • 2015
  • When unforeseen accidents occur in a ship, it is important to save passengers safely and remove them from the accident area quickly. To solve such a situation, site information of passengers on board always must be identified. This paper implemented a site monitoring of crews and passengers based on the BLE and PLM combination, to prepare for unexpected accidents of the ships. This system was composed of BLE tag for crews, passengers and each room, PLM networks, data server, and monitoring PC. In this system, site information derived from the tag attached to the bodies and cabins of crews and passengers are transmitted through a power line network, and monitored on the screen of a monitoring PC. The proposed system guides them into the only authorized area considering the ship security and passengers' safety, and even has a special alarm call to warn them after entering an unauthorized area. This system enables the BLE-embedded tag battery to use for a long time because the BLE consumes low electric power, and can gain an economic advantage.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Internetworking strategy between MANET and WLAN for Extending Hot-Spot of WLAN based on HMIPv6 (HMIPv6를 기반으로 한 무선 랜과 이동 애드 혹 네트워크 간의 인터네트워킹 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.38-48
    • /
    • 2006
  • For extending of hot-spot of WLAN, (2) proposes internetworking scheme between wireless LAN (WLAN) and mobile ad-hoc network (MANET), which employ the same layer-2 protocol with different mode. Compared to internetworking schemes between UMTS (Universal Mobile Telecommunications Systems) and WLAN (3-4), the scheme from (2) has relatively low overhead and latencies because WLAN and MANET are physically and logically similar to each other. However, the mode switching algorithm proposed in r2] for internetworking between WLAN and MANET only considers signal strength and determines handoff, and mobile nodes following a zigzag course in pollution area may perform handoff at short intervals. Furthermore, (2) employs mobile IPv6 (MIPv6) at base, which brings still high delay on handoff and overhead due to signal message exchange. In this paper, we present optimized internetworking scheme between WLAN and MANET, modified from (2). To settle ping-pong handoff from (2), we propose adaptive mode switching algorithm. HMIPv6 is employed for IP connectivity and mobility service in WLAN, which solves some shortcomings, such as high handoff overhead and vulnerable security. For routing in MANET, OLSR is employed, which is a proactive Protocol and has optimally reduced signal broadcasting overhead. OLSR operates with current P protocol compatibly with no change or modification. The proposed internetworking scheme based on adaptive mode switching algorithm shows better performance than scheme from (2).

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Analysis of the Spatial Effect of Gated Communities and Improvement of Urban Publicness (게이티드 커뮤니티의 공간적 영향 분석 및 도시 공공성 개선방안)

  • KIM, JiSook;KIM, Ho-Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.1
    • /
    • pp.150-163
    • /
    • 2022
  • Recently, the gated community has been increasing due to various reasons such as demand for differentiated areas and security, but various problems have been raised, including regional conflicts, traffic restrictions and disconnection of surrounding areas. Therefore, this study empirically considered what kind of spatial effect the gated community has on the surrounding area by analyzing the vitality using floating population big data and analyzing pedestrian accessibility using network analysis and social network analysis. As a result, it was found that the overall vitality in the study area was greatly affected by the land use and the building use. However, focusing on apartment complexes, even in the same land use, when the form of the complex is open to the outside, there is a lot of floating population, so the vitality is high. In terms of accessibility, assuming that the gated community is open, it was found that as the physical connectivity improved, there were more roads for pedestrians to choose from, and the accessibility improved as traffic and exchanges occurred in the disconnected space. The value of improving property rights and residential environment is also precious, but it is necessary to review how to reflect the improvement of local permeability in enhancing the publicness of cities and the value and direction of communities that can coexist with the region.

Decision Making of Seismic Performance Management for the Aged Road Facilities Based on Road-Network and Fragility Curve (취약도곡선을 이용한 도로망기반 노후도로시설물 내진성능관리 의사결정)

  • Kim, Dong-Joo;Choi, Ji-Hae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.5
    • /
    • pp.94-101
    • /
    • 2021
  • According to the Facility Management System (FMS) operated by the Korea Authority of Land & Infrastructure Safety, it is expected that the number of aging facilities that have been in use for more than 30 years will increase rapidly to 13.9% in 2019 and 34.5% in 2929, and end up with a social problem. In addition, with the revision of "Common Application of Seismic Design Criteria" by the Ministry of Public Administration and Security in 2017, it is mandatory to re-evaluate all existing road facilities and if necessary seismic reinforcement should be done to minimize the magnitude of earthquake damage and perform normal road functions. The seismic performance management-decision support technology currently used in seismic performance management practice in Korea only determines the earthquake-resistance reinforcement priority based on the qualitative index value for the seismic performance of individual facilities. However with this practice, normal traffic functions cannot be guaranteed. A new seismic performance management decision support technology that can provide various judgment data required for decision making is needed to overcome these shortcomings and better perform seismic performance management from a road network perspective.

A Study on Research Trends in the Smart Farm Field using Topic Modeling and Semantic Network Analysis (토픽모델링과 언어네트워크분석을 활용한 스마트팜 연구 동향 분석)

  • Oh, Juyeon;Lee, Joonmyeong;Hong, Euiki
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.203-215
    • /
    • 2022
  • The study is to investigate research trends and knowledge structures in the Smart Farm field. To achieve the research purpose, keywords and the relationship among keywords were analyzed targeting 104 Korean academic journals related to the Smart Farm in KCI(Korea Citation Index), and topics were analyzed using the LDA Topic Modeling technique. As a result of the analysis, the main keywords in the Korean Smart Farm-related research field were 'environment', 'system', 'use', 'technology', 'cultivation', etc. The results of Degree, Betweenness, and Eigenvector Centrality were presented. There were 7 topics, such as 'Introduction analysis of Smart Farm', 'Eco-friendly Smart Farm and economic efficiency of Smart Farm', 'Smart Farm platform design', 'Smart Farm production optimization', 'Smart Farm ecosystem', 'Smart Farm system implementation', and 'Government policy for Smart Farm' in the results of Topic Modeling. This study will be expected to serve as basic data for policy development necessary to advance Korean Smart Farm research in the future by examining research trends related to Korean Smart Farm.