• Title/Summary/Keyword: security attack

Search Result 2,427, Processing Time 0.038 seconds

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF

Validity and Pertinence of Administrative Capital City Proposal (행정수도 건설안의 타당성과 시의성)

  • 김형국
    • Journal of the Korean Geographical Society
    • /
    • v.38 no.2
    • /
    • pp.312-323
    • /
    • 2003
  • This writer absolutely agrees with the government that regional disequilibrium is severe enough to consider moving the administrative capital. Pursuing this course solely to establish a balanced development, however, is not a convincing enough reason. The capital city is directly related to not only the social and economic situation but, much more importantly, to the domestic political situation as well. In the mid-1970s, the proposal by the Third Republic to move the capital city temporarily was based completely on security reasons. At e time, the then opposition leader Kim, Dae-jung said that establishing a safe distance from the demilitarized zone(DMZ) reflected a typically military decision. His view was that retaining the capital city close to the DMZ would show more consideration for the will of the people to defend their own country. In fact, independent Pakistan moved its capital city from Karachi to Islamabad, situated dose to Kashmir the subject of hot territorial dispute with India. It is regrettable that no consideration has been given to the urgent political situation in the Korean peninsula, which is presently enveloped in a dense nuclear fog. As a person requires health to pursue his/her dream, a country must have security to implement a balanced territorial development. According to current urban theories, the fate of a country depends on its major cities. A negligently guarded capital city runs the risk of becoming hostage and bringing ruin to the whole country. In this vein, North Koreas undoubted main target of attack in the armed communist reunification of Korea is Seoul. For the preservation of our state, therefore, it is only right that Seoul must be shielded to prevent becoming hostage to North Korea. The location of the US Armed Forces to the north of the capital city is based on the judgment that defense of Seoul is of absolute importance. At the same time, regardless of their different standpoints, South and North Korea agree that division of the Korean people into two separate countries is abnormal. Reunification, which so far has defied all predictions, may be realized earlier than anyone expects. The day of reunification seems to be the best day for the relocation of the capital city. Building a proper capital city would take at least twenty years, and a capital city cannot be dragged from one place to another. On the day of a free and democratic reunification, a national agreement will be reached naturally to find a nationally symbolic city as in Brazil or Australia. Even if security does not pose a problem, the governments way of thinking would not greatly contribute to the balanced development of the country. The Chungcheon region, which is earmarked as the new location of the capital city, has been the greatest beneficiary of its proximity to the capital region. Not being a disadvantaged region, locating the capital city there would not help alleviate regional disparity. If it is absolutely necessary to find a candidate region at present, considering security, balanced regional development and post-reunification scenario of the future, Cheolwon area located in the middle of the Korean peninsula may be a plausible choice. Even if the transfer of capital is delayed in consideration of the present political conflict between the South and the North Koreas, there is a definite shortcut to realizing a balanced regional development. It can be found not in the geographical dispersal of the central government, but in the decentralization of power to the provinces. If the government has surplus money to build a new symbolic capital city, it is only right that it should improve, for instance, the quality of drinking water which now everyone eschews, and to help the regional subway authority whose chronic deficit state resoled in a recent disastrous accident. And it is proper to time the transfer of capital city to coincide with that of the reunification of Korea whenever Providence intends.

North Korea's Nuclear Strategy: Its Type Characteristics and Prospects (북한 핵전략의 유형적 특징과 전망)

  • Kim, Kang-nyeong
    • Korea and Global Affairs
    • /
    • v.1 no.2
    • /
    • pp.171-208
    • /
    • 2017
  • This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.

The lesson From Korean War (한국전쟁의 교훈과 대비 -병력수(兵力數) 및 부대수(部隊數)를 중심으로-)

  • Yoon, Il-Young
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.49-168
    • /
    • 2010
  • Just before the Korean War, the total number of the North Korean troops was 198,380, while that of the ROK(Republic of Korea) army troops 105,752. That is, the total number of the ROK army troops at that time was 53.3% of the total number of the North Korean army. As of December 2008, the total number of the North Korean troops is estimated to be 1,190,000, while that of the ROK troops is 655,000, so the ROK army maintains 55.04% of the total number of the North Korean troops. If the ROK army continues to reduce its troops according to [Military Reform Plan 2020], the total number of its troops will be 517,000 m 2020. If North Korea maintains the current status(l,190,000 troops), the number of the ROK troops will be 43.4% of the North Korean army. In terms of units, just before the Korean War, the number of the ROK army divisions and regiments was 80% and 44.8% of North Korean army. As of December 2008, North Korea maintains 86 divisions and 69 regiments. Compared to the North Korean army, the ROK army maintains 46 Divisions (53.4% of North Korean army) and 15 regiments (21.3% of North Korean army). If the ROK army continue to reduce the military units according to [Military Reform Plan 2020], the number of ROK army divisions will be 28(13 Active Division, 4 Mobilization Divisions and 11 Local Reserve Divisions), while that of the North Korean army will be 86 in 2020. In that case, the number of divisions of the ROK army will be 32.5% of North Korean army. During the Korean war, North Korea suddenly invaded the Republic of Korea and occupied its capital 3 days after the war began. At that time, the ROK army maintained 80% of army divisions, compared to the North Korean army. The lesson to be learned from this is that, if the ROK army is forced to disperse its divisions because of the simultaneous invasion of North Korea and attack of guerrillas in home front areas, the Republic of Korea can be in a serious military danger, even though it maintains 80% of military divisions of North Korea. If the ROK army promotes the plans in [Military Reform Plan 2020], the number of military units of the ROK army will be 32.5% of that of the North Korean army. This ratio is 2.4 times lower than that of the time when the Korean war began, and in this case, 90% of total military power should be placed in the DMZ area. If 90% of military power is placed in the DMZ area, few troops will be left for the defense of home front. In addition, if the ROK army continues to reduce the troops, it can allow North Korea to have asymmetrical superiority in military force and it will eventually exert negative influence on the stability and peace of the Korean peninsular. On the other hand, it should be reminded that, during the Korean War, the Republic of Korea was attacked by North Korea, though it kept 53.3% of troops, compared to North Korea. It should also be reminded that, as of 2008, the ROK army is defending its territory with the troops 55.04% of North Korea. Moreover, the national defense is assisted by 25,120 troops of the US Forces in Korea. In case the total number of the ROK troops falls below 43.4% of the North Korean army, it may cause social unrest about the national security and may lead North Korea's misjudgement. Besides, according to Lanchester strategy, the party with weaker military power (60% compared to the party with stronger military power) has the 4.1% of winning possibility. Therefore, if we consider the fact that the total number of the ROK army troops is 55.04% of that of the North Korean army, the winning possibility of the ROK army is not higher than 4.1%. If the total number of ROK troops is reduced to 43.4% of that of North Korea, the winning possibility will be lower and the military operations will be in critically difficult situation. [Military Reform Plan 2020] rums at the reduction of troops and units of the ground forces under the policy of 'select few'. However, the problem is that the financial support to achieve this goal is not secured. Therefore, the promotion of [Military Reform Plan 2020] may cause the weakening of military defence power in 2020. Some advanced countries such as Japan, UK, Germany, and France have promoted the policy of 'select few'. However, what is to be noted is that the national security situation of those countries is much different from that of Korea. With the collapse of the Soviet Unions and European communist countries, the military threat of those European advanced countries has almost disappeared. In addition, the threats those advanced countries are facing are not wars in national level, but terrorism in international level. To cope with the threats like terrorism, large scaled army trops would not be necessary. So those advanced European countries can promote the policy of 'select few'. In line with this, those European countries put their focuses on the development of military sections that deal with non-military operations and protection from unspecified enemies. That is, those countries are promoting the policy of 'select few', because they found that the policy is suitable for their national security environment. Moreover, since they are pursuing common interest under the European Union(EU) and they can form an allied force under NATO, it is natural that they are pursing the 'select few' policy. At present, NATO maintains the larger number of troops(2,446,000) than Russia(l,027,000) to prepare for the potential threat of Russia. The situation of japan is also much different from that of Korea. As a country composed of islands, its prime military focus is put on the maritime defense. Accordingly, the development of ground force is given secondary focus. The japanese government promotes the policy to develop technology-concentrated small size navy and air-forces, instead of maintaining large-scaled ground force. In addition, because of the 'Peace Constitution' that was enacted just after the end of World War II, japan cannot maintain troops more than 240,000. With the limited number of troops (240,000), japan has no choice but to promote the policy of 'select few'. However, the situation of Korea is much different from the situations of those countries. The Republic of Korea is facing the threat of the North Korean Army that aims at keeping a large-scale military force. In addition, the countries surrounding Korea are also super powers containing strong military forces. Therefore, to cope with the actual threat of present and unspecified threat of future, the importance of maintaining a carefully calculated large-scale military force cannot be denied. Furthermore, when considering the fact that Korea is in a peninsular, the Republic of Korea must take it into consideration the tradition of continental countries' to maintain large-scale military powers. Since the Korean War, the ROK army has developed the technology-force combined military system, maintaining proper number of troops and units and pursuing 'select few' policy at the same time. This has been promoted with the consideration of military situation in the Koran peninsular and the cooperation of ROK-US combined forces. This kind of unique military system that cannot be found in other countries can be said to be an insightful one for the preparation for the actual threat of North Korea and the conflicts between continental countries and maritime countries. In addition, this kind of technology-force combined military system has enabled us to keep peace in Korea. Therefore, it would be desirable to maintain this technology-force combined military system until the reunification of the Korean peninsular. Furthermore, it is to be pointed out that blindly following the 'select few' policy of advanced countries is not a good option, because it is ignoring the military strategic situation of the Korean peninsular. If the Republic of Korea pursues the reduction of troops and units radically without consideration of the threat of North Korea and surrounding countries, it could be a significant strategic mistake. In addition, the ROK army should keep an eye on the fact the European advanced countries and Japan that are not facing direct military threats are spending more defense expenditures than Korea. If the ROK army reduces military power without proper alternatives, it would exert a negative effect on the stable economic development of Korea and peaceful reunification of the Korean peninsular. Therefore, the desirable option would be to focus on the development of quality of forces, maintaining proper size and number of troops and units under the technology-force combined military system. The tableau above shows that the advanced countries like the UK, Germany, Italy, and Austria spend more defense expenditure per person than the Republic of Korea, although they do not face actual military threats, and that they keep achieving better economic progress than the countries that spend less defense expenditure. Therefore, it would be necessary to adopt the merits of the defense systems of those advanced countries. As we have examined, it would be desirable to maintain the current size and number of troops and units, to promote 'select few' policy with increased defense expenditure, and to strengthen the technology-force combined military system. On the basis of firm national security, the Republic of Korea can develop efficient policies for reunification and prosperity, and jump into the status of advanced countries. Therefore, the plans to reduce troops and units in [Military Reform Plan 2020] should be reexamined. If it is difficult for the ROK army to maintain its size of 655,000 troops because of low birth rate, the plans to establish the prompt mobilization force or to adopt drafting system should be considered for the maintenance of proper number of troops and units. From now on, the Republic of Korean government should develop plans to keep peace as well as to prepare unexpected changes in the Korean peninsular. For the achievement of these missions, some options can be considered. The first one is to maintain the same size of military troops and units as North Korea. The second one is to maintain the same level of military power as North Korea in terms of military force index. The third one is to maintain the same level of military power as North Korea, with the combination of the prompt mobilization force and the troops in active service under the system of technology-force combined military system. At present, it would be not possible for the ROK army to maintain such a large-size military force as North Korea (1,190,000 troops and 86 units). So it would be rational to maintain almost the same level of military force as North Korea with the combination of the troops on the active list and the prompt mobilization forces. In other words, with the combination of the troops in active service (60%) and the prompt mobilization force (40%), the ROK army should develop the strategies to harmonize technology and forces. The Korean government should also be prepared for the strategic flexibility of USFK, the possibility of American policy change about the location of foreign army, radical unexpected changes in North Korea, the emergence of potential threat, surrounding countries' demand for Korean force for the maintenance of regional stability, and demand for international cooperation against terrorism. For this, it is necessary to develop new approaches toward the proper number and size of troops and units. For instance, to prepare for radical unexpected political or military changes in North Korea, the Republic of Korea should have plans to protect a large number of refugees, to control arms and people, to maintain social security, and to keep orders in North Korea. From the experiences of other countries, it is estimated that 115,000 to 230,000 troops, plus ten thousands of police are required to stabilize the North Korean society, in the case radical unexpected military or political change happens in North Korea. In addition, if the Republic of Korea should perform the release of hostages, control of mass destruction weapons, and suppress the internal wars in North Korea, it should send 460,000 troops to North Korea. Moreover, if the Republic of Korea wants to stop the attack of North Korea and flow of refugees in DMZ area, at least 600,000 troops would be required. In sum, even if the ROK army maintains 600,000 troops, it may need additional 460,000 troops to prepare for unexpected radical changes in North Korea. For this, it is necessary to establish the prompt mobilization force whose size and number are almost the same as the troops in active service. In case the ROK army keeps 650,000 troops, the proper number of the prompt mobilization force would be 460,000 to 500,000.

  • PDF

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.

A Study on The Waegu(倭寇)'s invasion and the importance of the Ocean Defence in the Late Goryeo(高麗) Dynasty. (고려 말 왜구 침입과 해양방어의 중요성에 대한 연구)

  • Lee, Do-Won
    • Strategy21
    • /
    • s.32
    • /
    • pp.36-70
    • /
    • 2013
  • Waegu(倭寇)'s invasion in the Late Goryeo(高麗) Dynasty was huge damage for Goryeo's local society. And It was shock that Goryeo government's basic foundation of rules. Invasion background of waegu for Kyeong-in-yeon(庚寅年, 1350) was Kyushyu(九州)'s political divide because of Nihon(日本) government's confusion. Waegu was huge damage for Goryeo's Jo-wun(漕運, the shipping system of grain paid as a tax) system. So, government started military response, but it was turn out a failure and had great damage. When execution of military operations failed, Goryeo government sent diplomatic delegation to request the prevent of waegu, but the invasion continued. Since waegu invasion, Goryeo was got nowhere with defence of waegu. So, some people demanded for a new understanding of the ocean defence in the government. Lee-Saek(李穡), Woo-Hyeonbo(禹玄寶), Lee-Hee(李禧) and Jung-Ji(鄭地) were representatives of a new understanding of the ocean defence. Their demands were received attention when all operations had been failed. Therefore, Goryeo government began to reorganization of the naval forces and set up a special committee of gunpowder manufacturing named Hwa-tong-do-gam(火筒都監). This administrative reform was achieved substantial results since then. In 1380, the naval battle at Jin-po(鎭浦) was a big event that first gunpowder attack the waegu. Since Jin-po, Goryeo's naval forces gain confidence. In 1389, Dae-ma-do(對馬島) was attacked by Park-Wi(朴葳). It was meant that Goryeo's naval forces had huge offense power. Goryeo's defence system was focused on a northern race before 14th century waegu's invasion. So they were neglected their ocean defence. But after military operation of waegu's invasion was failure, they focused on the ocean defence. A new understanding of the ocean defence was foundation of that. It means to us to a new understanding of the ocean defence. Now, East Asia has maritime disputes. And we have high exposure to potential threats. So, we have a new understanding of importance of the ocean defence. And we fight for 21th century's ocean threats as foundation of sense of national security.

  • PDF

Partial Path Selection Method in Each Subregion for Routing Path Optimization in SEF Based Sensor Networks (통계적 여과 기법 기반 센서 네트워크에서 라우팅 경로 최적화를 위한 영역별 부분 경로 선택 방법)

  • Park, Hyuk;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.1
    • /
    • pp.108-113
    • /
    • 2012
  • Routing paths are mightily important for the network security in WSNs. To maintain such routing paths, sustained path re-selection and path management are needed. Region segmentation based path selection method (RSPSM) provides a path selection method that a sensor network is divided into several subregions, so that the regional path selection and path management are available. Therefore, RSPSM can reduce energy consumption when the path re-selection process is executed. However, it is hard to guarantee optimized secure routing path at all times since the information using the path re-selection process is limited in scope. In this paper, we propose partial path selection method in each subregion using preselected partial paths made by RSPSM for routing path optimization in SEF based sensor networks. In the proposed method, the base station collects the information of the all partial paths from every subregion and then, evaluates all the candidates that can be the optimized routing path for each node using a evaluation function. After the evaluation process is done, the result is sent to each super DN using the global routing path information (GPI) message. Thus, each super DN provides the optimized secure routing paths using the GPI. We show the effectiveness of the proposed method via the simulation results. We expect that our method can be useful for the improvement of RSPSM.

Adaptive Blind Watermarking Technique by Biased-Shift of Quantizer (양자화기의 편의이동에 의한 적응적인 블라인드 워터마킹 기술)

  • Seo Young-Ho;Choi Hyun-Joon;Choi Soon-Young;Lee Chang-Yeul;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.49-58
    • /
    • 2005
  • In this paper, we proposed a blind watermarking algerian to use characteristics of a scalar quantizer which is the recommended in the JPEG2000 and JPEG. The proposed algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and is adaptively applied as a assigned quantizer according application areas. Before embedding process, a LFSR(Linear feedback shift register) rearranged the watermark for the security of the watermark itself and in the embedding process, a LFSR is used to hide the watermarking positions. Therefore the embedded watermark can he extracted by only the owner who knows the initial value of LFSR without the original image. The visual recognizable pattern such as a binary image was used as the watermark. The experimental results showed that the proposed algerian satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking. The results showed the largest error rate to be $5.7\%$ for attack. The experimental result which compares the proposed algorithm with the Mohamed algorithm showed that the proposed algorithm was better than it, exactly $4\~5$ times for the attacks of JPEG and JPEG2000.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF