• Title/Summary/Keyword: 보안문제

Search Result 3,066, Processing Time 0.03 seconds

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

A SIP INVITE Flooding Detection algorithm Considering Upperbound of Possible Number of SIP Messages (발생 메시지의 상한값을 고려한 SIP INVITE 플러딩 공격 탐지 기법연구)

  • Ryu, Jea-Tek;Ryu, Ki-Yeol;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.797-804
    • /
    • 2009
  • Recently, SIP(Session Initiation Protocol) is used to set up and manage sessions for multimedia applications such as VoIP(Voice over IP) and IMS(IP Multimedia Subsystem). However, because SIP operates over the Internet, it is exposed to pre-existed internet security threats such as service degradation or service disruptions. Multimedia applications which are delay sensitive even suffers more from the threats mentioned above. The proposed methods so far to detect SIP INVITE flooding are CUSUM(Cumulative Sum), Hellinger distance and adaptive threshold, but among methods only take normal state into consideration. So, it is not capable of adapting the condition of the network congestion which are dynamically changing. In this paper, SIP INVITE flooding detection algorithm considering network congestion which enables efficient detections of such attacks is proposed. The proposed algorithm is expected to detect other types of attacks such as BYE and CANCEL more precisely compared to other methods.

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.

Group key management protocol adopt to cloud computing environment (클라우드 컴퓨팅 환경에 적합한 그룹 키 관리 프로토콜)

  • Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.237-242
    • /
    • 2014
  • Recently, wind energy is expanding to combination of computing to forecast of wind power generation as well as intelligent of wind powerturbine. Wind power is rise and fall depending on weather conditions and difficult to predict the output for efficient power production. Wind power is need to reliably linked technology in order to efficient power generation. In this paper, distributed power generation forecasts to enhance the predicted and actual power generation in order to minimize the difference between the power of distributed power short-term prediction model is designed. The proposed model for prediction of short-term combining the physical models and statistical models were produced in a physical model of the predicted value predicted by the lattice points within the branch prediction to extract the value of a physical model by applying the estimated value of a statistical model for estimating power generation final gas phase produces a predicted value. Also, the proposed model in real-time National Weather Service forecast for medium-term and real-time observations used as input data to perform the short-term prediction models.

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

Design of Personal Information Security Model in U-Healthcare Service Environment (유헬스케어 서비스 환경 내 개인정보 보호 모델 설계)

  • Lee, Bong-Keun;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.189-200
    • /
    • 2011
  • With rapid development and contribution of IT technology IT fushion healthcare service which is a form of future care has been changed a lot. Specially, as IT technology unites with healthcare, because delicate personal medical information is exposed and user's privacy is invaded, we need preperation. In this paper, u-healthcare service model which can manage patient's ID information as user's condition and access level is proposed to protect user's privacy. The proposed model is distinguished by identification, certification of hospital, access control of medical record, and diagnosis of patient to utilize it efficiently in real life. Also, it prevents leak of medical record and invasion of privacy by others by adapting user's ID as divided by user's security level and authority to protect privacy on user's information shared by hospitals.

A Study on the Improvements of Accounting for Social Welfare Corporations (사회복지법인 회계의 개선방안에 관한 연구)

  • Cheon, Young-Seung
    • Korean Business Review
    • /
    • v.17 no.2
    • /
    • pp.111-129
    • /
    • 2004
  • The purpose of this study is to indicate problems of accounting for social welfare corporations and to suggest the improvement on them. To accomplish this objective, this study reviewed the existing relevant studies and literatures. The main results of this study are summarized as follows. First, it is necessary to convert from cash basis accounting to accrual basis accounting and to introduce the double entry bookkeeping. Second, it is needed to capitalize the tangible fixed assets and to depreciate them. Third, Cost accounting is necessary to evaluate the operating results. Fourth, it is necessary to establish the generally accepted accounting principles in consideration of the characteristics of accounting for social welfare corporations. Last, it is necessary to introduce the external audit system to ensure the reliability of accounting information.

  • PDF

A Study on Authorization Policy Management for Semantic Web (시맨틱 웹을 위한 권한부여 정책 관리에 관한 연구)

  • Jo, Sun-Moon
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.189-194
    • /
    • 2013
  • Semantic Web is what supports a search, data integration, and automated web service by developing technology of giving help so that a computer can understand information a little more on the web. As amount of information gets growing and diverse, there is a problem of offering by efficiently extracting and processing only information proper for users' demand. Semantic Web isn't what is distinguished completely from the existing web. It gives a meaning, which was well defined, to information of being inserted on web by expanding the current web. Through this, a computer and a person come to perform work cooperatively. To implement Semantic Web, the limit of HTML needs to be overcome. The existing access authorization has not taken information and semantics into account due to the limitations of HTML. It is difficult to expand or integrate many relevant documents by using HTML. Program or software agent, not a person, cannot extract a meaning of document automatically. This study suggests a method of Access Authorization Policy Management that is in the Semantic Web configuration. Accordingly, the policy, which was designed in this study, improved the authorization process more than the existing method.

An Study on Privacy Policy Research Trend: Focused on KCI Published (개인정보보호정책에 관한 연구동향 고찰: KCI등재지를 중심으로)

  • Bok, Jun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.81-89
    • /
    • 2020
  • Since the Korean privacy policy was legalized in 2011, the related academical researches have been lasted in various fields. Upcoming so-called 3 data laws would be implemented, it is meaningful to review privacy policy studies for exploring future research direction. For this purpose, the total of 146 journals from 2011 to 2019 were reviewed by the content analysis following as research subjects, methodologies and constructions of studies. As results, the numbers of the researches have been conducted on protection policies themselves for improvement, comparing with other countries' policies and also digital finance information protection were deeply discussed. Some of technology based protection applications were experimented and suggested. The major research characteristics was mainly focused on case analysis and criminal laws and policies were developed as protection contingencies. However, most research objects were focused on the protection regulations, not deregulation, therefore, researchers in future study need to explore more digital industry-centric tasks which are practically applied in safer ways. Further, social agreement in using private information will be an essential to prevent indiscriminate use.

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.