• Title/Summary/Keyword: 안전 동기

Search Result 353, Processing Time 0.024 seconds

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.

Design of Authentication and Key Agreement Protocol for UMTS (UMTS를 위한 인증과 키 동의 프로토콜 설계)

  • Oh, Ka-Kyung;Kim, Hyun-Sung;Bu, Ki-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1151-1154
    • /
    • 2008
  • UMTS(Universal Mobile Telecommunications System)의 인증 및 키 교환 프로토콜은 기본적으로 3GPP(3 Generation Partnership Project)에서 제안한 UMTS AKA(Authentication and Key Agreement) 프로토콜을 표준으로 사용한다. 하지만 UMTS AKA 프로토콜은 네트워크 대역폭 소모, 저장 공간의 오버헤드, SQN 동기화 문제 등이 제기되고 있다. 본 논문에서는 UMTS AKA 관련 프로토콜들의 문제점을 분석하고 이를 해결하기 위한 전방향 안전성을 제공하는 F-AKA 프로토콜을 제안한다. 제안 하는 프로토콜은 상호인증을 제공하고, 프라이버시를 강화하였으며 전방향 안전성을 보장한다.

The Effects of Organization's Safety Culture on Aircraft Maintenance Technician's Safety Behavior (한국항공운항학회 조직 내 안전문화가 항공정비사의 안전행동에 미치는 영향)

  • Dae-Seek Youn;Jin-Woo Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.30 no.4
    • /
    • pp.105-116
    • /
    • 2022
  • Domestic and foreign aviation industries showed steep growth along with rapid increase in aviation demand, but the industries got directly hit by COVID-19. Now, with the recovery of daily life, aviation demand is gradually increasing, too. However, the risk of aviation accidents also increases proportionally to the increasing demand for aviation. Although it is a point that safety management needs to be actively conducted to prevent safety accidents resulted from the growth of aviation industries, research on safety culture and organizations is not sufficiently done in terms of the depth and scope of it despite the importance of the discussion. Studies in various areas have reported that an organization's safety culture forms the group's safety atmosphere and then results in the workers' safety behavior. Accordingly, this study examined the effects of safety culture in an organization on the safety behavior of its members who are aircraft maintenance technicians. The results of this research can be summed up as follows: first, it has been found that the roles of the person in charge grounded on clear goals and guidelines for the organization's safety policy influence the technicians' attitudes. Second, the important factor in the technicians' safety observance is that the attitude to follow safety rules when performing aviation maintenance raises their awareness of safety, for instance, following standard operation procedures or wearing personal equipment for protection. Third, their attitudes have positive effects on safety participation, and consequently, their intention to comply with safety rules is shown as an active action to achieve the ultimate goal of safety behavior.

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.

An Implementation of the RGB Remote Controller for LED Emotion Lighting of AtoN Facilities (항로표지 시설의 LED 감성조명을 위한 RGB 원격 콘트롤러의 구현)

  • Jeong, Yeong-Cheol;Choi, Jo-Cheon;Cho, Dae-Hwan
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.5
    • /
    • pp.475-480
    • /
    • 2012
  • This study on the methode is easied to distinguish with emotional visual lighting on AtoN facility using 3colors LED, and which is controlled to on-off switching of approach light in shore or harbor. The identification have easied to provide a differentiation between the AtoN facility of red and white light and surrounding light in harbor both sides. And the integrated controller have designed to left-right and serial sequential lighting system for harbor guidance using the GPS synchronous or timer. There is expectation effect that is prevent a confusion about distinguish of facility by ship's operator and to beautify a night scene of harbor, which is expressed to emotional identification lighting and variable color lighting on AtoN body by vertical layer color lighting using LED. In addition, the performance of AtoN is implemented to display with guidance light the harbor safety message by morse code lighting. Effectiveness of system is enhanced that age and power consumption reduce by candle alternated high light LED.

A Load Distribution System on P2P Online Game Based on RS Reconfiguration by Interesting Regions (P2P 온라인 게임에서의 관심영역별 영역관리자 재구성 기반 부하분산 시스템)

  • Jung, Mi-Sook;Kim, Seong-Hoo;Park, Kyoo-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.3
    • /
    • pp.345-353
    • /
    • 2009
  • It is for sure that a stable game managing system is absolutely needed to accept simultaneous interfacing of many users for P2P on-line game system. The proposed P2P on-line game system in this paper is able to get smart and stable game managing taking care of extensive players through reorganizing numerous RS(Region Server) and mutual communications among RS's which can be avoid congestion on one region. Moreover, it is possible to synchronize for game nodes in time stamp utilizing Global Zone Buffer of Monitoring Server which leads to breakup loads. The system manages middleware layers in the so-called sub area, and it is able to execute no matter how big the game sizes are. That means, in some ways, we got everything we try to ensure such as the problems of high cost server and stabilization of message transmission. This paper welcomes to prove efficiency of the suggested system through the simulation.

  • PDF

The Privacy Protection Mechanism Applicable to Private Zone of Mobile RFID Systems (모바일 RFID 시스템의 Private Zone에 적용 가능한 프라이버시 보호 기법)

  • Kim, Dong-Chul;Chun, Ji-Young;Choi, Eun-Young;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.189-198
    • /
    • 2009
  • Mobile RFID system is a next generation technology which combines the existing RFID systems with mobile systems. It is newly expected to provide additional services and will be broadly used in everyday life; however, it sometimes causes the privacy or security problems generated by existing RFID systems and the additional privacy or security problems. Moreover, even if many methods have been proposed to solve those problems, it is still difficult to adapt to reality or to guarantee the security perfectly. Therefore, in this paper, we propose the secure and practicable privacy protection mechanism suitable to mobile RFID systems. proposing mechanism is applicable the mechanism to Private Zone of mobile RFID systems which require to protect the privacy. This mechanism suggests that own tagging-products needed to protect privacy using mobile reader of personal don't provide any information to other readers except their own reader. In addition to, proposing mechanism is the efficient mechanism which largely reduces the process to maintain the synchronization when happen to the DoS attack or system error.

A Study on the Effect of Job Calling Consciousness of Korea Cost Guard Officers on Job Enthusiasm (해양경찰공무원의 직업소명의식이 직무열의에 미치는 영향에 관한 연구)

  • Jong-gil Kim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.879-886
    • /
    • 2023
  • The purpose of this study was to verify the relationship between job calling consciousness and job enthusiasm for the development of marine police izations and individuals. A study was conducted on 136 Korea Cost Guard officials. Sub-variables of vocational calling consciousness consisted of transcendent calling, the existence of purpose and meaning, and pro-social-oriented motivation, and job enthusiasm consisted of vitality, immersion, and dedication. As a result of the verification, it was found that transcendent calling, purpose, and meaning, which are sub-variables of occupational calling recognized by Korea Cost Guard officials, have a positive (+) effect on vitality, and commitment. However, it was found that pro-social-oriented motivation did not affect vitality, commitment, and immersion. Through the analysis results, practical implications of the maritime police ization were proposed.

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.