• 제목/요약/키워드: secure solution

Search Result 355, Processing Time 0.028 seconds

A Secure Energy-Efficient Routing Scheme Using Distributed Clustering in Wireless Sensor Networks (무선 센서 네트워크에서 분산 클러스터링을 이용한 안전한 에너지 효율적인 라우팅 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.3-9
    • /
    • 2016
  • The wireless sensor networks have become an economically viable monitoring solution for a wide variety of civilian and military applications. The main challenge in wireless sensor networks is the secure transmission of information through the network, which ensures that the network is secure, energy-efficient and able to identify and prevent intrusions in a hostile or unattended environment. In that correspondence, this paper proposes a distributed clustering process that integrates the necessary measures for secure wireless sensors to ensure integrity, authenticity and confidentiality of the aggregated data. We use the notion of pre-distribution of symmetric and asymmetric keys for a secured key management scheme, and then describe the detailed scheme which each sensor node within its cluster makes use of the pre-distribution of cryptographic parameters before deployment. Finally, we present simulation results for the proposed scheme in wireless sensor network.

A Design and Implementation of System to Provide Secure Digital Contents Distribution on Mobile Environment (무선 환경에서 안전한 디지털 컨텐츠 유통을 제공하는 시스템 설계 및 구현)

  • Lee, Kwon-Il;Kim, Bong-Seon;Shin, Young-Chan;Ryou, Jae-Cheol;Lee, Jun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.327-336
    • /
    • 2004
  • There is a need for content providers and operators to control the usage of downloaded digital contents. Digital Rights Management(DRM) is the means to control the usage of the digital contents once it has been downloaded. Therefore, appropriate security mechanism is required. The mobile DRM system Is same as the general DRM system. We use encryption technology to package digital contents. In case of Mobile DRM system, secure distribution and secure keeping of packaging encryption key is important. In this paper, we design and implement DRM system on the Mobile Environments following on OMA(Open Mobile Alliance) DRM Model. We considered being a secure DRM system to contain appropriate security solution.

Group Signatures with Observers

  • Kim, Seungjoo;Park, Sangjoon;Dongho Won
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.19-25
    • /
    • 1997
  • At Eurocrypt'91, D. Chaum and E. Heyst introduced the notion of group signatures, which allow members of a group to make signatures on behalf of the group while remaining anonymous. This paper first presents a new type of group signatures with observers. In group signatures with observers, our solution is the most practical group signature scheme, under the assumption that Chaum's electronic wallet is secure.

  • PDF

Development of Antimicrobial and Deodorizing Cellulose Fiber (항균방취 셀룰로오스섬유 제조에 관한 연구)

  • 홍영근
    • Textile Coloration and Finishing
    • /
    • v.10 no.1
    • /
    • pp.38-42
    • /
    • 1998
  • Both cellulose and chitin together were dissolved in DMAc/LiCl and these solutions were extruded into coagulant of $DMAc/H_2O$. Fibers thus obtained were treated in NaOH aqueous solution. Results showed that the fiber surface contains celluose and chitosan. This means that these fibers treated are composed of three components, ie, cellulose, chitin, and chitosan. These fiber showed secure antibacterial and mechanical properties.

  • PDF

A Study on Security Solution needed to design security-kernel for secure OS (운영체제 보안을 위한 보안 커널 설계에 요구되는 보안솔루션)

  • 김성훈;오병균
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.832-834
    • /
    • 2003
  • 오늘날과 같은 컴퓨터와 통신 기반의 네트워크 환경에서 서버들에 대한‘개방성’은 중요한 특징이다. 그러나, 이러한 특성은 서버에 대한 불법적인 접근이나 해킹 등과 같은 침입을 시도할 수 있는 가능성을 내포하고 있다. 침입의 목표는 서버의 모든 시스템정보로서 방화벽이나 침입탐지시스템 등과 같은 네트워크기반의 보안솔루션에 의해 서버의 모든 정보를 보호하기에는 한계가 있다. 본 논문에서는 서버들이 가지고 있는 정보를 보호하기 위하여 기존의 보안커널보다 더 유연하고 안전성이 강화된 보안커널의 설계에 필요한 필수적인 보안요소들을 제안하였다.

  • PDF

Changes in inorganic element concentrations in leaves and nutrient solution of supplied and drained during retarding cultivation of Lycopersicum esculentum var. 'Dafnis' and 'TY Tiny'

  • Eun Mo, Lee;Bong Chun, Lee;Hee Chul, Lee;Yeo Uk, Yun;Sang Kyu, Park;Soo Bok, Park;Sun Ok, Chung;In Sook, Park;Jong Myoung, Choi
    • Korean Journal of Agricultural Science
    • /
    • v.49 no.3
    • /
    • pp.629-641
    • /
    • 2022
  • This research was conducted to secure fundamental data for development of a recirculating hydroponic system. To achieve this, Lycopersicum esculentum var. 'Dafnis' and 'TY Tiny' were grown with Yamazaki hydroponic solution and the inorganic element concentrations of plant leaves and nutrient solution of supplied and drained were analyzed periodically. The T-N and P contents in both varieties of tomato leaves showed gradual decreasing tendencies with the passage of time. The 'TY Tiny' tomato had higher contents of those two nutrients than 'Dafnis' tomato in the late stage. The K content of 'Dafnis' tomato was high in the early growth stage, but low in the late stage. However, that of 'TY Tiny' tomatoes rose in the late stage. The Ca content gradually increased in both varieties of tomato in the latter stages. The EC of the drained nutrient solution in both varieties of tomato showed increasing tendencies as time had passed, but the pH was get lowered in the drained solution. The concentrations of NO3-N, K, Ca, Mg, Na, Fe, and B, except PO4-P in the drained nutrient solution were generally higher than those in the supplied solution, especially in the period of October through December. The above results can be used for controlling of nutrient concentrations in the recirculated hydroponic cultivation of tomato.

Short-Term Generation Scheduling Considering Transmission Line Capacity Limits (선로용량한계를 고려한 단기 발전계획)

  • 김준현;송현선;유인근
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.35 no.12
    • /
    • pp.594-602
    • /
    • 1986
  • This paper proposes an effective algorithm for short-term generation scheduling for the purpose of economic and secure operation of thermal power systems. Especially, in the procedure of solution by Dynamic Programming, Linear Programming is introduced to promote the possibility of optimal solution and the security of power systems, and evaluation of security function is improved by the application of seven step approximation of normal distribution. Several necessary considerations, that is, time dependent start-up and constant down cost of generating units, demand and spinning reserve constraints, minimum up and sown time constraints, the number of possible start-up of a generating unit in a d and the number of generating units which can be started up at the same time at the same bus, are also incoporated to elevate the usability and flexibility of the algorithm. Finally, the effectiveness of the proposed algorithm has been demonstrated by applying to the 6-gen. 21-bus model power system.

  • PDF

A Study on Strategic Allocation Algorithm to Make Sales Plan (판매계획 수립을 위한 전략적 할당 알고리듬에 대한 연구)

  • Kang, Chul-Won;Won, Dae-Il;Kim, Sung-Shick
    • IE interfaces
    • /
    • v.16 no.2
    • /
    • pp.117-124
    • /
    • 2003
  • This study focuses on the detailed explanation of the strategic allocation algorithm which can be used as an ATP(Available To Promise) from the perspective of customers, and as a sales plan for sales organizations. A strategic allocation algorithm includes three methods depending on FIXED RATIO, RANK and DEMAND BASIS. In addition, further topics would be discussed regarding the method of system implementation utilizing strategic allocation algorithms and information flow with an aim to integrate such a sales plan into the e-Biz. This study aims to provide a new solution in order to secure emerging competitive factors in today's enterprise world; that is, an achievement of faster business processes. It is suggested that this new solution be implemented in order to achieve an efficient business environment by systemizing the decision making process which in the past was manually conducted.

An Innovative Scalp-Dyeing Technique with Gentian Violet Solution During Follicular Unit Extraction for White-Haired Follicular Units

  • Moon, Min Seon;Choi, Jong Pil
    • Archives of Plastic Surgery
    • /
    • v.44 no.2
    • /
    • pp.170-172
    • /
    • 2017
  • There exist some restrictions and difficulties in performing follicular unit extraction (FUE) in white-haired patients, for several reasons. In this paper, we introduce a novel technique for visualizing white hair during the punching procedure and graft preparation in FUE for white-haired patients. In white-haired older male patients, we dyed the surrounding scalp skin purple with a gentian violet solution-stained toothpick. Our method has several advantages: surgeons can easily focus on the center of the follicular unit and rapidly perform punching, they can recognize the condition of the harvested follicular units during FUE, and the hair transplant team can secure a clear view for trimming and loading into the implanter. We suggest that scalp dyeing in difficult FUE procedures, especially in patients with white hair, may be a simple method that provides a good visualization for donor site harvesting and for microdissection.

eBPF Technology Trends for Networking and Security in Cloud-native (클라우드 네이티브 환경에서 네트워킹 및 보안을 위한 eBPF 기술 동향)

  • Shin, Y.Y.;Shin, J.S.;Park, C.H.;Park, J.G.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.62-69
    • /
    • 2022
  • In a situation where applications determine business competitiveness, they cannot respond to varying customer requirements without the cloud's flexibility and scalability. Companies have begun seeking ways to enjoy the advantages of the cloud fully, and the concept of "Cloud Native" is emerging as a solution to the problem. Cloud Native is now a target of interest in the market. Microservice and serverless functions can play a vital role in cloud-native architecture. Microservice arranges applications into various independent services, each offering certain functionality through mutual networking. eBPF is attracting attention as a cloud-native networking solution that quickly supports microservice features that repeat creation/deletion. This study identifies the characteristics of eBPF-based networking and evaluates cloud-native networking and secure networking using eBPF.