• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.036 seconds

Grid-Based Key Pre-Distribution for Factory Equipment Monitoring (공장 설비 모니터링을 위한 그리드 기반 키 선분배 기법)

  • Cho, YangHui;Park, JaePyo;Yang, SeungMin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.147-152
    • /
    • 2016
  • Wireless sensor networks that are easy to deploy and install are ideal for building a system that monitors the condition of the equipment in a factory environment where wiring is difficult. The ZigBee has characteristics of low price and low power compared with other wireless communication protocols and is suitable for a monitoring system requiring a plurality of nodes. ZigBee communication requires encryption security between devices because all protocol layers are based on OTM trusted by each other. In the communication between nodes, node authentication must be guaranteed and exposure of confidential information managed by each node should be minimized. The facilities of the factory are regular and stationary in distribution location. In order to protect the information gathered from the sensor in the factory environment and the actuator control information connected to the sensor node, we propose a cryptosystem based on the two - dimensional grid - based key distribution method similar to the distribution environment of the facility.

A Study on Blog users' Response to Blog Marketing (블로그 마케팅에 대한 이용자 인식 연구)

  • Kim, Jae-Kyeong;Kim, Hyea-Kyeong;Park, Sun-Young
    • Information Systems Review
    • /
    • v.11 no.3
    • /
    • pp.1-17
    • /
    • 2009
  • A growing percentage of internet users have maintained a personal website, blog, and the articles published by blog users play important roles to other users' purchasing decision as reliable information or knowledge. Therefore blog has been recently regarded as a promising marketing tool, for the brand image campaigns and sales management of companies. However, the effect is not easy to be verified when blog users recognize it to be negative the marketing activity utilizing blogs. Hence, the purpose of this paper is to identify the relationship between the customers' blog usage level and their response to blog marketing. To such purposes, this study is designed to survey the followings on office workers; Blog Quotient as a blog usage level of customers, response to blog marketing, the relation between Blog Quotient and demographic variables, and the relation between Blog Quotient and response to blog marketing. The results show that Blog Quotient has a significant relation with customers' response to blog advertisement and a company should consider the target customers' blog usage level to plan a blog marketing strategy.

Design of Mobile Agent-based Software Module For Reducing Load of RFID Middleware (RFID 미들웨어 부하를 줄이기 위한 이동 에이전트 기반 소프트웨어 모듈의 설계)

  • Ahn, Yong-Sun;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.95-101
    • /
    • 2009
  • As RFID technology has been developed rapidly, its technical potential has it be widely used in many industrial fields. Particularly, in the physical distribution industry, the introduction of RFID has enormously contributed to effectively monitoring locations and information of products in real-time. Also, a significant decline in tag prices and RFID related technical competitiveness enabled each tag to be managed much more minutely by attaching it to an item, not a pallet nor a container. However, if a very large volume of tag data are continuously flowed into a RFID middleware with limited hardware resources, its entire data processing time may become considerably longer. Therefore, specific technologies are in great demand to handle and further to reduce the load of the middleware. In this paper, we proposed a mobile agent-based software module to efficiently reduce the load of the middleware by pre-processing a lot of tag data while items are in transit. Simulation results show that using the proposed software module considerably enhances the speed of processing tag data than otherwise. This behavior increases the tag recognition rate in a certain time limit and improves reliability of RFID middlewares.

  • PDF

Mileage As a Private Electronic Money: Based on OK Cashbag Case (사적 전자화폐로서의 마일리지: 오케이캐쉬백 사례를 중심으로)

  • Park, Seung-Bong;Han, Jae-Min
    • Information Systems Review
    • /
    • v.7 no.1
    • /
    • pp.137-152
    • /
    • 2005
  • The mileage program has been one of the most popular royalty and promotion programs in marketing. With the remarkable growth and rapid pervasiveness of information technologies including the Internet, new and a variety of many other applications of mileage system than traditional ones have been observed. The objective of this research is to investigate the rising role of mileage point as a new private electronic money. In an attempt to identify the new role, we employ two factors: monetary confidence and monetary efficiency. This paper analyzes the status quo in the monetary uses of the mileage system by answering to those questions that "is it money?," and "what are the cases for real experiences in 'money-like' mileage and their implications?" with OK Cashbag case. Results show that OK Cashbag point is taking a different development route of money and performs limited monetary functions as private electronic money.

Vulnerability analysis on the ARMv7 Thumb Architecture (ARMv7 Thumb Architecture 취약성 분석)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1003-1008
    • /
    • 2017
  • The Internet of Things has attracted considerable research attention in recent years. In order for the new IoT technology to be widely used, the reliability and protection of information is required. IoT systems are very vulnerable to physical security due to their easy accessibility. Along with the development of SoC technology, many operating systems have been developed and many new operating systems have been introduced. In this paper, we describe the vulnerability analysis results for operating systems running on the ARMv7 Thumb Architecture hardware platform. For the recently introduced "Windows 10 IoT Core" operating system, I implemented the Zero-Day Attack by implanting the penetration code developed through the research into a specific IoT system. The virus detection test for the resulting penetration code was validated by referral to the "virustotal" site.

Performance Improvement of TCP SACK using Retransmission Fiailure Recovery in Wireless Networks (무선 네트워크에서 재전송 손실 복구를 통한 TCP SACK 성능 향상 방안)

  • Park, Cun-Young;Kim, Beom-Joon;Kim, Dong-Min;Han, Je-Chan;Lee, Jai-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.382-390
    • /
    • 2005
  • As today's networks evolve towards an If-based integrated network, the role of transmission control protocol(TCP) has been increasing as well. As a well-known issue, the performance of TCP is affected by its loss recovery mechanism that is comprised of two algorithms; fast retransmit and fast recovery. Although retransmission timeout(RTO) caused by multiple packet losses can be avoided by using selective acknowledgement(SACK) option, RTO cannot be avoided if a retransmitted packet is lost. Therefore, we propose a simple modification to make it possible for a TCP sender using SACK option to detect a lost retransmission. In order to evaluate the proposed algorithm, simulations have been performed for two scenarios where packet losses are random and correlated. Simulation results show that the proposed algorithm can improve TCP performance significantly.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

Improved Anti-Jamming Frame Error Rate and Hamming Code Repetitive Transmission Techniques for Enhanced SATURN Network Reliability Supporting UAV Operations (UAV 운영 신뢰성 개선을 위한 SATURN 통신망 항재밍 프레임 오율과 해밍코드 반복 전송 향상 기술)

  • Hwang, Yoonha;Baik, Jungsuk;Gu, Gyoan;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2022
  • As the performance of Unmanned Aerial Vehicles (UAVs) are improving and the prices are lowering, it is expected that the use of UAVs will continuously grow in the future. It is important to always maintain control signal and video communication to operate remote UAVs stably, especially in military UAV operations, as unexpected jamming attacks can result in fatal UAV crashes. In this paper, to improve the network reliability and low latency when supporting UAV operations, the anti-jamming performance of Second generation Anti-jam Tactical UHF Radio for NATO (SATURN) networks is analyzed and enhanced by applying Forward Error Correction (FEC) and Minimum Shift Keying (MSK) modulation as well as Hamming code based multiple transmission techniques.

A Study on Implementation Plan for AI Service Impact Assessment (인공지능 서비스 영향평가 추진방안에 대한 연구)

  • Shin, Sunyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.147-157
    • /
    • 2022
  • The purpose of this study is to establish policy recommendations for the promotion of AI service impact assessment based on the definition of impact assessment and analysis of domestic and foreign AI service impact assessment cases. The direction of implementation was analyzed based on the case of impact evaluation promoted in various fields at home and abroad and the case of impact evaluation at home and abroad of artificial intelligence services. As a step-by-step implementation plan, in the first stage, quantitative indicators such as AI level survey-based economic effects are developed, and in the second stage, information culture such as safety and reliability and artificial intelligence ethics described in the Framework Act on Intelligence Information, social, economic, information protection, and people's daily lives are prepared. In the third stage, discussion on detailed metrics and methods will be expanded and impact assessment results will be evaluated. This study requires analysis through various participants such as policy designers, artificial intelligence service developers, and civic groups in the future.

A Scheme Reconfiguration of Whitelisting and Hyperledger Fabric for Cryptocurrency Integrity Transactions (암호화폐 무결성 거래를 위한 Whitelisting과 Hyperledger Fabric 재구성 기법)

  • Su-An Jang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.7-12
    • /
    • 2024
  • To trade cryptocurrency, traders require a personal cryptocurrency wallet. Cryptocurrency itself using blockchain technology is guaranteed excellent security and reliability, so the threat of blockchain hacking is almost impossible, but the exchange environment used by traders for transactions is most subject to hacking threats. Even if transactions are made safely through blockchain during the transaction process, if the trader's wallet information itself is hacked, security cannot be secured in these processes. Exchange hacking is mainly done by stealing a trader's wallet information, giving the hacker access to the victim's wallet assets. In this paper, to prevent this, we would like to reconstruct the existing Hyperledger Fabric structure and propose a system that verifies the identity integrity of traders during the transaction process using whitelisting. The advantage is that through this process, damage to cryptocurrency assets caused by hackers can be prevented and recognized. In addition, we aim to point out and correct problems in the transaction process that may occur if the victim's wallet information is stolen from the existing Hyperledger Fabric.