• Title/Summary/Keyword: 가네트

Search Result 759, Processing Time 0.024 seconds

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

A Study on Smart Grid and Cyber Security Strategy (지능형 전력망 도입과 사이버보안 전략)

  • Lee, Sang-Keun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.95-108
    • /
    • 2011
  • Smart Grids are intelligent next generating Electric Power System (EPS) that provide environment-friendliness, high-efficiency, and high-trustworthiness by integrating information and communication technology with electric power technology. Smart grids help to supply power more efficiently and safely than past systems by bilaterally exchanging information between the user and power producer. In addition, it alleviates environmental problems by using renewable energy resources. However, smart grids have many cyber security risks because of the bilateral service, the increase of small and medium-sized energy resources, and the installation of multi-sensors or control devices. These cyber risks can cause critical problems within a national grid through even small errors. Therefore, in order to reduce these risks, it is necessary to establish a cyber security strategy and apply it from the developmental stage to the implementation stage. This thesis analyzes and recommends security strategy in order to resolve the security risks. By applying cyber security strategy to a smart grid, it will provide a stepping-stone to creating a safe and dependable smart grid.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

3D Coverage Analysis of LTE Network for UTM Services Considering Actual Terrain and Base Station Layouts (실제 지형과 기지국 배치를 고려한 UTM 통신을 위한 LTE 통신망 3차원 커버리지 분석)

  • Jang, Minseok;Kim, Daeho;Kim, Hee Wook;Jung, Young-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.2
    • /
    • pp.91-98
    • /
    • 2022
  • Unmanned aircraft system traffic management (UTM) service for the safe operation of unmanned aerial vehicles (UAV) such as drones using commercial communication networks such as long-term evolution (LTE) and 5G in low-altitude areas of 150m or less is being studied in several countries. In this paper, whether it is possible to secure three-dimensional (3D) coverage for UTM service using the existing LTE cellular network for terrestrial usersis analyzed through simulations. The practicality in the real environment is confirmed by performing performance analysis in the actual topographical environment and the LTE base station layouts in Korea. According to the analysis results, as the altitude increases, the number of line-of-sight (LOS) interference base stations increases, resulting in a worse signal to interference plus noise ratio (SINR), but coverage is secured except for the limited areas within 150m. was confirmed to be possible. In addition, it is confirmed that a significant proportion of outage areas could be reduced by placing a small number of additional base stations for the outage area.

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Postcolonial Media Piracy Studies and Intellectual Property Regime as Global Control System

  • Yoon, Sangkil;Kim, Sanghyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.91-100
    • /
    • 2022
  • The purpose of this study is to critically review the global intellectual property regime, which has been in full swing since the mid-1990s, from the perspective of postcolonialism. More specifically, by looking at issues which were raised by the Postcolonial Piracy Studies, it attempted to relativize the global IP system. This paper confirmed the postcolonialist view that universal concepts could never be completely universal or pure, and confirmed the non-state legalities view of media piracy as a conduit for participation in the global network through 'porous legalities' concept of Lawrence Liang. Finally, this paper raised the need to understand various relationships between the informal media economy and the formal media economy in a balanced perspective, rather than relying only on the neat dichotomy logic of illegality/legal.

Development of the Psychology-based Curriculum for Enhancing Naturalistic Competency in the Forest Education-related Experts (산림교육전문가를 위한 심리학 기반 자연탐구역량 교육과정 개발)

  • Kim, Keun-Hyang
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.417-424
    • /
    • 2022
  • The purpose of this study was to develop the psychology-based naturalistic competency curriculum so that forest-related experts could fully play the role of a mediator between nature(forest) and human(visitors). The curriculum was designed in three parts: a pleasant life, a wise life, and a meaningful life. Contents were focused on recognizing and naming one's senses and emotions in nature, discovering nature-related memories and Naturalistic Intelligence, experiencing the flow in nature and activating the Default Mode Network. The curriculum supplemented by expert's advice was implemented as job training for forest-related experts, and the curriculum was finally revised by examining the understanding and utilization of the participants. As a result, the curriculum in three areas of emotion, cognition, and practice was completed. It is expected that this curriculum will be upgraded through evaluation in the future so that forest-related experts can provide more qualitative service by strengthening their naturalistic competency.

Improvement of Water Circulation System in the City by enhanced Green-Blue Network (그린-블루 네트워크 강화를 통한 도심 물순환체계 개선)

  • Shim, Jungmin;Park, Woonji;Choi, Yonghun;Lim, Kyoungjae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.468-468
    • /
    • 2021
  • 도시의 개발은 불투수면의 증가, 토지이용의 변화, 용수 수요 증가를 초래하였고, 최근에는 기후변화 양극화 현상으로 도심내 물순환체계를 더욱 왜곡시키는 문제를 초래하였다. 1962년부터 서울의 도심지가 본격적으로 개발되기 시작하면서 7.8%였던 불투수율이 2010년에는 50%까지 증가하였다. 토지의 피복상태가 숲과 흙일 때는 강우의 10%는 하천으로, 토양 흡수는 50%, 증발이 40%가량 된다. 보통 토양에 흡수된 물은 토양층에서 머물렀다가 중간유출되어 하천으로 유입되거나 지하수로 전환된다. 그러나 개발로 인하여 아스팔트나 콘크리트로 포장된 경우 55%가 하천으로 유입되고 토양으로 흡수되는 양은 15% 정도로 강우가 급격하게 유출되어 빠져나가 버린다. 도시 불투수면적의 증가는 단순히 치수와 이수의 문제뿐만 아니라 도심의 하천 및 녹지공간에 조성되어 있는 생태계 유지에 필요한 최소한의 수량인 생태용수 확보마저 위협하고 있다. 도심 하천의 환경생태유량 확보는 하천의 정상적인 기능을 유지할 뿐만 아니라 하천의 자정 능력을 향상하며, 수생생물의 서식환경을 보존에 기여하므로 도심의 자연성 회복에 있어 매우 중요하다. 도시 생태환경은 녹지의 단절과 파편화로 연속성을 확보하지 못하고 있는데, 이렇게 단절되고 파편화된 생태계를 연결하여 생태축을 확보하면 도시 생태계의 건강성을 증진시킬 수 있다. 대부분의 도시에서 관리하고 있는 가로수 및 띠녹지 등 녹지공간(그린 네트워크, Green Network)을 활용하여 수원 함양이나 수질정화 기능(블루 네트워크, Blue Network)을 부여하면 녹지와 수자원을 연결한 그린-블루 네트워크를 형성하여 도시 생태용수확보에도 기여할 뿐만 아니라 나아가 도심 하천의 자연성 회복에도 기여할 것으로 기대된다. 본 연구는 도시의 가로수와 띠녹지를 활용하여 빗물저장 기능과 침투기능을 확대하기 위해 기존에 녹지 및 공원 관리 차원에서 가로수 도시계획이 수립되고 관련 사업이 진행되어 온 현행 제도상의 문제점을 검토하여 제도적 개선 방안을 제안하는 것에 목적을 둔다.

  • PDF

First Record of the Eared Blacksmelt, Lipolagus ochotensis (Bathylagidae, Osmeriformes) Larvae from the Southern Coastal Waters of Jejudo Island, Korea (제주도 남부해역에서 채집된 Bathylagidae (바다빙어목) Lipolagus ochotensis 자어의 한국 첫기록)

  • Moon Joo Yoon;Hwan-Sung Ji
    • Korean Journal of Ichthyology
    • /
    • v.35 no.1
    • /
    • pp.57-63
    • /
    • 2023
  • Four individuals of Lipolagus ochotensis larvae (13.4~21.3 mm SL), belong to the family Bathylagidae, were collected by a Bongo net from the southern waters off Jejudo Island, Korea in February to March 2018. L. ochotensis is characterized by a elongated and compressed body, the eye stalks, series of melanophores on posterior of body, dorsal fin origin above the middle of the body. A molecular analysis based on 625 base pairs sequences in the mitochondrial DNA cytochrome c oxidase subunit I region shows that specimens were closely matched to adult L. ochotensis (genetic distance=0.024). We report the first record of family Bathylagidae, genus Lipolagus, L. ochotensis in Korean waters, and suggest their new Korean names, "Sim-hae-bing-eo-gwa", "Geom-eun-bing-eo-sok", and "Geom-eun-bbyam-bing-eo", respectively.

The fuzzy handoff algorithm to send DAR signal in mobile SCTP (mobile SCTP 에서의 DAR 시그널 전송을 위한 퍼지 핸드오프 알고리즘)

  • Lee, Jae-Min;Han, Byung-Jin;Im, Heon-Jeong;Lee, Jong-Hyouk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.950-953
    • /
    • 2007
  • 무선 인프라와 이동성 지원 기술의 발달로 한 장소에서 머물던 무선 인터넷 서비스를 이동 중에도 받을 수 있게 되었다. 이러한 환경의 변화로 인해 모바일 기기의 이동성에 대한 관심은 더욱 더 커지고 있으며, 이동성뿐만 아니라 유선과 마찬가지로 끊김 없는 서비스를 받고자 하는 요구도 높아지고 있다. 모바일 노드의 이동성을 지원하기 위해서 기존 네트워크 계층의 Mobile IP 와는 달리 전송 계층에서 동작하는 mSCTP (mobile Stream Control Transmission Protocol)가 등장하였다. mSCTP 는 기존 SCTP 의 멀티호밍과 동적으로 IP 주소를 변경할 수 있는 DAR (Dynamic Address Resolution) 시그널을 이용하여 모바일 노드의 핸드오프를 지원하고 있다. 하지만, IP 주소의 추가, 변경 및 삭제에 대한 각 시그널의 전송 시기에 대한 정의가 없어 전송 시기를 결정하는 메커니즘이 필요하다. 따라서 본 논문에서는 퍼지 IF-THEN 룰을 적용한 퍼지 모델을 이용하여 이러한 문제점을 해결하고자 한다. 모바일 노드가 이동하게 될 새로운 네트워크의 신호 세기와 현재 네트워크 신호와의 신호비를 퍼지 모델에 입력하고 그 결과 값을 통해 시그널 전송 시기를 판단한다. 모바일 노드는 핸드오프 시기를 적절히 판단 할 수 있기 때문에 잘못된 핸드오프로 인한 세션의 단절을 줄일 수 있고, 기존에 발생하던 핸드오프 지연 시간을 줄일 수 있어 이동 중에도 손실 없는 서비스를 제공 받을 수 있게 된다.