• Title/Summary/Keyword: 위험 회피

Search Result 344, Processing Time 0.023 seconds

A Rogue AP Detection Method Based on DHCP Snooping (DHCP 스누핑 기반의 비인가 AP 탐지 기법)

  • Park, Seungchul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.11-18
    • /
    • 2016
  • Accessing unauthorized rogue APs in WiFi environments is a very dangerous behavior which may lead WiFi users to be exposed to the various cyber attacks such as sniffing, phishing, and pharming attacks. Therefore, prompt and precise detection of rogue APs and properly alarming to the corresponding users has become one of most essential requirements for the WiFi security. This paper proposes a new rogue AP detection method which is mainly using the installation information of authorized APs and the DHCP snooping information of the corresponding switches. The proposed method detects rogue APs promptly and precisely, and notify in realtime to the corresponding users. Since the proposed method is simple and does not require any special devices, it is very cost-effective comparing to the wireless intrusion prevention systems which are normally based on a number of detection sensors and servers. And it is highly precise and prompt in rogue AP detection and flexible in deployment comparing to the existing rogue AP detection methods based on the timing information, location information, and white list information.

A WSN(Wiress Sensor Network) Building Scheme using Clustering and Location information (클러스터링 및 위치 정보를 활용한 WSN(Wireless Sensor Network) 구성 방안)

  • Kim, Jinsoo;Kwon, Hyukjin;Shin, Dongkyoo;Hong, Sunghoon
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.13-20
    • /
    • 2020
  • Recently, the need of researches and developments about WSN(Wireless Sensor Network) technologies, which can be applied to services that require continuous monitoring or services to specific areas where accesses are limited, has gradually increased due to their expansion of application areas and the improvement of the efficiency. Especially, in the defense field, researches on the latest IT technologies including sensor network areas are actively conducted as an alternative to avoid the risk factors that can be occurred when personnel are put in, such as boundary and surveillance reconnaissance and to utilize personnel efficiently. In this paper, we analyze the conditions for increasing the life span of sensing nodes that make up sensor network by applying clustering and location-based techniques and derived the factors for extending the life span of them. The derived factors include CH(Cluster Head) election scheme and optimal path selection from CH to BS(Base Station). We proposed final scheme using derived factors and verified it through simulation experiments.

"우주물체 전자광학 감시체계 기술개발" 소개

  • Park, Jang-Hyeon;Choe, Yeong-Jun;Jo, Jung-Hyeon;Im, Hong-Seo;Mun, Hong-Gyu;Park, Jong-Uk;Choe, Jin;Kim, Jae-Hyeok;Jo, Gi-In
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.130.1-130.1
    • /
    • 2011
  • 인류의 우주공간에 대한 영향력이 확대됨에 따라, 우주공간에서의 인위적인 활동에 영향을 미칠 수 있는 모든 종류의 상황들에 대한 이해가 최근 전 세계적으로 매우 중요한 이슈로 부상하고 있다. 이를 Space Situational Awareness (SSA)라고 하는데, 특히 근지구공간에서의 인위적, 자연적 우주물체는, 우주발사체의 지속적인 증가와 이리듐-코스모스 위성의 상호 충돌 및 중국 폐기위성 파괴 등과 같은 사건으로 기하급수적으로 증가된 우주물체의 개체수로 인해 대한민국 국적의 모든 위성에도 실제적인 위협 요인으로 대두되고 있다. 이에 기초 기술연구회와 한국천문연구원은 이러한 위협을 국가적으로 해결해야할 과제(National Agenda Project) 중의 하나로 정의하고, 이를 해결하기 위해 우주물체 전자광학 감시체계 기술개발(OWL; Optical Wide-field patroL) 사업을 시작하였다. 이 사업의 목표는 자국위성에 대한 궤도력을 독자적으로 유지할 수 있는 시스템을 개발하는 것이며, 이를 위하여 2011년부터 6년 동안 총 5개소의 해외 관측소에 50cm급 광시야 망원경을 각각 설치하여 자국위성을 자동으로 상시관측하고, 관측된 자료를 이용한 궤도계산을 통하여 독자적으로 궤도력을 유지할 계획이다. 또한, 우주잔해물 감시는 하나의 국가에서 단독으로 할 수 없기 때문에 2m급 우주물체 감시망원경을 개발하여 국제공동으로 진행할 계획이다. 사업 첫해인 2011년 4월 시스템 요구사항 분석을 완료하였고 10월말 시스템 기본설계를 완료할 예정이다. 최종 완성될 소구경 광시야 망원경과 우주물체 감시망원경의 주요 임무는 우주물체 관측이지만, 향후 광시야를 이용한 다양한 탐사천문학에도 기여할 수 있을 것으로 기대한다. 한편, 자국위성에 대한 충돌 위험도 분석 및 회피기동에 관한 연구는 한국항공우주연구원이 이 사업의 협동연구로 참여하고 있다.

  • PDF

Development of a coordinated control algorithm using steering torque overlay and differential braking for rear-side collision avoidance (측후방 충돌 회피를 위한 조향 보조 토크 및 차등 제동 분배 제어 알고리즘 개발)

  • Lee, Junyung;Kim, Dongwook;Yi, Kyongsu;Yoo, Hyunjae;Chong, Hyokjin;Ko, Bongchul
    • Journal of Auto-vehicle Safety Association
    • /
    • v.5 no.2
    • /
    • pp.24-31
    • /
    • 2013
  • This paper describes a coordinated control algorithm for rear-side collision avoidance. In order to assist driver actively and increase driver's safety, the proposed coordinated control algorithm is designed to combine lateral control using a steering torque overlay by Motor Driven Power Steering (MDPS) and differential braking by Vehicle Stability Control (VSC). The main objective of a combined control strategy is twofold. The one is to prevent the collision between the subject vehicle and approaching vehicle in the adjacent lanes. The other is to limit actuator's control inputs and vehicle dynamics to safe values for the assurance of the driver's comfort. In order to achieve these goals, the Lyapunov theory and LMI optimization methods has been employed. The proposed coordinated control algorithm for rear-side collision avoidance has been evaluated via simulation using CarSim and MATLAB/Simulink.

Secure Smart Safety System Using Streetlight Infrastructure (가로등 인프라를 활용한 안전한 스마트 방범 시스템)

  • Cha, Jeong-Hwa;Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.851-856
    • /
    • 2015
  • As crime has actually increased in recent years, various mobile applications related to safety and emergency measure have received much attention. Therefore, IoT (Internet of Things) technologies, which connect various physical objects with Internet communication, have been also paid attention and then diverse safety services based on IoT technologies have been on the increase. However, existing mobile safety applications are simply based on location based service (LBS). Also, as they are independently operated without the help of another safety systems, they cannot efficiently cope with various safety situations. So, this paper proposes the efficient smart safety service architecture with both the risky situation detection using user location as well as various sensing information and the risk congruence measure using the streetlight infrastructure. Additionally, UDID (unique device identifier) is utilized for the secure communication with the control center.

The Relationships Between Fathers and Children with Internet Addiction (인터넷 중독 아동이 지각하는 '아버지-자녀' 관계)

  • Yee, Young Hwan;Lee, Hwa Sook
    • Korean Journal of Childcare and Education
    • /
    • v.9 no.1
    • /
    • pp.129-148
    • /
    • 2013
  • The purpose of this study is to examine the relationships between fathers and children with Internet addiction. To achieve the goal, researchers chose face to face interview methods with 12 children who had been considered'at risk'with Internet addiction. More specifically, examiners conducted individual in-depth interviews with 12 children associated with Internet addiction for 30~40 minutes during four sessions through structured questions and non-structured questions. After collecting data, examiners conducted a categorical analysis based on collected data. Finally, the research results, discovered in this research, were as follows: First, the Internet set up the inter-generational barrier in the relationship between father and child, second, children took an interest in the Internet instead of their busy father, Third, the Internet played the role of a place to escape from the awkwardness with their father, fifth, fathers were not able to control the Internet use of their children. Based on the research results, this study suggests a desirable behavior pattern for fathers which can be conducive to children with Internet addiction and their fathers along with a follow-up study.

The Effects of Corporate Governance on Internationalization in Korean Firms: Focusing on the Moderating Effect of Ownership Concentration (기업지배구조가 한국기업들의 국제화수준에 미치는 영향: 소유지분 집중도의 조절효과를 중심으로)

  • Yang, Young-Soo;Park, Young-Ryeol;Lee, Jae-Eun
    • International Area Studies Review
    • /
    • v.17 no.4
    • /
    • pp.23-42
    • /
    • 2013
  • This paper examines the effects of corporate governance on internationalization in Korean firms. Using the data from 454 Korean manufacturing firms listed in the Korean Stock ExchanFge (KSE) from 1999-2006, we analyzed the role of corporate governance on internationalization in Korean firms, including Chaebols (Korean business groups) and family firms. In addition, we investigated the moderating effect of concentration of ownership on internationalization. The results of the analysis showed a positive association between corporate governance in Chaebols and family firms and internationalization. Interestingly, the influence of ownership concentration overpowered the ambivalent behaviors of Chaebols, leading to less internationalization. We conclude that corporate governance in Chaebols and family firms is important to internationalization strategy.

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

A Conceptual Design and Feasibility Analysis of a Window Cleaning Device (유리창 청소장치의 개념 디자인 및 경제적 타당성 예측)

  • Kim, Kyoon-Tai;Jun, Young-Hun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.20 no.6
    • /
    • pp.537-543
    • /
    • 2020
  • The window cleaning works are manpower-dependent and are performed in an unstable posture at high altitude, so that there is a risk of falling. Therefore, there is an urgent need to improve the safety of workers. In this study, a conceptual design was proposed for the cleaning of exterior windows of a building, and the economic feasibility of the proposed conceptual model was analyzed. The proposed model is designed to avoid protrusions such as window frames, and to be able to respond even if the shapes of the upper and lower parts are different. As a result of analyzing the economic feasibility of the designed conceptual model, the benefit cost ratio was 4.48, which was significantly higher than 1. Therefore, the economic feasibility of the proposed window cleaning device is expected to be sufficient. The results analyzed in this paper will be used in the development and marketing of the window cleaning device.

A Study on the Role of Private-led Information Provision: Case of COVID-19 Pandemic (코로나19 팬데믹 상황에서 살펴본 민간 주도 정보제공의 역할 분석)

  • Cho, Hosoo;Jang, Moonkyoung;Ryu, Min Ho
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.1-13
    • /
    • 2021
  • With the global pandemic of COVID-19, it is pointed out that exposure to false information to the public could cause serious problems. However, in pandemic situations, there is also an positive effect for the public to share private-led information rather than centralized unilateral delivery of information. This study analyzes the role of private-led information provision in infectious disease situations. To this end, topic modeling and sentiment analysis is carried out on online reviews of all COVID-19-related applications in Google Playstore provided by the Korean government and the private. The results showed that the user's evaluation of private apps, which were used from the early stage of COVID-19, was much higher than the apps provided by the government. In particular, users responded more positively to private apps than government apps in all aspects such as reliability of information, risk avoidance, timeliness, usefulness, and stability. Based on these results, a post-monitoring system is recommended rather than a pre-block of all private apps.