• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.026 seconds

Implementation and Design of WISD(Web Interface System based DICOM) for Efficient Sharing of Medical Information between Clinics (의료기관간 효과적인 의료정보 공유를 위한 WISD의 설계 및 구현)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.500-508
    • /
    • 2008
  • For efficient compatible system between medical clinics, the medical information has to be built on a standardized protocol such as a HL7 for text data and a DICOM for image data. But it is difficult to exchange information between medical clinics because the systems and softwares are different and also a structure of data and a type of code. Therefore we analyze a structure of DICOM file and design an integrated database for effective information sharing and exchange. The WISD system suggested in this paper separate the DICOM file transmitted by medical clinics to text data and image data and store it in the integrated DB(database) by standardized protocol respectively. It is very efficient that each medical clinic can search and exchange information by web browser using the suggested system. The WISD system can not only search and control of image data and patient information through integrated database and internet, but share medical information without extra charge like construction of new system.

Risk Factors, Symptoms, and Intervention Analysis of Delirium Subtypes in Hospitalized Patients (입원환자에게 나타나는 섬망 아형별 위험요인과 증상 및 중재 분석)

  • Ryu, Ahyun;Kang, Young-Ok;Song, Rhayun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.353-363
    • /
    • 2021
  • This study aimed to investigate subtypes, risk factors, symptoms and the interventions to inpatients with delirium. The data of 108 inpatients who had the diagnosis of delirium during their hospital stay were collected from Electronic Medical Record at a university hospital and were analyzed by SPSS for Windows V. 26.0 program. As a results, Patients had a high proportion of elderly, male, orthopedic, and with fractures or amputations. The subtypes of delirium were hyperactive (51.9%), hypoactive (6.5%), and mixed (41.7%). Among the risk factors, depression and use of psychotropic agent were more common in those with hypoactive delirium. Among delirium interventions, behavioral symptom management and aggressive behavioral intervention were mainly implemented for those with hyperactive or mixed types, and emotional support was mainly implemented for those with hypoactive or mixed types. The delirium related intervention was more likely given immediately when the patients showed aggressive behaviors. Therefore, intervention strategies and protocol development are required for early detection of delirium in inpatients.

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Structure Method for IOT Middle Ware with Plug-in module for Automation & Smart processing of Ppuri Manufacturing Factory (뿌리기업 자동화·스마트 공정을 위한 Plug-in 구조의 IOT 미들웨어 구축 방법)

  • Lee, Jeong-Hoon;Kim, Eui-Ryong;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.229-236
    • /
    • 2019
  • IOT middleware is required to play a pivotal role in interpreting, managing, and controlling data information of Internet devices (sensors, etc.). In particular, the root industry has different process flows for different industries, and there are various data processing requirements for each company. Therefore, a general purpose IOT middleware is needed to accommodate this. The IOT middleware structure proposed by this paper is a plug-in that can be used as an engine part for middleware basic processes such as communication, data collection, processing and service linkage, We propose a flexible and effective smart process for root industry. In addition, we propose a method to strengthen prevention and security against tampering, deodorization, etc. through encryption of network data between middleware plug - in and related service layer. We propose a system that will be developed as an IOT middleware platform that is specialized in the root industry so that it can be extended in various network protocols such as MQTT, COAP, XAMP.

Suggestions on Future Research Directions of Autonomous Vehicles based on Information-Centric Micro-Service (정보중심 마이크로서비스 기반 자율차량 연구 방향에 대한 제언)

  • Rehman, Muhammad Atif Ur;Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.7-14
    • /
    • 2021
  • By changing the bulky monolithic services architecture to a microservices-based architecture, industries are managing the rising complexity of Autonomous Vehicles. However, the underlying communication mechanisms for the utilization and distribution of these microservices are incapable of fulfilling the requirements of the futuristic AV, because of the stringent latency requirements along with intermittent and short-lived connectivity issues. This paper proposes to tackle these challenges by employing the revolutionary information-centric networking (ICN) paradigm as an underlying communication architecture. This paper argues that a microservice approach to building autonomous vehicle systems should utilize ICN to achieve effective service utilization, efficient distribution, and uniform service discovery. This research claims that the vision of an information-centric microservices will help to focus on research that can fill in current communication gaps preventing more effective, and lightweight autonomous vehicle services and communication protocols.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment (보안운영체제 환경에서의 신뢰채널 지원을 위한 모듈의 설계 및 구현)

  • 유준석;임재덕;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.3-12
    • /
    • 2004
  • Secure operating system is a special operating system that integrates some security functions(i.e. access control, user authentication, audit-trail and etc.) with normal operating system in order to protect system from various attacks. But it doesn't consider my security of network traffic. To guarantee the security of the whole system, network traffic must be protected by a certain way and IPsec is a representative technology for network security. However, it requires administrator's carefulness in managing security policies and the key management mechanism is very heavy as well as complicated. Moreover, it doesn't have a suitable framework for delivery of security information for access control mechanism. So we propose a simple trusted channel mechanism for secure communication between secure operating systems. It provides confidentiality md authentication for network traffic and ability to deliver security information. It is implemented at the kernellevel of IP layer and the simplicity of the mechanism can minimize the overhead of trusted channel processing.

A Strong Address Generation and Verification Scheme using Hash Functions in the IPv6 Environments (IPv6 환경에서 해쉬 함수 기반 강건한 주소 생성 및 검증 기법)

  • Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.115-119
    • /
    • 2007
  • The IPv6 protocol provides the method to automatically generate an address of a node without additional operations of administrators, Before the generated address is used, the duplicate address detection (DAD) mechanism is required in order to verify the address. However, during the process of verification of the address, it is possible for a malicious node to send a message with the address which is identical with the generated address, so the address can be considered as previously used one; although the node properly generates an address, the address cannot be used. In this paper, we present a strong scheme to perform the DAD mechanism based on hash functions in IPv6 networks. Using this scheme, many nodes, which frequently join or separate from wireless networks in public domains like airports, terminals, and conference rooms, can effectively generate and verify an address more than the secure neighbor discovery (SEND) mechanism.

A study on Interaction of IKE protocol engine in IPsec System (IPsec 시스템에서 IKE 프로토콜 엔진의 연동에 관한 연구)

  • 이형규;나재훈;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.27-35
    • /
    • 2002
  • In this paper, we present the structure and interaction flow between IKE server and the other modules for our IPsec System's efficiency. Our IPsec systems have several components for IP-based end-to-end security services. They are IKE, SADB and SPDB and so on, not to speak of IPsec Protocol Engine. Therefore the efficient interaction structure between them has an much influence on total system efficiency. Especially, in case of IPsec engine integrated with kernel, it is very important how IPsec engine can refer to SPDB and SADB entries efficiently according to the location of the implementation of SPDB and SADB. To solve the above problem, we use the SPI generated by IKE. Finally, we propose the interaction structure between IKE server and the other modules according to the optimization for referring to SPDB and SADB entries.