• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.029 seconds

Actual Condition and Realization of Important on Laboratory Safety Management in Chemical Laboratories (화학물질 사용 실험실의 안전관리 실태와 인식도)

  • Lee, Keun-Won;Choi, Yi-Rac
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.2
    • /
    • pp.60-66
    • /
    • 2012
  • With diversification of research and development activity according to fusion of state-of-the-art technology, potential hazard and risk factors in new forms have been increased in the laboratories. Also, as there are many cases where the experimental condition is extremely high/low temperature and pressure, many many accidents producing loss of life and/or injuries occur due to the extreme condition. In this study, The common fact questionnaire as the survey tool for the establishment of the accident prevention countermeasure in laboratory have been developed to safety security of the laboratory workers. The current status of chemical materials and the realization of important on laboratory safety management using the questionnaire investigated by an electronic mail and visiting survey in the laboratories and universities. The collected data was analyzed with Excel program and it can be utilized as basic data for accident prevention in laboratories.

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.

Initial Authentication Protocol of Hadoop Distribution System based on Elliptic Curve (타원곡선기반 하둡 분산 시스템의 초기 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.253-258
    • /
    • 2014
  • Recently, the development of cloud computing technology is developed as soon as smartphones is increases, and increased that users want to receive big data service. Hadoop framework of the big data service is provided to hadoop file system and hadoop mapreduce supported by data-intensive distributed applications. But, smpartphone service using hadoop system is a very vulnerable state to data authentication. In this paper, we propose a initial authentication protocol of hadoop system assisted by smartphone service. Proposed protocol is combine symmetric key cryptography techniques with ECC algorithm in order to support the secure multiple data processing systems. In particular, the proposed protocol to access the system by the user Hadoop when processing data, the initial authentication key and the symmetric key instead of the elliptic curve by using the public key-based security is improved.

Seismic response control of transmission tower-line system using SMA-based TMD

  • Tian, Li;Zhou, Mengyao;Qiu, Canxing;Pan, Haiyang;Rong, Kunjie
    • Structural Engineering and Mechanics
    • /
    • v.74 no.1
    • /
    • pp.129-143
    • /
    • 2020
  • This study proposes a new shape memory alloy-tuned mass damper (SMA-TMD) and investigates the effectiveness of this damper in reducing and controlling the vibrations of a transmission tower-line system under various seismic excitations. Based on a practical transmission line system and considering the geometric nonlinearity of this system, the finite element (FE) software ANSYS is used to create an FE model of the transmission tower-line system and simulate the proposed SMA-TMD. Additionally, the parameters of the SMA springs are optimized. The effectiveness of a conventional TMD and the proposed SMA-TMD in reducing and controlling the vibrations of the transmission tower-line system under seismic excitations is investigated. Moreover, the effects of the ground motion intensity and frequency ratio on the reduction ratio (η) of the SMA-TMD are studied. The vibration reduction effect of the SMA-TMD under various seismic excitations is superior to that of the conventional TMD. Changes in the ground motion intensity and frequency ratio have a significant impact on the η of the SMA-TMD. As the ground motion intensity and frequency ratio increase, the η values of the SMA-TMD first increase and then decrease. Studying the vibration reduction effects of the SMA-TMD can provide a reference for the practical engineering application of this damper.

A Study on Improvement of Damage Impact Range Assessment for Field-Based Response Against Chemical Terrorism and Accidents (현장 중심의 화학테러·사고 대응을 위한 피해 영향 범위 평가 개선 방안 연구)

  • Lee, Deok-Jae;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.127-136
    • /
    • 2020
  • Chemical terrorism and accidents using chemicals are continuously occurring and attempted in and out of the country. In Korea, the National Institute of Chemical Safety affiliated with Ministry of Environment employs the CARIS(Ver. 2018) to assess the damage impact range for field-based response against chemical terrorism and accidents. However, the current version of CARIS can not consider the effects of closed space such as indoor and underground, so it is difficult to provide accurate evaluation results for damage impact range required for field response, on top of the limited information available. The limitations and directions for improvement were studied by comparing and reviewing the evaluation results of the damage impact range obtained by driving CARIS (Ver. 2018) and the domestic and foreign literature. Proposed improvements also included the direction of information provided to residents, including the need to build modeling for special points, such as underground, indoor, etc., and on-site response personnel. It is expected that through the continuous supplementation and correction of CARIS, chemical terrorism and accident response capability system will be advanced further.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

Application Areas for Cloud Computing Services using M2M and WoT (클라우드 컴퓨팅 서비스를 위한 M2M과 WoT 활용 방안)

  • Kim, Jangwon;Park, Dae-Ha;Baik, Doo-Kwon
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Much technologies building cloud computing environment and supporting sevices on the cloud computing have been developing. Through the environment, accessing new services and sharing knowledge become easy. So far, they have just focused on companies which can support services and people who can use those services. In other words, the environment and models for cloud computing are the most important issue. However, the environment changes rapidly, mobile devices that are connected with each other not only will replace the computing environment based on desktop, but also can create Big data. Therefore, technologies and models are need to follow the trend including mobile based cloud computing environment. In this paper, we explain the cloud computing technologies and trend. Also we address Machine to Machine(M2M) technology and Web of things(WoT) in order to apply those into the cloud computing environment because these two concepts will enhance effectiveness and service reusability in the coming days.

  • PDF