• Title/Summary/Keyword: secure communications

Search Result 492, Processing Time 0.018 seconds

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

Analyzing Policy Measures to Promote Mobile Communications Network Investment Using AHP/ANP (AHP/ANP를 활용한 이동통신 네트워크 투자 활성화 정책대안 분석)

  • Jaehyun Yeo;Injun Jeong;Won Seok Yang
    • Knowledge Management Research
    • /
    • v.24 no.3
    • /
    • pp.195-215
    • /
    • 2023
  • In the telecommunications service industry, until now, it has been possible for Network Operators (NOs) to secure a competitive advantage to increase subscribers and profits through network investment. However, amid a big change to digital economy, network investment fails to lead to increase profits. These days platform companies without holing network infrastructure have a more competitive advantage and take more profits. This makes NOs gradually lose interest in network investment. The purpose of this paper is to find policy measures to promote network investment in digital economy. Specifically, we identify the factors influencing the network investment and promising policy measures energizing the investment, and then analyze their priorities and derive policy implications through Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP). The results of this paper show that market competition is more preferred to public intervention in promoting network investment. However, in order to guarantee and expand the universal access to network, it is necessary to consider expanding the role of the public, focusing on non-economic areas.

Authenticated IPv4 Address Allocation Using Human Recognition in DSTM Server (Human Recognition 방법을 적용한 DSTM 서버의 IPv4 주소 할당 인증 방법)

  • Choi, Jae-Duck;Kim, Young-Han;Kwon, Taek-Jung;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11B
    • /
    • pp.979-986
    • /
    • 2006
  • DSTM is one of the 1Pv6/IPv4 transition mechanisms using IPv4-in-IPv6 tunneling for communication between IPv6 node with dual stack and Ipv4-only node. In DSTM, the DSTM server using the DHCPv6 is vulnerable to DoS attacks which can exhaust the IPv4 address pool. In this paper, an authentication model using a HRAA (Human Recognition Address Allocation) scheme was proposed to protect DHCP server against DoS attacks. The proposed authentication model in DSTM that uses an image file for verification is effective because only human can respond to the challenge for authenticated address allocation. The proposed model can be used anytime and anywhere in a DSTM domain, and is secure against DoS attacks.

A Study on Node Authentication Mechanism using Sensor Node's Energy Value in WSN (WSN 환경에서 센서 노드의 에너지 값을 이용한 노드 인증 메커니즘에 관한 연구)

  • Kim, Bo-Seung;Lim, Hui-Bin;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.2
    • /
    • pp.86-95
    • /
    • 2011
  • Sensor nodes in wireless sensor networks are vulnerable to security than wired network due to using limited hardware performance and wireless communications that network topology changes frequently. Among techniques to enhance the security, the node authentication mechanism is used to defend against data forgery attacks using the ID of the node or to interfere with the routing of the network routing. In this paper, we proposed the AM-E mechanism that makes authentication key by using the energy value of node requesting authentication and performs the communication procedures for data transfer between different nodes. Because the energy value of node is changed depending on time, every time the authentication request is, an authentication key is changed. These features enhance the security of sensor networks and will help to configure the more secure WSN.

Relations between ICT and Productivity: An Empirical Analysis on SMEs in Korea (정보통신(ICT)과 생산성의 관계 연구: 우리나라 중소기업에 대한 실증분석)

  • Jeong, Woo-Soo;Kim, Seung-Keon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2238-2249
    • /
    • 2015
  • The purpose of this study is to analyze the relations of innovation and productivity following the introduction of ICT and the effects in the process of innovative investments activity-innovation-productivity, not only by finding causes and effects. For this purpose we conducted surveys of SMEs classified into 7 categories by type of business. To put it concretely, this study was performed to find out the foactors which allow companies to secure competitiveness by enhancing of innovative measures through ICT, and to further analyze the political implications for the development of small and medium-size business by conducting an empirical analysis of the process, from the determination of innovative investments all the way through to production. Analysis model used CDM model using econometric methods such as multiple regression analysis and multinominal logit analysis to produce results. Also we established and analyzed models of innovation investment determinants, innovation determinants and productivity determinants to analyze specifically the relations between ICT and productivity.

Implementation of Remote Monitoring Scenario using CDMA Short Message Service for Protected Crop Production Environment

  • Bae, Keun-Soo;Chung, Sun-Ok;Kim, Ki-Dae;Hur, Seung-Oh;Kim, Hak-Jin
    • Journal of Biosystems Engineering
    • /
    • v.36 no.4
    • /
    • pp.279-284
    • /
    • 2011
  • Protected vegetable production area is greater than 26% of the total vegetable production area in Korea, and portion of protected production area is increasing for flowers and fruits. To secure stable productivity and profitability, continuous and intensive monitoring and control of protected crop production environment is critical, which is labor- and time-consuming. Failure to maintain proper environmental conditions (e.g., light, temperature, humidity) leads to significant damage to crop growth and quality, therefore farmers should visit or be present close to the production area. To overcome these problems, application of remote monitoring and control of crop production environment has been increasing. Wireless monitoring and control systems have used CDMA, internet, and smart phone communications. Levels of technology adoption are different for farmers' needs for their cropping systems. In this paper, potential of wireless remote monitoring of protected agricultural environment using CDMA SMS text messages was reported. Monitoring variables were outside weather (precipitation, wind direction and velocity, temperature, and humidity), inside ambient condition (temperature, humidity, $CO_2$ level, and light intensity), irrigation status (irrigation flow rate and pressure), and soil condition (volumetric water content and matric potential). Scenarios and data formats for environment monitoring were devised, tested, and compared. Results of this study would provide useful information for adoption of wireless remote monitoring techniques by farmers.

Some Remarks on Consistency Test of Add-on Test in Bioequivalence Trials (생물학적 동등성 시험에서 추가시험의 일관성 검정에 대한 소고)

  • Ha, Myoung-Ho;Park, Sang-Gue
    • Communications for Statistical Applications and Methods
    • /
    • v.19 no.1
    • /
    • pp.47-55
    • /
    • 2012
  • The newly revised bioequivalence guideline of Korea allows the add-on test since July 1, 2008 when the initial bioequivalence trial fails to show the equivalence of two drugs. The statistical model of the add-on test and its two stage testing procedures are discussed. Some statistical points of consistency test in the add-on test are considered and the issue on the sample size of add-on test is discussed. Some reasonable alternative like Japan's guideline for bioequivalence studies is recommended to secure the proper use of an add-on study through some simulation studies.

An Efficient Authentication Mechanism Strengthen the Privacy Protection in 3G Network (3G 네트워크에서 프라이버시 보호를 강화한 효율적인 인증 메커니즘)

  • Jeon, Seo-Kwan;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.5049-5057
    • /
    • 2010
  • As communication technologies are developed and variety of services to mobile devices are provided, mobile users is rapidly increasing every year. However, mobile services running on wireless network environment are exposed to various security threats, such as illegal tampering, eavesdropping, and disguising identity. Accordingly, the secure mobile communications services to 3GPP were established that the standard for 3GPP-AKA specified authentication and key agreement. But in the standard, sequence number synchronization problem using false base station attack and privacy problem were discovered through related researches. In this paper, we propose an efficient authentication mechanism for enhanced privacy protection in the 3G network. We solve the sequence number synchronization existing 3GPP authentication scheme using timestamp and strengthen a privacy problem using secret token. In addition, the proposed scheme can improve the bandwidth consumption between serving network and home network and the problem of authentication data overhead for the serving network because it uses only one authentication vector.

Interference Analysis based on the Monte-Carlo Method (Monte-Carlo 기반의 간섭분석에 관한 연구)

  • Kim, Seong-Kweon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.2
    • /
    • pp.58-64
    • /
    • 2008
  • In this paper, we proposed the methodology of interference analysis based on monte-carlo method for effective use of Industrial, Scientific, Medical (ISM) band. The interference scenario is divided according to the distance and density. The simulation of interference analysis evaluates the interference probability according to distribution density of Interfering Transmitters (It) in the Secure Interference Area (SIA). The SIA is gained from the Interference Efficiency Range that satisfied to Interference Permissible Range of Victim Receiver (Vr). Simulation result that apply the proposed interference scenario to the WLAN and bluetooth, Interference Permissible Range was 60~400m. And the WLAN was acceptable within interference permissible range to six bluetooth that exist in the SIA. In the same condition, when applied Listen Before Talk (LBT) based on Cognitive Radio (CR) to the bluetooth using Frequency Hopping (FH), interference probability was decreased sharply. The Spectrum Engineering Advanced Monte Carlo Analysis Tool (SEAMCAT) that has been developed based on the monte-carlo method by European Radio-communications Office (ERO) were used to the interference simulation.

  • PDF